Biblio

Export 21402 results:
2004
Dunn, Myriam. "Analysis of Methods and Models for CII Assessment." In International CIIP Handbook 2004, 250-77. Zurich: ETH , 2004.
Eckert, Julia. Anthropologie der Konflikte: Georg Elwerts konflikttheoretische Thesen in der Diskussion. Bielefeld: Transcript, 2004.
Corgne, S., L. Hubert-Moy, G. Mercier, and J. Dezert. "Application of DSmT for Land Cover Change Prediction." In Advances and Applications of DSmT for Information Fusion. Rohoboth: American Research Press, 2004.
Smarandache, Florentin, and Jean Dezert. "Applications and Advances of DSmT for Information Fusion." American Research Press, Rehoboth (2004).
Smarandache, Florentin, and Jean Dezert. "Applications and Advances of DSmT for Information Fusion." American Research Press Rehoboth (2004).
Ukraine, Cabinet of Ministe. On Approval of the Procedure for Classifying Emergencies by Their Levels In Resolution., 2004.
Arabs of Bulgarian Citizenship on Iraq’s Terrorist Lists., 2004.
Cropley, David H.. Architecting a command and control (C2) system In INCOSE (International Council on Systems Engineering) 2004 - 14th Annual International Symposium and 4th European Systems Engineering Conference. Toulouse, France, 2004.
Shalamanov, Velizar, and Stoyan Avramov. Architectural approach to planning communications and information systems for crisis management In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2004.
Armed Forces Modernization Plan 2002 – 2015 . Sofia: Ministry of Defense, 2004.
Kotanjian, Hayk. "Armenian Security and U.S. Foreign Policy in the South Caucasus." Connections: The Quarterly Journal 3, no. 2 (2004): 15-32.
Bartlett, Henry, Paul Holman, and Timothy E. Somes. "The Art of Strategy and Force Planning." Strategy and Force Planning (2004): 17-33.
V.M., Kravchenko. As concerned the publications on 18.02.2004 in the media of data on the employee of Ukrainian Embassy in Germany. Press-center of the Security Service of Ukraine, 2004.
Tellis, Ashley J.. "Assessing America’s War on Terror: Confronting Insurgency, Cementing Primacy." NBR Analysis 15, no. 4 (2004).
Carmon, Yigal. Assessing the Credibility of the Aub Hafs al-Masri Brigades’ Threats. Inquiry & Analysis: The Middle East Media Research Institute, 2004.
Bowles, J.B.. "An assessment of PRN prioritization in a failure modes effects and criticality analysis." Journal of the IEST 47 (2004): 51-56.
Yermukanov, Marat. "Astana Offers Clumsy Explanations for Banning ‘Terrorist Organizations'." Eurasia Daily Monitor 1, no. 108 (2004).
Sunnafrank, Michael, and Artemio Ramirez. "At First Sight: Persistent Relational Effects of Get-Acquainted Conversations." Journal of Social and Personal Relationships 21, no. 3 (2004): 361-379.
Coessens, Philippe. "At Least in Fighting Terrorism, Transatlantic Cooperation Is Working." Connections: The Quarterly Journal 3, no. 1 (2004): 15-17.
Mykletun, Einar, Maithili Narasimha, and Gene Tsudik. "Authentication and Integrity in Outsourced Databases." In 11th Annual Network and Distributed System Security Symposium –NDSS04. California, USA, 2004.
Hager, Mark A., and Jeffrey L. Brudney. Balancing Act, The Challenges and Benefits of Volunteers. The Urban Institute, 2004.
Ionescu, Mihail E.. "The Balkans after the 2004 Enlargement of NATO and the European Union:What Next?" Connections: The Quarterly Journal 3, no. 2 (2004): 115-121.
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl Landwehr. "Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computing 1, no. 1 (2004): 11-33.
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl E. Landwehr. "Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computin 1, no. 1 (2004): 11-33.
Gennaro, Rosario, Darren Leigh, Ravi Sundaram, and William Yerazunis. "Batching Schnorr Identification Scheme with Applications to Privacy- Preserving Authorization and Low-Band width Communication Devices." Advances in Cryptology – ASIACRYPT 2004, Lecture Notes in Computer Sciences 3329 (2004).

Pages