Biblio
Export 21404 results:
Austrian Cyber Security Strategy., 2013.
Autocracies and Terrorism: Conditioning Effects of Authoritarian Regime Type on Terrorist Attacks." American Journal of Political Science 57, no. 4 (2013): 941-55.
"Ava 500 e noviat robot za videosatrudnichestvo na iRobot i Cisco TelePresence. Computerworld, 2013.
Aviation Security Research Roadmap In COPRA (FP7-SEC-2011-261651) EU research project., 2013.
Azerbaijan Never Ruled Out Military Settlement of Karabakh Conflict. News from Azerbaijan, 2013.
"Azerbaijan Sharply Increases Military Spending." Atlantic Council (2013).
Back to the Future? Pre-Soviet History and Political Thought in the Putin Era." Post-Soviet Politics: Politics, Foreign Policy and Strategic Competition (2013).
"Balancing Act: National Security and Civil Liberties in Post-9/11 Era. Pew Research Center Fact Tank, 2013.
Ballistic Missile Defense in Poland: Did the Costs Outweigh the Benefits?" Connections: The Quarterly Journal 12, no. 2 (2013): 95-102.
"Baltic Military Cooperative Projects: A Record of Success." In Apprenticeship, Partnership, Membership: Twenty Years of Defence Development in the Baltic States, 242. Tallin: International Centre for Defence Studies, 2013.
"Başbakanlik Osmanli Arşivi’ndeki Bazi Fonlar ve El Dokumaciliği İle Alakali Belgelere Dair." TURAN: Stratejik Arastirmalar Merkezi Dergisi 5, no. 17 (2013): 1-10.
""Base Agreement Will Boost Russia-Tajikistan Relations." The Oxford Analytica Daily Brief (2013).
On the basic principles to ensure cybersecurity of Ukraine In Law of Ukraine., 2013.
A Battlefield of Meanings: The Struggle for Identity in the UN Debates on a Definition of International Terrorism." Terrorism and Political Violence 25, no. 2 (2013): 183-184.
"Between Two Cultures: From the Military Culture to University Culture. Conclusions on the Organisation for Police Officers’ Initial Training." Revista Academiei Fortelor Terestre 4, no. 72 (2013): 374-382.
"Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats." Journal of Information Technology & Politics 10, no. 1 (2013).
"Beyond 'the soldier and the state'-the theoretical framework of elite civil-military relations. London: London School of Economics and Political Science, 2013.
Big Data. MSIS Wiki, 2013.
Big Data Business to Kojin Jyoho Hogo [Big Data Business and Protection of Personal Data]." Asahi Judiciary (2013).
"Big Data Hosei no Kokusai Hikaku [Comparison of Legal Framework of Big Data]. KDDI Research Institute, 2013.
Bilateral Trade Between Xinjiang and Kazakhstan: Challenges or Opportunities?. China Policy Institute Blog, 2013.
Biometric Template Security Using Code Base Cryptosystem." Information & Security: An International Journal 26, no. 2 (2013): 47-57.
"BMZ Strategy Paper – An Overview of the Role of ICT in German Development Cooperation In Schlüsseltechnologien für eine nachhaltige Entwicklung. Informations- und Kommunikationstechnologien (IKT), 2013.
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy." In The Dangerous Landscape, 191-209., 2013.
"Boston Bomb Clues Surface." The Wall Street Journal (2013).
"