Biblio

Export 21404 results:
2014
Anti-corruption Policies Against State Capture. Sofia: Center for the Study of Democracy, 2014.
Li, Xingan. Application of Data Mining Methods in the Study of Crime Based on International Data Sources In School of Information Sciences. Vol. Academic dissertation. Tampere, Finland: University of Tampere, 2014.
Li, Xingan, and Martti Juhola. "Application of the self-organising map to visualisation of and exploration into historical development of criminal phenomena in the USA, 1960–2007 ." International Journal of Society Systems Science 6, no. 2 (2014).
Ivanova, Yoana. Applying Multimedia Technologies in The Information Systems of The Security and Defense Field In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Rist, L., A. Felton, and M. Nyström. "Applying Resilience Thinking to Production Ecosystems." Ecosphere 5, no. 6 (2014): 73.
AQAP and AQIM Release Joint Statement Condemning U.S.-led Alliance in Iraq and Syria, Urge Warring Factions to Unite. SITE Intelligence, 2014.
"Armenia Allowed in the Euroasian Union (Armeniiu vpustili v Evraziiskii soiuz)." Novaia gazeta (2014).
Russell, Stuart, and Peter Norvig. Artificial Intelligence: A Modern Approach. Third edition. Harlow, Essex, UK: Pearson Education, 2014.
Lister, Charles. "Assessing Syria’s Jihad." In Middle Eastern Security, the US Pivot and the Rise of ISIS, 73. New York: Routledge, 2014.
Jali, Mohd Zalisham, Shaharudin Ismail, and Zul Hilmi Abdullah. "An Assessment on the Password Practices Among Students." Journal of Theoretical and Applied Information Technology 66, no. 3 (2014).
Assessment Report. Criminal Justice Capacities on Cybercrime and Electronic Evidence in the Eastern Partnership Region. Council of Europe, 2014.
Khaindrava, Ivlian. "Asymetry: On the issue of Georgian-Russian Relations (Asimmetriya: k voprosu o gruzinsko-rossiiskikh vzaimootnosheniyakh)." In Russian-Georgian Relations: In the Search of New Ways (Rossiisko-gruzinskie otnosheniya: v poiskakh novykh putei razvitiya), 21. Moscow: Russian Council on International Affairs, International Center on Conflict and Negotiations, 2014.
Jordan, Jenna. "Attacking the Leader, Missing the Mark: Why Terrorist Groups Survive Decapitation Strikes." International Security 38, no. 4 (2014): 7-38.
Vallacher, Robin R., Peter T. Coleman, Andrzej Nowak, Lan Bui Wrzosinska, Larry Liebovitch, Katharina Kugler, and Andrea Bartoli. Attracted to Conflict: Dynamic Foundations of Destructive Social Relations. 2013th ed. New York: Springer, 2014.
Audit Report # 0300002413 on “Prevention and Response to Forest Fires” for the period 1 January 2011 – 31 December 2013. Bulgarian National Audit Office, 2014.
Pradhan, Mahendra Kumar, and Nitin Jain. "Authentication & Verification of Secure Parking Using OCR Technique." Advance in Electronic and Electric Engineering 4, no. 2 (2014): 127-134.
Liou, Cheng-Yuan, Wei-Chen Cheng, Jiun-Wei Liou, and Daw-Ran Liou. "Autoencoder for words." Neurocomputing 139, no. 2 (2014): 84-96.
Kharchenko, Vyacheslav, Yuriy Ponochovnyi, and Artem Boyarchuk. "Availability Assessment of Information and Control Systems with Online Software Update and Verification." Information and Communication Technologies in Education, Research, And Industrial Applications 469 (2014): 300-324.
Jarosiewicz, Aleksandra. Azerbejdżan – narastający problem dla Zachodu [Azerbaijan – A Growing Problem for the West] In Komentarze. Warsaw: Ośrodek Studiów Wschodnich [Centre for Eastern Studies], 2014.
Sherwell, Philip. "Babar Ahmad sentenced to 12.5 years for supporting Islamic terrorists." The Telegraph (2014).
Gur, Mehmet. The Balancing Role Of Turkey For The Influence Of China In Central Asia. Vol. Dissertation. Monterey, California: Naval Postgraduate School, 2014.
On the basic principles to ensure cyber security of Ukraine In Law of Ukraine, Draft. Accessed., 2014.
"The Beach Town That’s a Favorite ISIS Recruiting Spot." Cold Turkey, last modified (2014).
Wright, Hannah. Beijing, 1325 and Beyond: Taking Women, Peace and Security Back to its Roots. Saferworld, 2014.
Schmitt, Michael N.. "Below the Threshold’ Cyber Operations: The Countermeasures Response Option and International Law." Virginia Journal of International Law (2014): 697-732.

Pages