Biblio

Export 21387 results:
2012
Kolegov, Ivaylo. Apple patent describes a great 3D camera., 2012.
Anifowose, Fatai Adesina, and Safiriyu Ibiyemi Eludiora. "Application of Artificial Intelligence in Network Intrusion Detection." World Applied Programming 2, no. 3 (2012): 158-166.
Subed, Jishnu. "Application of Information Technology in Disaster and Emergency Management." International Journal of Cyber Warfare and Terrorism (IJCWT) 2, no. 4 (2012).
Brezhnev, Eugene. "An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures." Information & Security: An International Journal 28, no. 2 (2012): 199-210.
Krasovska, Hanna, Olha Izmailova, and Kateryna Krasovska. "Approach to Construct an Information Basis for Decision-Making System for a Comprehensive Assessment of Innovative Technogenic Safety Projects in Construction." Shliakhy pidvyshchennia efektyvnosti budivnytstva v umovakh formuvannia rynkovykh vidnosyn: Zb. naukovykh prats 28 (2012): 222-229.
Ma’oz, Moshe. "The Arab Spring and the New Geo-Strategic Environment in the Middle East." Insight Turkey 14, no. 4 (2012).
Arab spring economies. Unfinished business. Vol. 4 February 2012. The Economist, 2012.
Noi, Aylin Ünver. "The Arab Spring, Its Effects on the Kurds, and the Approaches of Turkey, Iran, Syria, and Iraq on the Kurdish Issue." Middle East Review of International Affairs 16, no. 2 (2012).
Suponina, Elena. Arab Spring: The Season for Victory over the Islamists. Vol. 25 December 2012. Forbes, 2012.
Swift, Christopher. "Arc of Convergence: AQAP, Ansar al-Shari’a and the Struggle for Yemen." CTC Sentinel 5, no. 6 (2012): 1-6.
Ternier, Stefaan, Roland Klemke, Marco Kalz, Patricia van Ulzen, and Marcus Specht. "ARLearn: Augmented Reality Meets Augmented Virtuality." Journal of Universal Computer Science 18 (2012): 2143-64.
Armed Forces Reserve Act of the Republic of Bulgaria. State Gazette, no. 20, 2012.
Armenia’s Military Education Concept., 2012.
Giragosian, Richard. Armenian Military & Security Policy: Regaining a Strategic Balance. Regional Studies Center,, 2012.
Lamborn, G. L.. Arms of Little Value: The Challenge of Insurgency and Global Instability in the Twenty-First Century. Casemate, 2012.
Hiltz, Starr Roxanne, and Jose J. Gonzalez. "Assessing and Improving the Trustworthiness of Social Media for Emergency Management: A Literature Review." In Norwegian Information Security Conference NISK 2012. Bodø: University of Nordland, 2012.
Horak, Rudolf. "Assessment of the Regions (Municipalities) Safeness." The Science for Population Protection 6, no. 1 (2012).
Kalinov, Kalin. "The Asymmetric Nature of Terrorist Organisations and Its Impact on Maritime Security System Structure." In Piracy and Maritime Terrorism: Logistics, Strategies, Scenarios. IOS Press, 2012.
Whitman, Tobie, and Jacqueline O’Neill. Attention to gender increases security in operations; Examples from the North Atlantic Treaty Organization (NATO). Washington, D.C.: The Institute for Inclusive Security, 2012.
Giegerich, Bastian, and Alexandra Jonas. "Auf der Suche nach best practice? Die Entstehung nationaler Sicherheitsstrategien im internationalen Vergleich." Security and Peace 3, no. 30 (2012): 129-183.
On August 27–September 2, at least 50 Persons Fell Victim to Armed Conflict in Northern Caucasus. Caucasian Knot, 2012.
Learn, ATW. Author Archives: kelleycatt., 2012.
Chou, Gloria. "Autonomy in Xinjiang: Institutional Dilemmas and the Rise of Uighur Ethno-Nationalism." The Josef Korbel Journal of Advanced International Studies 4 (2012): 170.
D'Mello, Sidney, and Art Graesser. "AutoTutor and affective autotutor: Learning by talking with cognitively and emotionally intelligent computers that talk back." ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems 2, no. 4 (2012).
Weber, Keith. Azerbaijan and Turkmenistan Disputes and the Tragedy of the Commons. Rep’s Blog, Center for Strategic and International Studies, 2012.

Pages