Biblio

Export 21372 results:
2004
Mednikarov, Boyan, and Peter Dereliev. "Structured Description of Naval Tasks." Information & Security: An International Journal 13 (2004): 25-34.
Konstantinova, Pavlina, Milen Nikolov, and Tzvetan Semerdjiev. "A Study of Clustering Applied to Multiple Target Tracking Algorithm." In International Conference on Computer Systems and Technologies - CompSysTech’2004., 2004.
Scott, Len, and Peter Jackson. "The Study of Intelligence in Theory and Practice." Intelligence & National Security 19, no. 2 (2004).
Shalamanov, Velizar, and Stoyan Avramov. Study of the operational performance of field modules for crisis management and planning for field demonstrations In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2004.
Summary of the Basic Projects for Modernization of the Bulgarian Armed Forces . Sofia: Ministry of Defense, 2004.
Summary of the Organized Crime Situation Report 2004. Focus on the Threat of Cyber-crime, Provisional Report. Strasbourg: Council of Europe, Octopus Program, 2004.
Chang, MuChiu. "Sun Tzu and sustainable competitive advantage." In 2004 IEEE International Engineering Management Conference (IEEE Cat. No.04CH37574) . Singapore, Singapore: IEEE, 2004.
Motwani, Mukesh, Mukesh C. Gadiya, Rakhi Motwani, and Frederick Harris. Survey of Image Denoising Techniques In Proceedings of GSPX., 2004.
Petit-Roze, Christelle, Abdouroihamane Anli, Emmanuelle Grislin- Le Strugeon, Mourad Abed, Guillaume Uster, and Christophe Kolski. "Système d'information transport personnalisée à base d'agents logiciels." Revue Génie Logiciel 70 (2004): 29-38.
Tzu, Sun. Sztuka wojny. Gliwice, 2004.
Picco, Giandomenico. Tactical and Strategic Terrorism . New York, NY: GDP Associates, 2004.
Tchamova, A., J. Dezert, Tz. Semerdjiev, and P. Konstanttinova. Target Tracking with Generalized Data Association based on the General DSm Rule of Combination In Conference Fusion. Sweden, 2004.
Kharchenko, Vyacheslav, Michael Yastrebenetsky, and Vladimir Sklyar. The Technique and the Experience of Expertise of Software for NPP Instrumentation and Control Systems In 7th International Conference on Probabilistic Safety Assessment and Management. Berlin, 2004.
Cilinskas, Kestutis. Teisės viršenybės principo įgyvendinimo problemos. International Human Rights Day, 2004.
Welch, Matt. "Temporary Doves." Reason Magazine (2004).
Weimann, Gabriel. "Terror on the Internet: The New Arena, The New Challenges." In International Studies Association (ISA) Annual Conference. Montreal, Quebec, Canada, 2004.
Busuncian, Tatiana. Terrorism and Organized Crime” report presented within the “NATO Defense against Terrorism Course. Oberammergau, Germany: the NATO School, 2004.
Zimmermann, Doron. "Terrorism Transformed: The “New Terrorism,” Impact Scalability, and the Dynamic of Reciprocal Threat Perception." Connections: The Quarterly Journal 3, no. 1 (2004): 19-39.
Gunaratna, Rohan. "The Terrorist Threat to the Continent." In Meeting of the Special Committee of NATO, Ministry of Foreign Affairs. Copenhagen, 2004.
Emery, N.E., R. S. Earl, and R. Buettner. "Terrorist Use of Information Operations." Journal of Information Warfare 3, no. 2 (2004).
Libbenga, Jan. "Terrorists Grow Fat on E-Mail Scams." The Register (2004).
Shevtsova, Liliya. "A test with Ukraine. Will Putin and the regime created by him pass it?" Novaya Gazeta (2004).
Smith, Greg B.. "They Eyed Subway Stations." New York Daily News (2004).
Gold, David. "Thinking Through Terrorism Some Economic Considerations in the U.S. War on Terrorism." Connections: The Quarterly Journal 3, no. 1 (2004): 1-14.
Berberich, Klaus, Michalis Vazirgiannis, and Gerhard Weikum. "Time-Aware Authority Ranking." Internet Mathematics 2, no. 3 (2004): 301-332.

Pages