Biblio

Export 21385 results:
2010
Vatsa, Mayank, Richa Singh, Afzel Noore, and Arun Ross. "On the Dynamic Selection of Biometric Fusion Algorithms." IEEE Transactions on Information Forensics and Security 5, no. 3 (2010).
Saradzhyan, Simon. "The Dynamics of Russia’s Response to the Piracy Threat." Connections: The Quarterly Journal 9, no. 3 (2010): 21-46.
Dempsey, Judy. "Eastern Europe Unites over Energy." International Herald Tribune (2010): 15.
Dimitrov, Dimitar. Economic Analysis “Cost/Benefit” in Defense and Security. Sofia: Stopanstvo, 2010.
Bahney, Benjamin, Howard J. Shatz, Carroll Ganier, Renny McPherson, and Barbara Sude. An Economic Analysis of the Financial Records of al-Qa‘ida in Iraq. Santa Monica, CA: RAND, 2010.
Melese, F.. Economic Evaluation of Alternatives., 2010.
Donnet, LTC. EEAW: Embryonic Component of Future European Air Combat?., 2010.
Tagarev, Todor. Effective Resource Management in a Good Governance Context In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Gaddam, Sunil V. K., and Manohar Lal. "Efficient Cancellable Biometric Key Generation Scheme for Cryptography." International Journal of Network Security 11, no. 2 (2010): 61-69.
Nikooghadam, Morteza, Farshad Safaei, and Ali Zakerolhosseini. "An efficient key management scheme for mobile agents in distributed networks." In 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010) . Solan, India , 2010.
Olivola, Christopher Y., and Alexander Todorov. "Elected in 100 milliseconds: Appearance-Based Trait Inferences and Voting." Journal of Nonverbal Behavior 34, no. 2 (2010): 83-110.
Georgiev, Venelin. "Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects." Information & Security: An International Journal 25 (2010): 99-112.
Marmor, Yariv. Emergency-Departments Simulation in Support of Service-Engineering: Staffing, Design, and Real-Time Tracking In Senate of the Technion. Vol. Doctor of Philosophy. Haifa: Israel Institute of Technology Shvat, 2010.
Jacoby, Tim, and Eric James. "Emerging patterns in the reconstruction of conflict-affected countries." Disasters 34, no. Supplement s1 (2010): S1-S14.
Arvidsson, Claes. "En värld – två alternative." Svenska Dagbladet (2010).
Tagarev, Todor. "Enabling Factors and Effects of Corruption in the Defense Sector." Connections: The Quarterly Journal 9, no. 3 (2010): 77-88.
Stoianov, Nikolai Todorov, and Veselin Tsenov Tselkov. E-Net Models of a Software System for E-Mail Security In Computer Science, Cryptography and Security., 2010.
Stoianov, Nikolai Todorov, and Veselin Tsenov Tselkov. E-Net Models of a Software System for Web Pages Security In Computer Science, Cryptography and Security., 2010.
Goerzig, Carolin. Engaging Hamas: Rethinking the Quartet Principles. European Institute for Security Studies, 2010.
"Engaging Oceania." Naval War College Review (2010).
Chang, Ming-Hsin, I-Te Chen, and Ming-Te Chen. "Enhance ECDSA to Identity-based Proxy Signature Scheme." Journal of Information Assurance and Security (JIAS) 5 (2010).
Pohyl, Viktoriya. "The Enhanced Method and Informational Technology to Support the Func-tional Safety of the Aircrafts Onboard Information-Control Systems on Their Design Stage." Science and Technology of the Air Force 2 (2010).
Pohyl, Viktoriya. "The Enhanced Method of the Functional Safety of the Aircraft Onboard Information-Control Systems Analysis and Estimation." Systems of Arms and Military Equipment 2 (2010): 136-42.
Spencer, Chris, and Vladimir Stemkovski. Enhanced public safety and intelligence: smarter analytics. IBM Emerging Technologies, 2010.
Church, Kristi K.. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support through Interdisciplinary Education. Monterey, California: Naval Postgraduate School, 2010.

Pages