Biblio

Export 21362 results:
2014
Jovanović, M., and J. Burbiel. "The Evolving Concept of Security: A Critical Evaluation Across Four Dimensions." In Future Security Conference 2014. Berlin, 2014.
"EW Aircraft: Survive for a ‘Thick Veil’ of Interference (in Russian)." Army News (2014).
Tenet, George J., Porter J. Goss, Michael V. Hayden, John E. McLaughlin, Albert M. Calland, and Stephen R. Kappes. Ex-CIA Directors: Interrogations Saved Lives. Wall Street Journal, 2014.
Charbonneau, Louis. Exclusive: Russia Threatened Countries ahead of the U.N. Vote on Ukraine: Envoys. Reuters, 2014.
Mutlu, Mehmet Emin. Experience API ile Yaşam Günlüğüne Dayalı Öğrenme Deneyimlerinin Kaydedilmesi In inet-tr’14 - XIX. Türkiye'de İnternet Konferansı Bildirileri. İzmir: Yaşar Üniversitesi, 2014.
Vogel, Kathleen M.. "Expert Knowledge in Intelligence Assessments: Bird Flu and Bioterrorism." International Security 38 (2014): 39-71.
Holmes, James R.. "Exposing China’s Provocations." The Diplomat (2014).
ExpressCard, definition. Wikipedia.org, 2014.
K. Naik, Seena, G. A. Ramachandra, and M. V. Bramhan Reddy. "An Extended Security Framework for E-Government." International Journal of Advanced Research in Computer Science 5, no. 1 (2014): 152-154.
Gorenburg, Dmitry. External Support for Central Asian Military and Security Forces In Working Paper. Stockholm: Stockholm International Peace Research Institute and Open Society Foundations, 2014.
Lyubimov, Ivan. Extractive Institutions, Closed Borders and Economic Development., 2014.
Cao, Chen, Yanlin Weng, Shun Zhou, Yiying Tong, and Kun Zhou. "FaceWarehouse: A 3D Facial Expression Database for Visual Computing." IEEE Transactions on Visualization and Computer Graphics 20, no. 3 (2014): 413-425.
Otis, John. The FARC and Colombia’s Illegal Drug Trade. Wilson Center Latin American Program, 2014.
Federal Information Security Modernization Act., 2014.
Nita, M.-C., F. Pop, M. Mocanu, and V. Cristea. "FIM-SIM: Fault Injection Module for CloudSim Based on Statistical Distributions." Journal of Telecommunications and Information Technology 4 (2014): 14-23 .
Balzarotti, D.. Final Report on Threats on the Future Internet: A Research Outlook. SysSec Consortium, 2014.
Financial and Economic Data Relating to NATO Defence In COMMUNIQUE., 2014.
Brantly, Aaron. "Financing Terror Bit by Bit." CTC Sentinel 7, no. 10 (2014): 1-5.
First Expert Meeting of the GCTF “Foreign Terrorist Fighters” Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing. Global Counterterrorism Forum, 2014.
First SEENSA Thematic Work Group (TWG) Meeting on Cyber Defence. Belgrade: Directorate for Security of Classified Information of the Republic of Macedonia , 2014.
Fiscal Years 2014–2018 Strategic Plan. US Department of Homeland Security, 2014.
Tso, Chen-Dong. "Five. Digital Media and the Transformation of Politics in Taiwan." In New Challenges for Maturing Democracies in Korea and Taiwan. Stanford University Press , 2014.
Wilson, Andrew. Five things the West can learn from the Ukraine Crisis. Quartz, 2014.
Dorsey, James. Football and Militant Islam Intersect in Incidents across the Middle East. Daily News Egypt, 2014.
Telelim, Vasyl M., D.P. Muzychenko, and Yu.V. Punda. "Force Planning for the ‘Hybrid War’ Scenarios." Science and Defense 20, no. 3 (2014): 30-35.

Pages