Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21415 results:
RTF
EndNote XML
1999
Markides, Constantinos C.
.
"
“In Search of Strategy
."
MIT Sloan Management Review
40, no. 3 (1999).
Google Scholar
RTF
EndNote XML
Petitcolas, Fabien
,
Ross Anderson
, and
Markus Kuhn
.
"
Information Hiding – A Survey
."
Proceedings of the IEEE
87, no. 7 (1999).
Google Scholar
RTF
EndNote XML
Editorial
.
"
Information Security and Multisensor Data Processing
."
Information & Security: An International Journal
2 (1999): 5-11.
DOI
Google Scholar
RTF
EndNote XML
Eriksson, Anders E.
.
"
Information Warfare: Hype Or Reality
."
The Non-Proliferation Review
(1999).
Google Scholar
RTF
EndNote XML
Stein, Willi
.
Information Warfare in the Context of Security-related Issues
In
RMA Breda: NL ARMS – Netherlands Annual Review of Military Studies
, Edited by
J.M.J. Bosch
,
H.A.M. Luiijf
and
A.R. Mollema
., 1999.
Google Scholar
RTF
EndNote XML
Monitor, ISIJ
.
"
Information warfare principles and operations
."
Information & Security: An International Journal
2 (1999): 141-157.
DOI
Google Scholar
RTF
EndNote XML
Zięba, Ryszard
.
Instytucjonalizacja bezpieczeństwa europejskiego. Koncepcje – struktury – funkcjonowanie
. Warsaw: Scholar, 1999.
Google Scholar
RTF
EndNote XML
Meier, Christoph
.
"
Integrating Topographical and Topological Data in the Estimation of the Actual Traffic Situation on Airports
."
Information & Security: An International Journal
2 (1999): 23-32.
DOI
Google Scholar
RTF
EndNote XML
Fox, G.C.
,
W. Furmanski
,
B. Natarajan
,
H.T. Ozdemir
,
Odcikin Z. Ozdemir
,
S. Pallickara
, and
T. Pulikal
.
"
Integrating Web, Desktop, Enterprise and Military Simulation Technologies to Enable World-Wide Scalable Televirtual Environments
."
Information & Security: An International Journal
3 (1999): 149-160.
DOI
Google Scholar
RTF
EndNote XML
Mihaylova, Ludmila
, and
Emil Semerdjiev
.
"
An Interacting Multiple Model Algorithm for Stochastic Systems Control
."
Information & Security: An International Journal
2 (1999): 102-112.
DOI
Google Scholar
RTF
EndNote XML
Semerdjiev, Emil
,
Ludmila Mihaylova
,
Tzvetan Semerdjiev
, and
Violeta Bogdanova
.
"
Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models
."
Information & Security: An International Journal
2 (1999): 122-137.
DOI
Google Scholar
RTF
EndNote XML
Interim Agreement for Peace and Self-Government in Kosovo (Rambouillet Agreement)
., 1999.
Google Scholar
RTF
EndNote XML
Woodhouse, Tom
.
"
International Conflict Resolution: Some Critiques and a Response
." In
Centre for Conflict Resolution citing International Alert, Goodhand & Lewer, Goodhand & Hume
., 1999.
Google Scholar
RTF
EndNote XML
Greenwood, Christopher
.
International Humanitarian Law and the Laws of War
In
Preliminary Report for the Centennial Commemoration of the First Hague Peace Conference 1899
., 1999.
Google Scholar
RTF
EndNote XML
International legal acts and the legislation of individual countries on corruption (Міжнародні правові акти та законодавство окремих країн про корупцію)
. Kyiv, 1999.
Google Scholar
RTF
EndNote XML
Housley, Russell
,
Warwick Ford
,
W. Polk
, and
David Solo
.
Internet X.509 Public Key Infrastructure, Certificate and CRL Profile
In
Internet Draft, The Internet Engineering Task Force (IETF), PKIX Working Group
., 1999.
Google Scholar
RTF
EndNote XML
Yusufzai, Rahimullah
.
"
Interview with Bin Laden: World’s Most Wanted Terrorist
."
ABC News Online
(1999).
Google Scholar
RTF
EndNote XML
Atanassov, Krassimir
.
Intuitionistic Fuzzy Sets: Theory and Applications
. Heidelberg, Germany: Physica-Verlag, 1999.
Google Scholar
RTF
EndNote XML
Abootalebi, Ali R.
.
"
Islam, Islamists, and Democracy
."
Middle East Review of International Affairs
3 (1999).
Google Scholar
RTF
EndNote XML
Esposito, John L.
.
The Islamic Threat: Myth or Reality
. Oxford: Oxford University Press, 1999.
Google Scholar
RTF
EndNote XML
ISO/IEC 7498-1:99 Information technology - Open Systems Interconnection - Basic Reference Model, Part 1: The Basic Model
., 1999.
Google Scholar
RTF
EndNote XML
ISO/IEC 7498-2:99 Information technology - Open Systems Interconnection - Basic Reference Model, Part 2: Security Architecture
., 1999.
Google Scholar
RTF
EndNote XML
Kravchuk, L.
.
"
It’s awful that government now lives according to the laws of commerce (Це жахливо, що зараз уряд живе відповідно до законів про торгівлю)
."
Den’
(1999): 4-5.
Google Scholar
RTF
EndNote XML
Ceranowicz, Andy
,
D. Bakeman
,
J. McCarthy
,
S. Moore
,
B. Helfinstine
, and
M. Torpey
.
J9901: Federation Development for Joint Experimentation
In
Fall 1999 Simulation Interoperability Workshop
. Orlando FL, 1999.
Google Scholar
RTF
EndNote XML
Bellifemine, Fabio
,
Giovanni Rimassa
, and
Agostino Poggi
.
Jade - a fipa-compliant agent framework
In
PAAM’99
. London, 1999.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
743
744
745
746
747
748
749
750
751
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance