Biblio

Export 21362 results:
2014
Calzarossa, M.C., and L. Massari. Analysis of header usage patterns of HTTP request messages In 16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems., 2014.
Kharchenko, Vyacheslav, and Yuriy P. Kondratenko. "Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S." Technical News − in Ukrainian 39-40 (2014): 15-19.
Siddiqui, Abdul Hameed, Mansoor Ahsan, Shair Afgan Rind, and Attaullah Memon. "Analysis of varying control inputs for a fixed wing unmanned aerial vehicle." In 17th IEEE International Multi Topic Conference 2014 . Karachi, Pakistan, 2014.
Turgut, Erhan, Salih Ergün, and Abdülkadir Öz. "Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups." International Journal of Electronics and Communication Engineering 8, no. 3 (2014).
Darczewska, Jolanta. The Anatomy of Russian Information Warfare. The Crimean Operation, a Case Study In OSW Point of View series, Warsaw: Center for Eastern Studies. Vol. 42., 2014.
Angry Birds Web Page., 2014.
Annual National Plan 2014 for implementation of the National Programme for Disaster Protection 2014-2018., 2014.
Annual Report on the Implementation of the Swiss–Latvian Cooperation Programme in Latvia April 2013 – March 2014., 2014.
Ansar Beit al-Maqdis Pledges Allegiance to the Islamic State. SITE Intelligence, 2014.
Anti-corruption Policies Against State Capture. Sofia: Center for the Study of Democracy, 2014.
Li, Xingan. Application of Data Mining Methods in the Study of Crime Based on International Data Sources In School of Information Sciences. Vol. Academic dissertation. Tampere, Finland: University of Tampere, 2014.
Li, Xingan, and Martti Juhola. "Application of the self-organising map to visualisation of and exploration into historical development of criminal phenomena in the USA, 1960–2007 ." International Journal of Society Systems Science 6, no. 2 (2014).
Ivanova, Yoana. Applying Multimedia Technologies in The Information Systems of The Security and Defense Field In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Rist, L., A. Felton, and M. Nyström. "Applying Resilience Thinking to Production Ecosystems." Ecosphere 5, no. 6 (2014): 73.
AQAP and AQIM Release Joint Statement Condemning U.S.-led Alliance in Iraq and Syria, Urge Warring Factions to Unite. SITE Intelligence, 2014.
"Armenia Allowed in the Euroasian Union (Armeniiu vpustili v Evraziiskii soiuz)." Novaia gazeta (2014).
Russell, Stuart, and Peter Norvig. Artificial Intelligence: A Modern Approach. Third edition. Harlow, Essex, UK: Pearson Education, 2014.
Lister, Charles. "Assessing Syria’s Jihad." In Middle Eastern Security, the US Pivot and the Rise of ISIS, 73. New York: Routledge, 2014.
Jali, Mohd Zalisham, Shaharudin Ismail, and Zul Hilmi Abdullah. "An Assessment on the Password Practices Among Students." Journal of Theoretical and Applied Information Technology 66, no. 3 (2014).
Assessment Report. Criminal Justice Capacities on Cybercrime and Electronic Evidence in the Eastern Partnership Region. Council of Europe, 2014.
Khaindrava, Ivlian. "Asymetry: On the issue of Georgian-Russian Relations (Asimmetriya: k voprosu o gruzinsko-rossiiskikh vzaimootnosheniyakh)." In Russian-Georgian Relations: In the Search of New Ways (Rossiisko-gruzinskie otnosheniya: v poiskakh novykh putei razvitiya), 21. Moscow: Russian Council on International Affairs, International Center on Conflict and Negotiations, 2014.
Jordan, Jenna. "Attacking the Leader, Missing the Mark: Why Terrorist Groups Survive Decapitation Strikes." International Security 38, no. 4 (2014): 7-38.
Vallacher, Robin R., Peter T. Coleman, Andrzej Nowak, Lan Bui Wrzosinska, Larry Liebovitch, Katharina Kugler, and Andrea Bartoli. Attracted to Conflict: Dynamic Foundations of Destructive Social Relations. 2013th ed. New York: Springer, 2014.
Audit Report # 0300002413 on “Prevention and Response to Forest Fires” for the period 1 January 2011 – 31 December 2013. Bulgarian National Audit Office, 2014.
Pradhan, Mahendra Kumar, and Nitin Jain. "Authentication & Verification of Secure Parking Using OCR Technique." Advance in Electronic and Electric Engineering 4, no. 2 (2014): 127-134.

Pages