Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2003
Thoumi, Francisco
.
"
Illegal Drugs in Colombia: From Illegal Economic Boom to Social Crisis
(link is external)
."
Annals of the American Academy of Political and Social Sciences
(2003): 108.
Google Scholar
(link is external)
RTF
EndNote XML
Sanna, Andrea
, and
Claudio Fornaro
.
"
IMoViS: A System for Mobile Visualization of Intrusion Detection Data
."
Information & Security: An International Journal
12, no. 2 (2003): 235-249.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Brownlie, Ian
.
Implied Recognition
(link is external)
In
Principles of Public International Law
. 6th ed. New York: Oxford University Press, 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Shalamanov, Velizar
.
"
Importance of a Knowledge-Based, Network-Centric Approach in Strengthening Transatlantic Links with New NATO Members in South Eastern Europe
."
Connections: The Quarterly Journal
2, no. 3 (2003): 65-75.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Daugman, John G.
.
"
The Importance of Being Random: Statistical Principles of Iris Recognition
(link is external)
."
Pattern Recognition
36, no. 2 (2003): 279-291.
Google Scholar
(link is external)
RTF
EndNote XML
Yao, Gang
,
Guilin Wang
, and
Yong Wang
.
An Improved Identification Scheme
In
Progress in Computer Science and Applied Logic
., 2003.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Improved Operational Testing and Evaluation: Better Measurement and Test Design for the Interim Brigade Combat Team with Stryker Vehicles
In
Phase I Report
. Washington, DC: National Research Council, The National Academies Press, 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Jaffe, Greg
.
"
In Massive Shift, U.S. is Planning to Cut Size of Military in Germany
."
Wall Street Journal
(2003).
Google Scholar
(link is external)
RTF
EndNote XML
Bortin, Meg
.
"
In war’s wake, hostility and mistrust
."
International Herald Tribune
(2003): 1, 6.
Google Scholar
(link is external)
RTF
EndNote XML
Mann, Michael
.
Incoherent Empire
. London: Verso, 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Marwah, Ved
.
"
India’s Internal Security Challenges
."
Strategic Analysis
27, no. 4 (2003): 503-515.
Google Scholar
(link is external)
RTF
EndNote XML
Information and Communication Security Services for e-Government
(link is external)
. National Information and Communication Security Taskforce (NICST), 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Deb, Budhaditya
,
Sudeept Bhatnagar
, and
Badri Nath
.
Information Assurance in Sensor Networks
In
2nd ACM International Conference on Wireless Sensor Networks and Applications WSNA’03
. San Diego, CA, 2003.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Salerno, John
,
Michael Hinman
,
Doug Boulware
, and
Paul Bello
.
Information Fusion for Situational Awareness
(link is external)
In
6th International Conference on Information Fusion
. Queensland, Australia, 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Umar, Amjad
.
Information Security and Auditing in the Digital Age. A Practical and Managerial Perspective
. NGE Solutions, 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Pavlov, Georgi
.
"
INFORMATION SECURITY POLICY OF THE FIRM BUSINESS TRANSACTIONS
."
Trakia Journal of Sciences
1, no. 4 (2003).
Google Scholar
(link is external)
RTF
EndNote XML
Moulin, Pierre
, and
Joseph O’sullivan
.
"
Information-theoretic Analysis of Information Hiding
."
IEEE Transactions on Information Theory
49, no. 3 (2003).
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Informative note for the National Migration Department of the Republic of Moldova on “Trafficking in Human Beings
(link is external)
. National Migration Department of the Republic of Moldova , 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Medjahed, Brahim
,
Abdelmounaam Rezgui
,
Athman Bouguettaya
, and
Mourad Ouzzani
.
"
Infrastructure for e-Government Web Services
(link is external)
."
IEEE Internet Computing
7, no. 1 (2003): 58-65.
Google Scholar
(link is external)
RTF
EndNote XML
Narli, Nilufer
.
"
Initiatives for Transparency-Building in Turkey: International, Regional and Domestic Factors
."
Information & Security: An International Journal
11 (2003): 34-54.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Kutz, Martin
.
"
Innere Führung – Leadership and Civic Education in the German Armed Forces
."
Connections: The Quarterly Journal
2, no. 3 (2003): 109-124.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Shalamanov, Velizar
.
"
Integrated Defense Management Model in the Context of the Strategic Defense Review
(link is external)
."
Security Focus Newsletter
1, no. 2 (2003).
Google Scholar
(link is external)
RTF
EndNote XML
Ispirski, Dimiter
.
Integrated Surveillance and Control System for the Bulgarian Navy
(link is external)
In
The Naval Sovereignty Operations Center - When and How, AFCEA
. Varna, 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Avramov, Stoyan
.
"
Integrating COTS Technologies into a Scalable Mobile Emergency Command Post
."
Information & Security: An International Journal
10 (2003): 87-96.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Euzenat, Jérôme
, and
Petko Valtchev
.
An Integrative Proximity Measure for Ontology Alignment
(link is external)
In
First International Workshop on Semantic Information Integration, Second International Semantic Web Conference (ISWC-03)
. Sanibel Island, 2003.
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
649
650
651
652
653
654
655
656
657
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top