Biblio
Export 21441 results:
Armenian Security and U.S. Foreign Policy in the South Caucasus." Connections: The Quarterly Journal 3, no. 2 (2004): 15-32.
"The Art of Strategy and Force Planning." Strategy and Force Planning (2004): 17-33.
"As concerned the publications on 18.02.2004 in the media of data on the employee of Ukrainian Embassy in Germany. Press-center of the Security Service of Ukraine, 2004.
Assessing America’s War on Terror: Confronting Insurgency, Cementing Primacy." NBR Analysis 15, no. 4 (2004).
"Assessing the Credibility of the Aub Hafs al-Masri Brigades’ Threats. Inquiry & Analysis: The Middle East Media Research Institute, 2004.
An assessment of PRN prioritization in a failure modes effects and criticality analysis." Journal of the IEST 47 (2004): 51-56.
"Astana Offers Clumsy Explanations for Banning ‘Terrorist Organizations'." Eurasia Daily Monitor 1, no. 108 (2004).
"At First Sight: Persistent Relational Effects of Get-Acquainted Conversations." Journal of Social and Personal Relationships 21, no. 3 (2004): 361-379.
"At Least in Fighting Terrorism, Transatlantic Cooperation Is Working." Connections: The Quarterly Journal 3, no. 1 (2004): 15-17.
"Authentication and Integrity in Outsourced Databases." In 11th Annual Network and Distributed System Security Symposium –NDSS04. California, USA, 2004.
"Balancing Act, The Challenges and Benefits of Volunteers. The Urban Institute, 2004.
The Balkans after the 2004 Enlargement of NATO and the European Union:What Next?" Connections: The Quarterly Journal 3, no. 2 (2004): 115-121.
"Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computing 1, no. 1 (2004): 11-33.
"Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computin 1, no. 1 (2004): 11-33.
"Batching Schnorr Identification Scheme with Applications to Privacy- Preserving Authorization and Low-Band width Communication Devices." Advances in Cryptology – ASIACRYPT 2004, Lecture Notes in Computer Sciences 3329 (2004).
"The Battle of Ideas in the War on Terror: Essays on US Public Diplomacy in the Middle East. Washington, DC: Washington Institute for Near East Policy, 2004.
Behind the Curve: Globalization and International Terrorism." In Defeating Terrorism–Shaping the New Security Environment . New York: McGraw-Hill/Dushkin, 2004.
"Beirut Wants ‘Terrorism’ Defined. AlJazeera, 2004.
Belief function theory on the continuous space with an application to model based classification. Italy: IPMU 2004, 2004.
Benefits and Costs of Entering the Eurozone." Cato Journal 24 (2004): 89-106.
"Between Police and Military: The New Security Agenda and the Rise of Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
"Between the Police and Military: The New Security Agenda and the Rise of the Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
"Beyond Petersberg: Missions for the EU Military Forces." In EU Security and Defence Policy: The First Five Years (1999-2004), 82. Paris: EU Institute for Security Studies, 2004.
"Biometrics: A Grand Challenge." In Proceedings of the International Conference on Pattern Recognition, 935-942. Vol. 2., 2004.
"Biotechnology Research in an Age of Terrorism. Washington, DC: National Academies Press, 2004.