Biblio
Export 21401 results:
The structure of payment systems and modeling their performance based on system analysis." Electronic modeling 6 (2010): 97-109.
"A Structured Approach to Identifying European Critical Infrastructures." International Journal of Critical Infrastructures 6, no. 3 (2010).
"Study on the vulnerability of road transport network based on Flow Interdiction Model. Beijing: Beijing Normal University, 2010.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important." Economist (2010).
On sufficiency of the consistency level of group ordinal estimates." Journal of Automation and Information Sciences 42, no. 8 (2010): 42-47.
"Surveillance." In The Routledge Handbook of New Security Studies. London: Routledge, 2010.
"A Survey of Human-Sensing: Methods for Detecting Presence, Count, Location, Track, and Identity." ACM Computing Surveys 5 54, no. 1 (2010): 59.
"SySSec Project Web Page., 2010.
The tabloid terrorist: The predicative construction of new terrorism in the media. New York: Palgrave Macmillan, 2010.
Taming Change with Portfolio Management: Unify Your Organization, Sharpen Your Strategy and Create Measurable Value . Austin, TX: Greenleaf Book Group Press, 2010.
Tangled Triangle of Russia, China and the U.S." The Moscow Times (2010).
"Technical Evaluation Report In Analytical Support to Defence Transformation. Paris: NATO RTA, 2010.
Technical regulation in construction. Analytical review of world experience. Chicago: SNIP, 2010.
Technology Insertion and Management: Options for the Canadian Forces In Technical memorandum., 2010.
Teoretychni osnovy modeljuvannja procesiv napadu na informaciju metodamy teorij dyferencialnyh igor ta dyferencialnyh peretvoren. Zhytomyr: Ruta, 2010.
Terroisme: pourquoi Alliance Base a fermé ȧ Paris. Rue 89, L’Obs, 2010.
Testing as a Service over Cloud In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Nanjing, China, 2010.
Theory and Practice of Modern Islamic Finance: The Case Analysis from Australia. Universal-Publishers, 2010.
Threat of Extremism &Terrorist Syndicate beyond FATA." Journal of Political Studies 1, no. 2 (2010): 19-49.
"Threats and Challenges in Social Networks. A European Glance and Alliance Perspective in the Context of the New Strategic Concept In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Time for a Human Approach. Zurich: ISN, 2010.
TK_02_60 Project Web Page., 2010.
Toward an integrated system between cloud computing and smartcard application In 5th International Conference on Computer Sciences and Convergence Information Technology. Seoul, South Korea , 2010.
Towards integrated fire management: The need for a European Framework Directive on Fire." In Conference on Protection of Forests, Spanish Presidency of the European Union. La Granja–Valsaín, 2010.
"Towards quality CLIL: successful planning and teaching strategies." Puls 10 (2010): 11-29.
"