Biblio

Export 21377 results:
2012
Kaveh-Yazdy, F., M. Zare-Mirakabad, and F. Xia. A novel neighbor selection approach for KNN: a physiological status prediction case study In 1st International Workshop on Context Discovery and Data Mining (ContextDD '12). New York, NY, USA: ACM, 2012.
Bamford, James. The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say). Wired.com, 2012.
Babwin, Don. NYPD Surveillance Jeopardizes Access to Muslim Communities, Say Mayors and Cops Across Country. Huffington Post, 2012.
Besenyő, János. A nyugat-szaharai válság egy magyar békefenntartó szemével [The Western Saharan crisis through the eyes of a peacekeeper]. Pécs: Publikon Publishers, 2012.
Sanger, David E.. "Obama Order Sped Up Wave of Cyberattacks Against Iran." The New York Times (2012).
Lynch, Marc. Obama Recognizes Need to Embrace Democratic Change in Arab World. U.S. News & World Report, 2012.
Goldberg, Jeffrey. "Obama to Iran and Israel: ‘As President of the United States, I Don’t Bluff’." The Atlantic Monthly (2012).
Occupied Territories’ Term Inapplicable to Abkhazia, South Ossetia – Foreign Ministry. Vol. 9 June 2012. Interfax, 2012.
OI Policy Compendium Note on the Provision of Aid by Foreign Military Forces. Oxfam, 2012.
Opening speech by H.E. Mr. Daniel Cristian Ciobanu, Ambassador of Romania to Azerbaijan, International workshop ensuring energy security in the Caspian basin and NATO’s role in protecting critical energy infrastructure. Baku, 2012.
Hess, Julius. The Operational Relevance of Culture and the Effectiveness of Cross-Cultural Competence. Empirical Findings from a Panel Study among German Soldiers of the 22nd ISAF contingent In multimedia presentation at the CIMIC Center of Excellence. Enschede, 2012.
"Operationalization of culture in population-centric operations – the American experience." In Balancing domestic and international security requirements, International Society of Military Sciences. Kingston: Royal Military College of Canada, 2012.
Alipiev, Ilian. Opportunities to improve the draft laws on national security management, the intelligence, the military intelligence, and the national service for protection In CSDM Views. Sofia: Centre for Security and Defence Management, 2012.
Dovgan, Oleksandr, and Igor Chernuhin. "Organizational and legal bases of critical infrastructure protection system construction against cyberattacks." In Information Security of the Person, Society and State., 2012.
Gusberti, Tomoe D. H., and Márcia E. S. Echeveste. "An Organizational Capability-Based Performance Measurement Model for Technology Conversion Process." JCC: The Business and Economics Research Journal 5, no. 2 (2012): 225-242.
Černe, Matej, Marko Jaklic, Miha Skerlavaj, Arzu Ülgen Aydinlik, and Dilek Dönmez Polat. "Organizational learning culture and innovativeness in Turkish firms." Journal of Management and Organization 18, no. 2 (2012): 193-219.
Picarelli, John. "Osama bin Corleone? Vito the Jackal? Framing Threat Convergence through an Examination of Transnational Organized Crime and International Terrorism." Terrorism and Political Violence 24, no. 2 (2012): 180-98.
Carr, Jeffrey. OSCE’s Cyber Security Confidence Building Measures Revealed by Anonymous. Digital Dao, 2012.
Reid-Martinez, Kathaleen. "Overcoming the Challenge of Legacy Learning Methods." Connections: The Quarterly Journal 11, no. 4 (2012): 43-51.
Procházková, Dana. "Overview of Fine Exact Methods of Safety Engineering." Information & Security: An International Journal 28, no. 2 (2012): 167-178.
Dimitrov, Vladimir. "An Overview of the Department of Defense Architecture Framework (DoDAF)." Proceedings of the Sixth International Conference “Information Systems & Grid Technologies” (ISGT’2012), (2012).
Stahl, Frederic, and Ivan Jordanov. "An overview of the use of neural networks for data mining tasks." WIREs Data Mining and Knowledge Discovery 2, no. 3 (2012): 193-208.
Prasanna, S., and Srinivasa Rao. "An Overview of Wireless Sensor Networks Applications and Security." International Journal of Soft Computing and Engineering 2, no. 2 (2012): 538-540.
Overview – United States Department of Defense Fiscal Year 2013 Budget Request. Washington, D.C.: U.S. Department of Defense, 2012.
Tohidi, Faranak. Ownership Authentication by Digital Image Watermarking Based on Block Truncation Coding In Advanced Informatics School. Vol. Master of Computer Science (Information Security). Universiti Teknologi Malaysia, 2012.

Pages