Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 21423 results:
RTF
EndNote XML
2000
Lawford, Mark
,
Jeff McDougall
,
Peter Froebel
, and
Greg Moum
.
Practical Application of Functional and Relational Methods for the Specification and Verification of Safety Critical Software
(link is external)
In
Algebraic Methodology and Software Technology
., 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Song, Dawn Xiaodong
,
David Wagner
, and
Adrian Perrig
.
"
Practical Techniques for Searches on Encrypted Data
." In
IEEE Symposium on Security and Privacy
. Berkeley, CA, USA, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
"
Priming the Pump
."
Economist
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Kharchenko, Vyacheslav
.
The Probabilistic Assessment of Survivability and Safety of an Unmanned Control Systems with Multistage Degradation by Use of QD-diagrams
(link is external)
In
5th International Conference on Probabilistic Safety Assessment and Management
. Osaka, Japan, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Mosleh, A.
.
Procedures for treating Common Cause Failures in Safety and Reliability Studies. Analytical Background and Techniques
(link is external)
. NUREG/CR-4780 ERPI NP-5613, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Roeckle, Haio
,
Gerhard Schimpf
, and
Rupert Weidinger
.
Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization
(link is external)
In
5th ACM Workshop on Role-Based Access Control (RBAC’00)
. Berlin, Germany, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Project Management – Part 3: Guide to the Management of Business Related Project Risk
(link is external)
. British Standards Institution, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Rubin, James P.
.
"
The Promise of Freedom
."
Financial Times
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Promotion of Transparency and Democratic Decision Making in the Formation of SEE States Military Budgets, Stability Pact for South Eastern Europe Seminar
(link is external)
. Sofia, Bulgaria, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Marik, V.
,
J. Lazansky
,
O. Stepankova
, and
M. Pechoucek
.
"
Proplant: Multi-agent system for production planning
(link is external)
."
International Journal of Applied Artificial Intelligence
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Sofaer, Abraham D.
, and
Seymour D. Goodman
.
A Proposal for an International Convention on Cyber-Crime and Terrorism
(link is external)
. Stanford: Center for International Security and Cooperation, Stanford University, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Gibson, Rachel
, and
Stephen Ward
.
"
A Proposed Methodology for Studying the Function and Effectiveness of Party and Candidate Web Sites
(link is external)
."
Social Science Computer Review
18, no. 3 (2000): 305-306.
Google Scholar
(link is external)
RTF
EndNote XML
Du, Wenliang
, and
Mikhail J. Atallah
.
"
Protocols for Secure Remote Database Access with Approximate Matching
." In
7th ACM Conference on Computer and Communications Security, the 1st Workshop on Security and Privacy in E-Commerce
. Athens, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
M., Olcott
.
"
Provisions for Succession in the Caspian Region
(link is external)
." In
Succession and Long-term Stability in the Caspian Region
. Cambridge, MA: BCSIA, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Swets, John A.
,
John Monahan
, and
Robyn M. Dawes
.
"
Psychological Science Can Improve Diagnostic Decisions
(link is external)
."
Psychological Science in the Public Interest
1, no. 1 (2000): 1-26.
Google Scholar
(link is external)
RTF
EndNote XML
Zimbardo, Philip G.
.
"
The Psychology of Evil
."
Eye on Psi Chi
5 (2000).
Google Scholar
(link is external)
RTF
EndNote XML
Crenshaw, Martha
.
"
The Psychology of Terrorism: An Agenda for the 21st Century
(link is external)
."
Political Psychology
(2000).
Google Scholar
(link is external)
RTF
EndNote XML
Pharr, Susan J.
,
Robert D. Putnam
, and
Russel J. Dalton
.
"
A Quarter Century of Declining Confidence: Trouble in Advanced Democracies?
"
Journal of Democracy
11 (2000): 5-25.
Google Scholar
(link is external)
RTF
EndNote XML
Donnelly, Jack
.
Realism and International Relations
. Cambridge: Cambridge University Press, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Robertson, Lord George
.
Rebalancing NATO for a Strong Future
(link is external)
In
Defence Week Conference
. Brussels, Belgium, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Kirk, Gwyn
, and
Carolyn Bowen Francis
.
"
Redefining Security: Women Challenge U.S. Military Policy and Practice in East Asia
(link is external)
."
Berkeley Women’s Law Journal
15 (2000): 229-271.
Google Scholar
(link is external)
RTF
EndNote XML
"
Reengineering Defence: the Role of C4
."
Information & Security: An International Journal
5 (2000): 5-8.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
Planzer, Neil
.
"
Regional Airspace Initiatives in Eastern Europe
(link is external)
."
ATC Quarterly
2 (2000): 11-16.
Google Scholar
(link is external)
RTF
EndNote XML
Regional Security Issues in Central Asia
In
meeting report, Carnegie Endowment for International Peace, Vol. 2, No. 8
., 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Zhorobekov, Zh.
.
Regionalnaya politika Kyrgyzstana v tranzitnyi period (Kyrgyzstan Religious Politics in Transition)
. Bishkek, 2000.
Google Scholar
(link is external)
RTF
EndNote XML
Pages
« first
‹ previous
…
731
732
733
734
735
736
737
738
739
…
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top