Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 5 results:
  • RTF
  • EndNote XML
Filters: Author is William Wallace  [Clear All Filters]
2018
Bahulkar, Ashwin, Orkun N. Baycik, Thomas Sharkey, Yeming Shen, Boleslaw Szymanski, and William Wallace. "Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks." In IEEE International Symposium on Technologies for Homeland Security (HST). Woburn, MA, USA , 2018.
  • Google Scholar
  • RTF
  • EndNote XML
2004
Giegerich, Bastain, and William Wallace. "Not Such a Soft Power: the External Deployment of European Forces." Survival 46, no. 2 (2004).
  • Google Scholar
  • RTF
  • EndNote XML
2001
Wallace, William. "Europe, the Necessary Partner." Foreign Affairs 80, no. 3 (2001): 16-34; 29-30.
  • Google Scholar
  • RTF
  • EndNote XML
Foster, Anthony, and William Wallace. "What is NATO for." Survival 43, no. 4 (2001): 107-122.
  • Google Scholar
  • RTF
  • EndNote XML
2000
Wallace, Helen, and William Wallace. Policy Making in the EU. 4th ed. Oxford: Oxford University Press, 2000.
  • Google Scholar
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Cybersecurity Threats and Challenges. International Best Practices

read more >>

Conference on Cybersecurity and Resilience

read more >>

Study on 2035 scenarios on defence resource allocation

read more >>

Contribution to the Inter-Parliamentary Conference on CFSP and CSDP

read more >>

Vol. 29 of I&S on Scenario-based Security Foresight is available online

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -