Biblio

Export 21362 results:
2013
Gubanov, Dmitry, and Aleksandr Chkhartishvili. "Conceptual approach to the analysis of online social networks." Management of large systems 45 (2013): 222-236.
Feyyaz, Muhammad. "Conceptualizing Terrorism Trend Patterns in Pakistan – an Empirical Perspective." Perspectives on Terrorism 7, no. 1 (2013): 96.
Huang, Li-Chin, and Min-Shiang Hwang. "A Conference Key Distribution Scheme in Tree Hierarchies." International Journal of Network Security 15, no. 1 (2013): 59{64.
Taylor, Mark B.. Conflict Financing: What’s Wrong with War Economies?. The Norwegian Peacebuilding Resource Centre (NOREF), 2013.
Wilson, Kelce S.. "Conflicts among the Pillars of Information Assurance." IT Professional 15, no. 4 (2013): 44-49.
Cohen, Odeya. "The Conjoint Community Resiliency Assessment Measure as a Baseline for Profiling and Predicting Community Resilience for Emergencies." Technological Forecasting and Social Change 80, no. 9 (2013): 1732-1741.
Bayramov, Vugar. "Considering Accession to the Eurasia Economic Union: For Azerbaijan, Disadvantages Overweight Advantages." In Caucasus Analytical Digest, 14. Vol. 51–52., 2013.
Constitution of Slovenia. Official Gazette of the Republic of Slovenia Nos. 33/91-I, 42/97, 66/2000, 24/03, 69/04, 68/06, and 47/13, 2013.
Constitutional arrangements for the use of armed force of UK. UK Parliament, 2013.
Marazopoulos, Christos. Constructing the Western Balkans: Understanding the European Commission's Regional Approach from a Constructivist Perspective In Department of Politics, Languages and International Studies. Vol. Doctor of Philosophy. University of Bath, 2013.
Smirnov, Alexander, Alexey Kashevnik, Nikolay Shilov, and Nikolay Teslya. "Context-based access control model for smart space ." In 2013 5th International Conference on Cyber Conflict (CYCON 2013) . Tallinn, Estonia: IEEE , 2013.
Mabaso, Elias, and Siambabala B. Manyena. "Contingency planning in southern Africa: Events rather than processes?" Journal of Disaster Risk Studies 5, no. 1 (2013): article 95.
Merche, Jean-Dominique. Contre-terrorisme: le GIGN est en avance dans la guerre du temps. L’Opinion, 2013.
Denning, Tamara, Adam Lerner, Adam Shostack, and Tadayoshi Kohno. Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education. CCS'13, 2013.
Blease, Dennis, and Florian Qehaja. "The conundrum of local ownership in developing a security sector: the case of Kosovo." New Balkan Politics 14 (2013).
Convention on Cybercrime, Chart of Signatures and Ratifications. Council of Europe, 2013.
Osipian, Ararat L.. Corruption In Higher Education In Leadership and Policy Studies. Vol. Doctor Of Philosophy. Nashville, Tennessee: Vanderbilt University, 2013.
Seay, Edmond E.. Countdown to Chaos? Timelines and Implications of Procurement Decisions for NATO’s Dual-Capable Aircraft. Hamburg: British American Security Information Council (BASIC), 2013.
Foley, Frank. Countering Terrorism in Britain and France: Institutions, Norms and the Shadow of the Past. Kindle Edition. Cambridge: Cambridge University Press, 2013.
Bowley, Robin. Countering terrorism in the maritime domain: a contemporary evaluation of the international legal framework. University of Wollongong, 2013.
Bowley, Robin. Countering Terrorism In The Maritime Domain: A Contemporary Evaluation Of The International Legal Framework. University of Wollongong, 2013.
Banks, William C.. Counterinsurgency Law: New Directions in Asymmetric Warfare. Oxford University Press, 2013.
Hellenberg, Timo, and Pekka Visuri. Country Study: Estonia. ANVIL Project, 2013.
Hellenberg, Timo, and Pekka Visuri. Country Study: Lithuania. ANVIL Project, 2013.
Priest, Dana. "Covert Action in Colombia: US Intelligence, GPS Bomb Kits Help Latin American Nation Cripple Rebel Forces." Washington Post (2013).

Pages