Biblio
Export 21401 results:
The Concreteness of Asymmetric War: Fragments of Experience." Connections: The Quarterly Journal 11, no. 3 (2012): 21-39.
"CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: TrustCom , 2012.
Conducting Online Surveys . Thousand Oaks, CA: Sage Publications, 2012.
The Conflict Against Al Qaeda and its Affiliates: How Will It End? In paper presented at the Oxford Union. Oxford, UK: Oxford University, 2012.
Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power. New York: Crown Publishers, 2012.
Confronting the Realities of Corruption in Nigeria." In Corruption and Nigeria’s Underdevelopment, 46-67. Lagos: Serenity Press, 2012.
"Consolidated Report. Organization for Security and Cooperation in Europe, Forum for Security Co-operation, 2012.
‘A constable marine’: De strijd tegen piraterij als case voor het veranderend veiligheidsdenken, Master in de criminologische wetenschappen. Vol. Master in de criminologische wetenschappe. Universiteit Gent, 2012.
Contesting Democracy and Pluralism: the Pro-Kurdish Political Parties in Turkey." In The Kurdish National Movement in Turkey: From Protest to Resistance, 154. New York: Routledge, 2012.
"Context Scenarios and Alternative Future EU Roles as a Global Security Actor In It4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
The control function in the draft laws on national security management, the intelligence, the military intelligence, and the national service for protection In CSDM Views. Sofia: Centre for Security and defence Management, 2012.
Control Orders in 2011: Final Report of The Independent Reviewer on The Prevention of Terrorism Act 2005. London: The Stationery Office, 2012.
Controlled Delegation of Signature in Workflow Systems." In 20th Telecommunications Forum (TELFOR). Belgrade, Serbia , 2012.
"Coordinated Data-injection Attack and Detection in the Smart Grid: A Detailed Look at Enriching Detection Solutions." IEEE Signal Processing Magazine 29, no. 5 (2012): 106-115.
"Coordinating for Contingencies: Taking Stock of Post-9-11 Homeland Security Reforms." Journal of Contingencies and Crisis Management 20, no. 2 (2012): 86.
"Counternarcotics Assistance: U.S. Agencies Have Allotted Billions in Andean Countries, but DOD Should Improve Its Reporting of Results. Washington, D.C.: GAO, 2012.
Counter-terrorism networks in the European Union: maintaining democratic legitimacy after 9/11., 2012.
The Criminal Procedural Law of Republic of Srpska. Official Gazette of Republic of Srpska, 53/12, 2012.
Crisis Management System in Poland." The Science for Population Protection 4, no. 2 (2012).
"Critical Infrastructure and Supply Chain Protection: EU possible development paths and strategies In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2012.
Critical questions for Big Data." Journal Information, Communication & Society 15, no. 5 (2012): 662-679.
"Cross-sectoral Scanning of Critical Infrastructures: From Functional Differences to Policy-relevant Similarities." Journal of Homeland Security and Emergency Management 9, no. 1 (2012).
"The Crushing of Eastern Europe 1944–1956. London: Allen Lane, 2012.