Biblio

Export 21387 results:
2012
S., Weichert, and Elter A.. "Terrorismus 2.0. Über die Propaganda der Tat im digitalen Zeitalter." In Die Welt nach 9/11. Sonderheft der Zeitschrift für Außen- und Sicherheitspolitik. Wiesbaden: VS Verlag für Sozialwissenschaften, 2012.
Ogun, M.N.. "Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes." Journal of Applied Security Research 7, no. 2 (2012): 203-217.
Ibraheem, Basem, Abeer Hamdy, and Nevien Darwish. "Textual Signs Reading for Indoor Semantic Map Construction." International Journal of Computer Applications (0975 – 8887) 53, no. 10 (2012).
Thematic scenario portfolio (Work Packages 3-7) with reference scenarios for “Security Research 2035” . FOCUS Deliverable 8.1, 2012.
Šenovský, Michail, Milan Oravec, and Pavel Šenovský. Theory of Crisis Management. Ostrava: SPBI, 2012.
Third ECIS Disaster Risk Reduction Community of Practice Workshop In Ulcinj Capacity Assessment Report. ECIS, 2012.
Strachan-Morris, David. "Threat and Risk: What Is the Difference and Why Does It Matter?" Intelligence and National Security 27, no. 2 (2012): 172-186.
Salin, Pavel. "Three paths for Russia in Asia." Russia in global politics (2012).
"Tihipko poobitsiav vyrishyty viyskovi problem." Ekonomichna Pravda (2012).
Warrick, Joby. "Tiny Azerbaijan Unleashes Pop-Power Against Iran’s Mullahs." Washington Post (2012).
Top 15 Most Popular Social Networking Sites., 2012.
Toward the Great Ocean, or the New Globalization of Russia In Analytical report. Valdai Discussion Club, 2012.
Kandjani, H., P. Bernus, L.M. Camarinha-Matos, H. Afsarmanesh, and L. Xu. "Towards a Cybernetic Theory and Reference Model of Self-designing Complex Collaborative Networks." In Collaborative Net-works in the Internet of Services, 485-493. Heidelberg: Springer, 2012.
Van Rompuy, Herman. Towards a genuine Economic and Monetary Union - Report by President of the European Council. Brussels, 2012.
Hallams, Ellen, and Benjamin Schreer. "Towards a ‘post-American’ alliance? NATO burden-sharing after Libya." International Affairs 88, no. 2 (2012): 313-327.
Gezgin, Tayfun, Christoph Etzien, Stefan Henkler, and Achim Rettberg. Towards a Rigorous Modeling Formalism for Systems of Systems In 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops., 2012.
Mollah, Muhammad Baqer, and Sikder Sunbeam Islam. Towards IEEE 802.22 Based SCADA System for Future Distributed System In 2012 International Conference on Informatics, Electronics & Vision (ICIEV). Dhaka, Bangladesh, 2012.
Juvan, Jelena, and Vladimir Prebilic. "Towards Stronger EU Military and Defence Capabilities?" Journal on European Perspective of the Western Balkans 4, no. 4 (2012): 129.
Lagadec, Erwan. Transatlantic Relations in the 21 Century: Europe, America and the Rise of the Rest. New York: Routledge, 2012.
Trends in Telecommunication Reform 2012: Smart Regulation for a Broadband World. Geneva: International Telecommunication Union, 2012.
Muller, Tilo, Felix C. Freiling, and Andreas Dewald. TRESOR Runs Encryption Securely Outside RAM. Department of Computer Science University of Erlangen, Laboratory for Dependable Distributed Systems University of Mannheim, 2012.
Blass, Erik-Oliver, and William Robertson. TRESOR-HUNT: Attacking CPU-Bound Encryptio. Northeastern University, 2012.
Baranovsky, Vladimir. Trialog in the Asia-Pacific Region. Vol. 17 December 2012. Russian Council on Foreign Affairs, 2012.
Zhang, Yongjin, and Barry Buzan. "The Tributary System as International Society in Theory and Practice." Chinese Journal of International Politics 5, no. 1 (2012): 3-36.
Trenin, Dmitriy. True Friends? How Russia and China Perceive One Another. Мoscow: Center for European Reforms, Moscow Carnegie Center, 2012.

Pages