Biblio

Export 21393 results:
2010
Haensch, Stephanie. "Distinct Clones of Yersinia pestis Caused the Black Death." PLoS Pathogens 6 10 (2010).
Klump, Ray, and Matthew Kwiatkowski. "Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid." In Critical Infrastructure Protection, 13-126. IV ed. Berlin: Springer, 2010.
Dmitry Medvedev answers Russian journalists’ questions. Vol. 16 April 2010. Official website of the President of Russia, 2010.
Kubert, Joe. Dong Xoai, Vietnam 1965. New York DC: Comics Library, 2010.
Draft Report on an EU Strategy for the South Caucasus. European Parliament Committee on Foreign Affairs, 2010.
Tagarev, Todor. Driving forces of security services’ reform in the countries of Eastern Europe In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Babor, Thomas F., Jonathan P. Caulkins, Griffith Edwards, Benedikt Fischer, David R. Foxcroft, Keith Humphreys, Isidore S. Obot, Jürgen Rehm, and Peter Reuter. Drug Policy and the Public Good. Oxford: Oxford University Press, 2010.
Makochekanwa, Albert, and Marko Kwaramba. Dwindling access to basic services in Zimbabwe., 2010.
Vatsa, Mayank, Richa Singh, Afzel Noore, and Arun Ross. "On the Dynamic Selection of Biometric Fusion Algorithms." IEEE Transactions on Information Forensics and Security 5, no. 3 (2010).
Saradzhyan, Simon. "The Dynamics of Russia’s Response to the Piracy Threat." Connections: The Quarterly Journal 9, no. 3 (2010): 21-46.
Dempsey, Judy. "Eastern Europe Unites over Energy." International Herald Tribune (2010): 15.
Dimitrov, Dimitar. Economic Analysis “Cost/Benefit” in Defense and Security. Sofia: Stopanstvo, 2010.
Bahney, Benjamin, Howard J. Shatz, Carroll Ganier, Renny McPherson, and Barbara Sude. An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq. Santa Monica, CA: RAND, 2010.
Melese, F.. Economic Evaluation of Alternatives., 2010.
Donnet, LTC. EEAW: Embryonic Component of Future European Air Combat?., 2010.
Tagarev, Todor. Effective Resource Management in a Good Governance Context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Gaddam, Sunil V. K., and Manohar Lal. "Efficient Cancellable Biometric Key Generation Scheme for Cryptography." International Journal of Network Security 11, no. 2 (2010): 61-69.
Nikooghadam, Morteza, Farshad Safaei, and Ali Zakerolhosseini. "An efficient key management scheme for mobile agents in distributed networks." In 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010) . Solan, India , 2010.
Olivola, Christopher Y., and Alexander Todorov. "Elected in 100 milliseconds: Appearance-Based Trait Inferences and Voting." Journal of Nonverbal Behavior 34, no. 2 (2010): 83-110.
Georgiev, Venelin. "Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects." Information & Security: An International Journal 25 (2010): 99-112.
Marmor, Yariv. Emergency-Departments Simulation in Support of Service-Engineering: Staffing, Design, and Real-Time Tracking In Senate of the Technion. Vol. Doctor of Philosophy. Haifa: Israel Institute of Technology Shvat, 2010.
Jacoby, Tim, and Eric James. "Emerging patterns in the reconstruction of conflict-affected countries." Disasters 34, no. Supplement s1 (2010): S1-S14.
Arvidsson, Claes. "En värld – två alternative." Svenska Dagbladet (2010).
Tagarev, Todor. "Enabling Factors and Effects of Corruption in the Defense Sector." Connections: The Quarterly Journal 9, no. 3 (2010): 77-88.
Stoianov, Nikolai Todorov, and Veselin Tsenov Tselkov. E-Net Models of a Software System for E-Mail Security In Computer Science, Cryptography and Security., 2010.

Pages