Biblio

Export 21415 results:
2011
Diallo, Saikou Y., Heber Herencia-Zapana, Jose J. Padilla, and Andreas Tolk. Understanding interoperability In EAIA '11 Proceedings of the 2011 Emerging M&S Applications in Industry and Academia Symposium., 2011.
United Nations Security Council Resolution 1973., 2011.
Kitchen, Nicholas. The United States After Unipolarity: Executive Summary In IDEAS reports. London: London School of Economics and Political Science, 2011.
Universalen simulator ot Avstralia., 2011.
Cavelty, Myriam Dunn. "Unraveling the Stuxnet Efect: Of Much Persistence and Little Change in the Cyber Threats Debate." Military and Strategic Affairs 3, no. 3 (2011): 11-19.
Souleimanov, Emil. "The Upsurge of Islamist Violence in the North Caucasus: Exploring the Case Studies of Dagestan and Kabardino-Balkaria." Connections: The Quarterly Journal 10, no. 3 (2011): 117-126.
Mindling, George, and Robert Bolton. U.S. Air Force Tactical Missiles 1949-1969: The Pioneers. Morrisville, North Carolina: Lulu.com Publishing, 2011.
Schmidt, Howard. U.S. and Russia: Expanding the “Reset” to Cyberspace In The White House Blog., 2011.
Kretchik, Walter E.. U.S. Army Doctrine: From the American Revolution to the War on Terror. Lawrence, KS: University Press of Kansas, 2011.
Mattis, James N.. U.S. Central Command Posture Statement., 2011.
U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2010 . Washington, D.C.: State Department, 2011.
Menn, Joseph. "U.S. Power Plants Vulnerable to Cyberattack." Financial Times (2011).
U.S. Shifts Supply Routes To Central Asia. Radio Free Europe/Radio Liberty, 2011.
Norris, Robert S., and Hans M. Kristensen. "U.S. Tactical Nuclear Weapons in Europe, 2011." Bulletin of the Atomic Scientists 67 (2011): 64-73.
Tian, Wang. U.S. Uses ‘Hedging’ Strategy to Deal with China’s Rise. People’s Daily, 2011.
Pepi, Stephanie. USAID launches the Albanian Cyber-Security Program., 2011.
On the use of Sigint by DISS In Annual Report . Committee on the Intelligence and Security Services, 2011.
Blanchet, Bruno. "Using Horn Clauses for Analyzing Security Protocols." In Formal Models and Techniques for Analyzing Security Protocols, 86-111. Amsterdam: IOS Press, 2011.
Averill, Bruce. "Using Public-Private Partnerships to Improve International Energy Infrastructure Security." (2011).
Brönnimann, Gabriel, Thomas Gartmann, Jennifer Giroux, Manuel Suter, and Myriam Dunn Cavelty. Using scenarios to assess risks examining trends in the public sector., 2011.
McGee, Joshua. US-Russia Diplomacy -The “Reset” of Relations in Cyberspace. Center for Strategic and International Studies Web Site, 2011.
Trilling, David. Uzbekistan’s Karimov Lashes Out at Putin’s Union. Eurasia Net.org, 2011.
VA Education Benefits: Actions Taken, but Outreach and Oversight Could Be Improved. Washington, D.C.: U.S. Government Accountability Office, 2011.
Ahmed, Ahmed Sayed, Mohammad Moallemi, Gabriel Wainer, and Samy Mahmoud. VCELL: a 3D real-time visual simulation in support of combat In SCSC '11 Proceedings of the 2011 Summer Computer Simulation Conference. Peter G Kropf ed., 2011.
Prade, Henri, and Agnès Rico. Vers une version possibiliste de la théorie des fonctions de croyance., 2011.

Pages