Biblio
Export 21404 results:
An Analytical Overview of Democratic Oversight and Governance of the Defence and Security Sector in Ukraine." In DCAF Working Papers., 2005.
"Analyzing Security Protocols with Secrecy Types and Logic Programs." Journal of the ACM 52, no. 1 (2005): 102-146.
"Annual Address to the Federal Assembly of the Russian Federation. Moscow: The Kremlin, 2005.
Applicability of the Additional Protocols to Computer Network Attack." In International Experts Conference on Computer Network Attack and the Applicability of International Humanitarian Law. Stockholm, 2005.
"Arabs in Romania, A Complete Radiography." Evenimentul Zilei (2005).
"Architecture for the integration of field and stationary information systems for emergency management In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2005.
Architectures in the Analysis of Requirements and Design of Simulation Systems." Information & Security: An International Journal 16 (2005): 104-114.
"Argument by Analogy." Argumentation 19, no. 1 (2005).
"Arms Expert Calls for START Verification Extension." Global Security Newswire (2005).
"The Art of Casual WiFi hacking., 2005.
The Art of Computer Virus Research and Defense . Addison Wesley Professional, 2005.
Arus Baru Islam Radikal; Transmisi Revivalisme Islam Timur Tengah ke Indonesia. Jakarta: Erlangga, 2005.
Asimmetrichnoe voevanie." Otechestvennye zapiski 5 (2005).
"Assessing and Managing Risk in Operations Planning." Military Journal (2005).
"Austria–A Base of Re-organization for Terrorists." Curentul (2005).
"The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications." In International Conference on Computer Aided Verification CAV 2005. Heidelberg: Springer, 2005.
"The Baku-Tbilisi-Ceyhan Pipeline: Oil Window to the West. Washington DC: Central Asia-Caucasus Institute and Silk Road Studies Program, 2005.
The Balkans in the New Millennium: In the Shadow of War and Peace. London: Routledge, 2005.
Barracks and Brothels: Peacekeeping and Human Trafficking in the Balkans. Washington, D.C.: CSIS, 2005.
Basic Histology Text & Atlas. McGraw-Hill Professional, 2005.
The Battle Against Phishing: Dynamic Security Skins. Symposium on Usable Privacy and Security (SOUPS), 2005.
Bayesian Hybrid Model-State Estimation Applied to Simultaneous Contact Formation Recognition and Geometrical Parameter Estimation ." The International Journal of Robotics Research (2005).
"