Biblio

Export 21402 results:
2013
Rademaker, Michel. "Governance on Intelligence: Issues that Play a Role." Information & Security: An International Journal 30, no. 1 (2013): 29-33.
Kharchenko, Vyacheslav, Anatoliy Gorbenko, Vladimir Sklyar, and Chris Phillips. "Green computing and communications in critical application domains: Challenges and solutions." In The International Conference on Digital Technologies 2013. Zilina, Slovakia , 2013.
Zeneli, Valbona. "Growth and the Future of Southeast Europe." Turkish Policy Quarterly 2 (2013): 145-55.
Hömig, Dieter. Grundgesetz für die Bundesrepublik Deutschland–Taschenkommentar. 7th ed., 2013.
Tagarev, Todor, Assya Davidova, and Anton Lazarov. Guidance on Developing Bulgaria’s Defence Policy (in Bulgarian) In CSDM Views. Sofia: Centre for Security and Defence Management, 2013.
Braithwaite, J., D. Watson, R. Jones, and M. A. Rowe. Guide for Analysing Electrodermal Activity & Skin Conductance Responses for Psychological Experiments In Technical Report. Birmingham, UK: Selective Attention & Awareness Laboratory Behavioural Brain Sciences Centre, University of Birmingham, 2013.
Gulf Nations Announce Joint Military Command. Atlantic Council, 2013.
Basu, Eric. "Hacking Insulin Pumps and Other Medical Devices." Forbes (2013).
Roulo, Claudette. Hagel Meets with Troops on Fort Bragg, Discussed Budget. U.S. Department of Defense Website, 2013.
Çiftçi, Hasan. Her Yönüyle Siber Savaş. Ankara: TÜBİTAK, 2013.
Aamer, Fathy, and Seham Ebrahim. "Hierarchal Variable Switching Sets of Interacting Multiple Model for Tracking Maneuvering Targets in Sensor Network." IJCSI International Journal of Computer Science Issues 10, no. 1 (2013).
Calderón, Rocio, Juan Navas-Cortés, Carlos Lucena, and Pablo Zarco-Tejada. "Highresolution Airborne Hyperspectral and Thermal Imagery for Early Detection of Verticilliumwilt of Olive Using Fluorescence, Temperature and Narrow-band Spectral Indices." Remote Sensing of Environment 139 (2013): 231-245.
High-tech software solutions from ESRI Bulgaria., 2013.
History of military intelligence – after the year 1990. Military Intelligence, 2013.
Çelik, Turgay, Göktuğ F. Gökdoğan, and Karahan Öztürk. "An HLA-based tactical environment application framework ." The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 10, no. 3 (2013): 217-233.
HM Government Emergency Response and Recovery. Non Statutory Guidance Accompanying the Civil Contingencies Act 2004. London: Civil Contingencies Secretariat. , 2013.
Moghadam, Assaf. "How Al Qaeda Innovates." Security Studies 22, no. 3 (2013): 466-97.
Hochwald, Thorsten. "How Do Social Media Affect Intra-State Conflicts other than War?" Connections: The Quarterly Journal 12, no. 3 (2013): 9-37.
Abbas, Hassan. How Drones Create More Terrorists. The Atlantic, 2013.
Plumer, Brad. "How Long Before Fracking Spreads to Europe? A Decade, at Least." The Washington Post (2013).
Greenwald, Glenn. "How NSA can see ‘nearly everything you do online’." Guardian (2013): 1-2.
Lukyanov, Fedor. How Russia Can Profit from Confrontation between the US and China. Vol. 19 February 2013. Forbes, 2013.
Ratchev, Valeri. How to develop an effective, efficient and democratic defence institution - the lessons we are learning., 2013.
Lefèvre, Eric, and Zied Elouedi. "How to preserve the conflict as an alarm in the combination of belief functions?" Decision Support Systems 56 (2013): 326-333.
Gartenstein-Ross, Daveed, and Kelsey D. Atherton. "How we killed privacy – in 4 easy steps." Foreign Policy (2013).

Pages