Biblio
Export 21402 results:
Management of Critical Infrastructures Based on Technical Megastate." Information & Security: An International Journal 28, no. 1 (2012): 37-51.
"Managing Cyber and Information Risk." In 17th Annual Logistics Research Network Conference. Cranfield, UK, 2012.
"Managing Strategic Changes Through DEEP Reforms: A View from the Perspective of U.S.–Armenia “Smart Power” Cooperation." Connections: The Quarterly Journal 11, no. 4 (2012): 83-90.
"Maneuvering is the most valuable thing." Rossiskaya gazeta (2012).
"Map Building of Unknown Environment Based on Fuzzy Sensor Fusion of Ultrasonic Ranging Data In Advances in Autonomous Robotics. TAROS 2012. Lecture Notes in Computer Science. Vol. 7429. Berlin, Heidelberg: Springer, 2012.
Mapping Evolving Internal Roles of the Armed Forces. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2012.
Marco Conceptual del Control Parlamentario de la Seguridad Nacional." In Inteligencia y Seguridad. Revista de Análisis y Prospectiva, 12. Madrid: Plaza y Valdés Editores, 2012.
"Maturity Models 101: A Primer for Applying Maturity Models to Smart Grid Security, Resilience, and Interoperability In White paper. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2012.
McAfee Explains the Dubious Math behind Its ‘Unscientific’ $1 Trillion Data Loss Claim. Forbes, 2012.
An MDA-based Approach to Crisis and Emergency Management Modeling." International Journal on Advances in Intelligent Systems 5, no. 1 & 2 (2012): 89-100.
"The Measure of Security in Quantum Cryptography." In Cryptog¬raphy,” IEEE Global Telecommunications Conference - GLOBECOM (2012)., 2012.
"Measuring the Information Society 2012 . Geneva: International Telecommunications Union, 2012.
The Media and Counter-Insurgency: An Insight into the News Agenda-Setting." Journal of Communication and Culture 3, no. 2 (2012).
"Meeting Rising Expectations of Hopes for Peace in Post Peace Accord Northern Ireland: The Role of the Good Friday Agreement and the Implication for External Economic Aid." Journal of Ethnic Studies 69 (2012): 8-35.
"Meeting the Cyber Security Challenge. Geneva Centre for Security Policy, 2012.
Meeting with Israeli Prime Minister Benjamin Netanyahu. Vol. 25 June 2012. Official website of the President of Russia, 2012.
Meeting with participants of the “Seliger-2012” forum. Official website of the President of Russia, 2012.
Message from the President to the Federal Assembly. Vol. 12 December 2012. Official website of the President of Russia, 2012.
Message to King Muhammed VI of Morocco. Vol. 9 March 2012. Official website of the President of Russia, 2012.
A method for securing online community service: A study of selected Western Australian councils. Edith Cowan University, 2012.
A Method of Evaluating Assurance Requirements." Information & Security: An International Journal 28, no. 1 (2012): 108-120.
"A Methodology for Developing C2 Complex Systems Simulator." Life Science Journal 9, no. 4 (2012).
"Methodology for Planning Wartime Defence Capabilities. Sofia: Centre for Security and Defence Management, Institute of Information and Communication Technologies, 2012.
Methodology for Planning Wartime Defence Capabilities. Sofia: Centre for Security and Defence Management, IICT-BAS, 2012.
Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle." Information & Security: An International Journal 28, no. 2 (2012): 296-312.
"