Biblio
Export 21402 results:
Combating Terrorism and Its Implications for Intelligence." In Combating Terrorism and Its Implications for the Security Sector, 129-166. Stockholm: Swedish National Defence College, 2005.
"Combating Terrorism: The Challenge of Measuring Effectiveness. Washington, D.C.: Congressional Research Service, 2005.
Combating the Proliferation of Small Arms and Light Weapons in West Africa: Handbook for the Training of Armed and Security Forces. United Nations Institute for Disarmament Research, 2005.
Comments by Gen. Jones at NATO Parliamentary Assembly meetings. Copenhagen, 2005.
Commercial Bank’s Credit Risk Optimization." Teoriya optimalnykh reshenij 4 (2005): 120-126.
"Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions." Information & Security: An International Journal 16 (2005): 119-127.
"Committee’s website., 2005.
Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA) In 43rd Annual ACM Southeast Conference ACMSE ’05 . Vol. 2. Kennesaw, Georgia, 2005, 2005.
A Comparative Analysis of Cybersecurity Initiatives Worldwide." In WSIS Thematic Meeting on Cybersecurity. Geneva, 2005.
"Comparative study of information fusion methods for sonar images classification In The Eighth International Conference on Information Fusion. Philadelphia, USA, 2005.
On Composing Web Services for Coalition Operations." Information & Security: An International Journal 16 (2005): 79-92.
"The Comprehensive Approach: Joint Discussion Note 4/05. British Ministry of Defence, 2005.
Comprehensive strategy to eliminate future sexual exploitation and abuse in United Nations peacekeeping operations. United Nations General Assembly, 2005.
A Comprehensive Strategy to Eliminate Future Sexual Exploitation and Abuse in United Nations Peacekeeping Operations. UN General Assembly, 2005.
Computer Worms: Past, Present, and Future CISSP. Carolina University, 2005.
Concept Development and Experimentation: Academic Support to Security Sector Transformation In SMi NATO Enlargement Conference. Sofia, Bulgaria, 2005.
Conditions for Securitization of International Terrorism in Central Asia." Connections: The Quarterly Journal 4, no. 1 (2005): 131-142.
"Conflicten in de voormalige Sovjetunie In Opleiding Europese Studies. Amsterdam: Universiteit van Amsterdam, 2005.
Conflicten in de voormalige Sovjetunie: Een vergelijking tussen Transdnestrië en Abchazië In Opleiding Europese Studies. Universiteit van Amsterdam, 2005.
Connectivism: A Learning Theory for the Digital Age." International Journal of Instructional Technology and Distance Learning 2, no. 1 (2005).
"A Contrast Maximization Based Technique for 2D ISAR Autofocusing." IEE Proceeding on Radar Sonar and Navigation 152, no. 4 (2005): 253-262.
"A Convenient Method for Securely Managing Passwords In Proc. of 14th ACM International World Wide Web Conference. Chiba, Japan, 2005.
Convergence of agent reputation with Alpha-Beta filtering vs. a fuzzy system." In Computational Intelligence for Modelling, Control and Automation, International Conference on (2005). Vienna, Austria, 2005.
"