Biblio

Export 21377 results:
2013
He, Xiaofan, Ratnasingham Tharmarasa, Thia Kirubarajan, and Michel Pelletier. "Modified Murty's Algorithm for Diverse Multitarget Top Hypothesis Extraction." IEEE Transactions on Aerospace and Electronic Systems 49, no. 1 (2013).
Weisman, Jonathan. "Momentum builds against NSA surveillance." New York Times (2013).
Money Laundering and Terrorist Financing through Trade in Diamonds. Paris: FATF, 2013.
Renaud, Karen, and Wendy Goucher. "Monkey See – Money Take Photo: The Risk of Mobile Information Leakage." International Journal of Cyber Warfare and Terrorism 3, no. 4 3, no. 4 (2013).
Krcic, Esad. Montenegrin Aluminum Plant’s Woes Cast Geopolitical Shadow. Radio Free Europe, 2013.
Zouitni, Hammad. The Moroccan Sahara Issue from the Independence of Morocco to the Present Day. Centre Marocain Interdisciplinaire des Études Stratégiques et Internationales, 2013.
El-Rashidi, Sarah. Morsi’s Failures in Sinai: A Cautionary Tale. EgyptSource blog, on the Atlantic Council website, 2013.
"Moscow Demands Extradition of the Detained Terrorist from Georgia." Georgia Times (2013).
Fedorchenko, Andrey. The Motherland of the Arab Spring and the Process of Islamicization. MGIMO University, 2013.
Lawson, Sean. "Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 168-189. IGI Global, 2013.
Nuriyev, Elkhan. "Motives and Incentives for Engagement – the Russian Perspective of a Eurasian Union." In Building Confidence in the South Caucasus: Strengthening the EU’s and NATO’s Soft Security Initiatives, 59-68. Vienna: National Defense Academy, 2013.
Landon-Murray, Michael. "Moving U.S. Academic Intelligence Education Forward: A Literature Inventory and Agenda." The International Journal of Intelligence and Counter Intelligence 26, no. 4 (2013).
Landon-Murray, Michael. "Moving U.S. Academic Intelligence Education Forward: A Literature Inventory and Agenda." International Journal of Intelligence and CounterIntelligence 26, no. 4 (2013).
Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic In Computer Networks Communications in Computer and Information Science, Proceedings of the 20th International Conference on Computer Networks CN 2013. Vol. 370. Lwówek Śląski, Poland, 2013.
Krawczak, Maciej. Multilayer Neural Networks: A Generalized Net Perspective. Springer International Publishing, 2013.
Nenova, Stefka. Multimedia Systems. Lectures., 2013.
Shao-hua, Jiang, and Tang Wen-sheng. "A Multi-source Image Fusion Framework Supporting Parameters Optimization." Computer Engineering 39, no. 10 (2013).
McChrystal, Stanley. My Share of the Task: a Memoir. New York: Penguin, 2013.
Anzalone, Christopher. "The Nairobi Attack and Al-Shabab’s Media Strategy." CTC Sentinel 6, no. 10 (2013): 2.
Wu, King-Chuen. "Nanotechnology in the Regulation of Stem Cell Behavior." Science and Technology of Advanced Materials 14 (2013).
Commission, European. Nanotechnology: The Invisible Giant Tackling Europe’s Future Challenges. Luxembourg: Publication Office of the European Union, 2013.
Cawley, Marguerite. Narcos Exchanging Arms for Protection from Paraguay's EPP: Officials. InSightCrime, 2013.
Hir, Joseph. Nasarawa Killings: How Police Insiders Tipped-off Cultists. allAfrica.com, 2013.
National Cyber Security Strategy and 2013-2014 Action Plan. Republic of Turkey Ministry of Transport, Maritime Affairs and Communications, 2013.
National Coordinator for Security and Counterterrorism. National Cyber Security Strategy of Netherland., 2013.

Pages