Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21414 results:
RTF
EndNote XML
2005
Brouwers, L.
,
K. Hansson
,
H. Verhagen
, and
M. Boman
.
Agent Models of Catastrophic Events, Stockholm: Dept of Computer and Systems Sciences, Stockholm University and the Royal Inst of Technology
., 2005.
Google Scholar
RTF
EndNote XML
Smirnov, Alexander
,
Nikolai Chilov
,
Tatiana Levashova
,
Andrew Krizhanovsky
, and
Michael Pashkin
.
"
Agent-Based Intelligent Support to Coalition Operations
."
Information & Security: An International Journal
16 (2005): 41-61.
DOI
Google Scholar
RTF
EndNote XML
Borum, Randy
, and
Michael Gelles
.
Al-Qaeda's Operational Evolution: Behavioral and Organizational Perspectives
In
Mental Health Law & Policy Faculty Publications
. University of South Florida, 2005.
Google Scholar
RTF
EndNote XML
Nichiporuk, Brian
.
Alternative Futures and Army Force Planning
. Santa Monica, CA: RAND Arroyo Center, 2005.
Google Scholar
RTF
EndNote XML
Nichiporuk, Brian
.
Alternative Futures and Army Force Planning: Implications for the Future Force Era
. Santa Monica, CA: RAND Corporation, Arroyo Center, 2005.
Google Scholar
RTF
EndNote XML
Radosavljević, Zvonko
.
"
Analiza primene IMM algoritma za praćenje manevrišućih ciljeva
."
Vojnotehnički glasnik
3-4 (2005).
Google Scholar
RTF
EndNote XML
Shalamanov, Velizar
, and
Zlatogor Minchev
.
Analysis and adaptation of NC3A and NATO member countries’ models for analysis, estimation, decision-making, planning and management in emergency situations and support to the computer assisted staff exercises at national and regional level (SEE and the
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2005.
Google Scholar
RTF
EndNote XML
Radosavljević, Zvonko
.
"
Analysis of IMM algorithm for maneuvering target tracking
."
Vojnotehnički glasnik
53, no. 3-4 (2005).
Google Scholar
RTF
EndNote XML
Ramsbotham, Oliver
.
"
The Analysis of Protracted Social Conflict: A Tribute to Edward Azar
."
Review of International Studies
31, no. 1 (2005): 109-126.
Google Scholar
RTF
EndNote XML
Badikova, Katerina
.
"
An Analysis of the Legal Framework Governing Prosecution of Traffickers and Victim Protection in Central Asian Countries
."
Connections: The Quarterly Journal
4, no. 4 (2005): 29-38.
DOI
Google Scholar
RTF
EndNote XML
Analysis on Narcotics Situation in the Republic of Moldova
., 2005.
Google Scholar
RTF
EndNote XML
Polyakov, Leonid
.
"
An Analytical Overview of Democratic Oversight and Governance of the Defence and Security Sector in Ukraine
." In
DCAF Working Papers
., 2005.
Google Scholar
RTF
EndNote XML
Abadi, Martin
, and
Bruno Blanchet
.
"
Analyzing Security Protocols with Secrecy Types and Logic Programs
."
Journal of the ACM
52, no. 1 (2005): 102-146.
DOI
Google Scholar
RTF
EndNote XML
The ancient Corps of the Royal Carabinieri
., 2005.
Google Scholar
RTF
EndNote XML
Putin, Vladimir
.
Annual Address to the Federal Assembly of the Russian Federation
. Moscow: The Kremlin, 2005.
Google Scholar
RTF
EndNote XML
Dormann, Knut
.
"
Applicability of the Additional Protocols to Computer Network Attack
." In
International Experts Conference on Computer Network Attack and the Applicability of International Humanitarian Law
. Stockholm, 2005.
Google Scholar
RTF
EndNote XML
Laslau, Andi
.
"
Arabs in Romania, A Complete Radiography
."
Evenimentul Zilei
(2005).
Google Scholar
RTF
EndNote XML
Shalamanov, Velizar
, and
Stoyan Avramov
.
Architecture for the integration of field and stationary information systems for emergency management
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2005.
Google Scholar
RTF
EndNote XML
Kirov, Georgi
, and
Valentin Stoyanov
.
"
Architectures in the Analysis of Requirements and Design of Simulation Systems
."
Information & Security: An International Journal
16 (2005): 104-114.
DOI
Google Scholar
RTF
EndNote XML
Juthe, A.
.
"
Argument by Analogy
."
Argumentation
19, no. 1 (2005).
Google Scholar
RTF
EndNote XML
Armenia’s Commitments under Individual Partnership Action Plan with NATO, 2005
., 2005.
Google Scholar
RTF
EndNote XML
Armenia’s commitments under Individual Partnership Action Plan with NATO
., 2005.
Google Scholar
RTF
EndNote XML
Francis, David
.
"
Arms Expert Calls for START Verification Extension
."
Global Security Newswire
(2005).
Google Scholar
RTF
EndNote XML
Martin, Jeremy
.
The Art of Casual WiFi hacking
., 2005.
Google Scholar
RTF
EndNote XML
Peter, Szor
.
The Art of Computer Virus Research and Defense
. Addison Wesley Professional, 2005.
Google Scholar
RTF
EndNote XML
Pages
« first
‹ previous
…
576
577
578
579
580
581
582
583
584
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance