Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21406 results:
RTF
EndNote XML
0
B., Adida
.
BeamAuth: Two-Factor Web Authentication With a Bookmark
In
Proc. of 14th ACM Conference on Computer and Communications Security
. Alexandria, USA.
Google Scholar
RTF
EndNote XML
"
Bidzina Ivanishvili’s Address to Politicians, Media and the Public
."
News Georgia
.
Google Scholar
RTF
EndNote XML
Bilateral relations: The former Yugoslav Republic of Macedonia
. European Commission.
Google Scholar
RTF
EndNote XML
Healey, Jason
.
Breakthrough or Just Broken? China and Russia’s UNGA Proposal on Cyber Norms
. New Atlanticist.
Google Scholar
RTF
EndNote XML
Shalamanov, Velizar
.
"
Civil Security and Crisis Management: The Concept Development and Experimentation Process in Bulgaria (Role of the US, NATO and the EU in SEE)
." In
The fight against terrorism and crisis management in the Western Balkans
, 147-164 . IOS Press.
Google Scholar
RTF
EndNote XML
I. Allen, Elaine
, and
Jeff Seaman
.
Class Differences: Online Education in the United States, 2010
. Wellesley, MA: Babson Survey Research Group and the Sloan Consortium.
Google Scholar
RTF
EndNote XML
Lakshika, E.
,
M. Barlow
, and
A. Easton
.
"
Co-evolving semi-competitive interactions of sheepdog herding behaviors utilizing a simple rule-based multi agent framework
." In
Artificial Life (ALIFE), 2013 IEEE Symposium on
. Singapore: IEEE.
DOI
Google Scholar
RTF
EndNote XML
Cui, Yanliang
, and
Dechang Pi
.
"
A combat complex system based on artificial life
." In
System Simulation and Scientific Computing, 2008. ICSC 2008. Asia Simulation Conference - 7th International Conference on
. Beijing: IEEE.
DOI
Google Scholar
RTF
EndNote XML
Nouredine, Gasmallah
, and
Seridi Hassina
.
"
Composition of web service based multi-agent
." In
International Conference on Multimedia Computing and Systems
. Ouarzazate, Morocco .
DOI
Google Scholar
RTF
EndNote XML
Leheny, David
.
"
Constructivism and International Relations in Asia
." In
The Oxford Handbook of the International Relations of Asia
. Oxford University Press.
Google Scholar
RTF
EndNote XML
University, Johns Hopkins
.
Corona Virus Map
.
Google Scholar
RTF
EndNote XML
"
Coronavirus Disease (COVID-2019) Situation Reports
."
WHO
.
Google Scholar
RTF
EndNote XML
I., Kershner
.
"
Cyber attack exposes 20,000 Israeli credit card numbers and details about users
."
New York Times
.
Google Scholar
RTF
EndNote XML
Geers, Kenneth
.
"
Cyberspace and the Changing Nature of Warfare
." In
White paper pre¬sented at the 2008 Black Hat Conference, 7.0
.
Google Scholar
RTF
EndNote XML
Dai 189 Kai Kokkai Kaigiroku Sangiin Naikaku Iinkai & Zaisei Kinyu Iinkai Rengou Shinsa Dai 1 Gou [The Diet Record in the 189th session of the Diet, House of Councillors, the Cabinet Office & the Financial Committee Vol.1]
. House of Councilors in the National Diet of Japan.
Google Scholar
RTF
EndNote XML
Kim, Cheonshik
.
"
Data Hiding Based on BTC using EMD
."
The Journal of The Institute of Internet, Broadcasting and Communication
14, no. 2: 11-16 .
Google Scholar
RTF
EndNote XML
Deal Signed on Extending Russian Military Presence in Armenia
. Radio Free Europe – Radio Liberty.
Google Scholar
RTF
EndNote XML
Definition of Aggression, United Nations General Assembly
.
Google Scholar
RTF
EndNote XML
Roman, Alexandru V.
.
"
Delineating Three Dimensions of E-Government Success: Security, Functionality, and Transformation
." In
E-Government Success Factors and Measures: Theories, Concepts, and Methodologies
.
Google Scholar
RTF
EndNote XML
Ra, Kim Mi
.
"
Desires of Residential Mobility and the Related Variables among the Rental Apartment Residents (임대아파트 거주자의 주거이동 희망 여부와 관련 변인 )
."
Journal of Korean Home Management Association
21, no. 4: 11-21.
Google Scholar
RTF
EndNote XML
Nye, Jr., Joseph S.
.
"
Deterrence and Dissuasion in Cyberspace
."
International Security
41, no. 3: 44-71.
DOI
Google Scholar
RTF
EndNote XML
Mateeva, Gergana
,
Dimitar Parvanov
, and
Todor Balabanov
.
"
Differential Evolution and Particle Swarm Optimization Efficiency According to Pseudo-Random Number Generator Quality
."
Problems of Engineering Cybernetics and Robotics
76: 39-46.
Google Scholar
RTF
EndNote XML
Ahmad, Mahmood
, and
Muhammad Ayub Jan
.
"
Diversity of information sources: An evaluation of global think tanks knowledge construct
."
Research Evaluation
.
Google Scholar
RTF
EndNote XML
Hasanein
, and
Walid Abdulrahman
.
"
Egypt Police Neutralize Terrorist Cell
.".
Google Scholar
RTF
EndNote XML
EPA Finds Greenhouse Gases Pose a Danger to Health
. Associated Press.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
849
850
851
852
853
854
855
856
857
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance