Biblio

Export 21393 results:
2003
Combating the Financing of Terrorist Organizations . Bucharest: Romanian Intelligence Service, 2003.
"Command and Control in Civil Emergencies." Information & Security: An International Journal 10 (2003): 5-11.
Borden, Andrew. "Command and Control in Crisis Management." Information & Security: An International Journal 10 (2003): 15-23.
Tolk, Andreas. "Common Data Administration, Data Management, and Data Alignment as a Necessary Requirement for Coupling C4ISR Systems and M&S Systems." Information & Security: An International Journal 12, no. 2 (2003): 164-174.
Stamp, Jason, John Dillinger, William Young, and Jennifer DePoy. Common Vulnerabilities in Critical Infrastructure Control Systems. Albuquerque, NM: Sandia National Laboratories, 2003.
Dimitrov, Vassil. Communication and Information System for Safety of Navigation and Vessel Traffic Management in Bulgarian Territorial Waters In The Naval Sovereignty Operations Center - When and How, AFCEA. Varna, 2003.
Weixin, Jin, Xiao Tianyuan, Xie Ning, and Li Li. "Complex Military System Simulation Methodology (复杂军事系统仿真方法论)." Computer Simulation (2003).
Concept for the Development of a Professional Army of the Czech Republic and Mobilization of the Czech Armed Forces Revised for the New Resource Framework for period 2004–2010 In A-Report., 2003.
Magnette, Paul, Nicolas Jabko, Olivier Costa, and Christian Lequesne. "Conclusion: Diffuse Democracy in the European Union: The Pathologies of Delegation." Journal of European Public Policy 10, no. 5 (2003).
Schmitt, Michael N.. "Conduct of Hostilities During Operation Iraqi Freedom: An International Humanitarian Law Assessment." In Yearbook of International Humanitarian Law. Vol. 6., 2003.
Krausse, Keith. "Conflict Prevention." International Security: Challenges and Prospects (2003).
Conflict Resolution in the South Caucasus: The EU’s Role In International Crisis Group Europe Report., 2003.
Levitt, Matthew A.. "Confronting Syrian Support for Terrorist Groups." Middle East Intelligence Bulletin 5, no. 5 (2003).
Kellerhals, Merle D.. Congress Agrees to Let Pentagon Study Low-Yield Nuclear Weapons. Washington File., 2003.
Wang, Justine. Congressional Bills Passed Support Bush Agenda for New Nuclear Weapons. Nuclear Age Peace Foundation, 2003.
Bin Lee, Wei-, and Tzung-Her Chen. "Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms." Information & Security: An International Journal 12, no. 2 (2003): 250-258.
Lefebvre, Tine. Contact modelling, parameter identification and task planning for autonomous compliant motion using elementary contacts In Faculteit Toegepaste Wetenschappen. Vol. Ph.D. Belgium: Katholieke Universiteit Leuven, 2003.
Tagarev, Todor. Control, Cooperation, Expertise: Civilians and the Military in Bulgarian Defence Planning Experience In ISIS Research Reports. Sofia: Institute for Se¬curity and International Studies, 2003.
Duke, Simon. "The Convention, the Draft Constitution and External Relations: Effects and Implications for the EU and its International Role." In Working Paper. Maastricht: European Institute of Public Administration, 2003.
Mont, Malia K. Du. "Cooperation 2003: Style, Substance and Some Surprises." CEF Monthly (2003).
Lee, Seungjoon, Rob Sherwood, and Bobby Bhattacharjee. "Cooperative Peer Groups in NICE." In INFOCOM Twenty-Second Annual Joint Conference of the IEEE Computer and Communications., 2003.
Singer, Peter W.. Corporate Warriors: The Rise of the Privatized Military Industry . Ithaca, NY: Cornell University Press, 2003.
Bull, Martin J., and James L. Newell. Corruption in Contemporary Politics. New York: Palgrave Macmillan, 2003.
Kosiak, Steven. Cost Growth in Defense Plans. Center for Strategic and Budgetary Assessments, 2003.
Cost Structure and Life Cycle Costs for Military Systems In RTO Technical Report TR-058 ., 2003.

Pages