Biblio
Export 21402 results:
Post Communist Insecurity." In Problems of Post-Communism., 2000.
"Post Modern Militaries., 2000.
Post-Cold War Trends in International Relations. Zagreb: Faculty of Political Science, 2000.
Practical Application of Functional and Relational Methods for the Specification and Verification of Safety Critical Software In Algebraic Methodology and Software Technology., 2000.
Practical Techniques for Searches on Encrypted Data." In IEEE Symposium on Security and Privacy. Berkeley, CA, USA, 2000.
""Priming the Pump." Economist (2000).
The Probabilistic Assessment of Survivability and Safety of an Unmanned Control Systems with Multistage Degradation by Use of QD-diagrams In 5th International Conference on Probabilistic Safety Assessment and Management. Osaka, Japan, 2000.
Procedures for treating Common Cause Failures in Safety and Reliability Studies. Analytical Background and Techniques. NUREG/CR-4780 ERPI NP-5613, 2000.
Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization In 5th ACM Workshop on Role-Based Access Control (RBAC’00). Berlin, Germany, 2000.
Project Management – Part 3: Guide to the Management of Business Related Project Risk. British Standards Institution, 2000.
The Promise of Freedom." Financial Times (2000).
"Promotion of Transparency and Democratic Decision Making in the Formation of SEE States Military Budgets, Stability Pact for South Eastern Europe Seminar . Sofia, Bulgaria, 2000.
Proplant: Multi-agent system for production planning." International Journal of Applied Artificial Intelligence (2000).
"A Proposal for an International Convention on Cyber-Crime and Terrorism . Stanford: Center for International Security and Cooperation, Stanford University, 2000.
A Proposed Methodology for Studying the Function and Effectiveness of Party and Candidate Web Sites." Social Science Computer Review 18, no. 3 (2000): 305-306.
"Protocols for Secure Remote Database Access with Approximate Matching." In 7th ACM Conference on Computer and Communications Security, the 1st Workshop on Security and Privacy in E-Commerce. Athens, 2000.
"Provisions for Succession in the Caspian Region." In Succession and Long-term Stability in the Caspian Region . Cambridge, MA: BCSIA, 2000.
"Psychological Science Can Improve Diagnostic Decisions." Psychological Science in the Public Interest 1, no. 1 (2000): 1-26.
"The Psychology of Evil." Eye on Psi Chi 5 (2000).
"The Psychology of Terrorism: An Agenda for the 21st Century." Political Psychology (2000).
"A Quarter Century of Declining Confidence: Trouble in Advanced Democracies?" Journal of Democracy 11 (2000): 5-25.
"Realism and International Relations. Cambridge: Cambridge University Press, 2000.
Rebalancing NATO for a Strong Future In Defence Week Conference. Brussels, Belgium, 2000.
Redefining Security: Women Challenge U.S. Military Policy and Practice in East Asia." Berkeley Women’s Law Journal 15 (2000): 229-271.
""Reengineering Defence: the Role of C4." Information & Security: An International Journal 5 (2000): 5-8.