Biblio
Export 21402 results:
Analysis of Methods and Models for CII Assessment." In International CIIP Handbook 2004, 250-77. Zurich: ETH , 2004.
"Anthropologie der Konflikte: Georg Elwerts konflikttheoretische Thesen in der Diskussion. Bielefeld: Transcript, 2004.
Application of DSmT for Land Cover Change Prediction." In Advances and Applications of DSmT for Information Fusion. Rohoboth: American Research Press, 2004.
"Applications and Advances of DSmT for Information Fusion." American Research Press, Rehoboth (2004).
"Applications and Advances of DSmT for Information Fusion." American Research Press Rehoboth (2004).
"On Approval of the Procedure for Classifying Emergencies by Their Levels In Resolution., 2004.
Architecting a command and control (C2) system In INCOSE (International Council on Systems Engineering) 2004 - 14th Annual International Symposium and 4th European Systems Engineering Conference. Toulouse, France, 2004.
Architectural approach to planning communications and information systems for crisis management In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2004.
Armed Forces Modernization Plan 2002 – 2015 . Sofia: Ministry of Defense, 2004.
Armenian Security and U.S. Foreign Policy in the South Caucasus." Connections: The Quarterly Journal 3, no. 2 (2004): 15-32.
"The Art of Strategy and Force Planning." Strategy and Force Planning (2004): 17-33.
"As concerned the publications on 18.02.2004 in the media of data on the employee of Ukrainian Embassy in Germany. Press-center of the Security Service of Ukraine, 2004.
Assessing America’s War on Terror: Confronting Insurgency, Cementing Primacy." NBR Analysis 15, no. 4 (2004).
"Assessing the Credibility of the Aub Hafs al-Masri Brigades’ Threats. Inquiry & Analysis: The Middle East Media Research Institute, 2004.
An assessment of PRN prioritization in a failure modes effects and criticality analysis." Journal of the IEST 47 (2004): 51-56.
"Astana Offers Clumsy Explanations for Banning ‘Terrorist Organizations'." Eurasia Daily Monitor 1, no. 108 (2004).
"At First Sight: Persistent Relational Effects of Get-Acquainted Conversations." Journal of Social and Personal Relationships 21, no. 3 (2004): 361-379.
"At Least in Fighting Terrorism, Transatlantic Cooperation Is Working." Connections: The Quarterly Journal 3, no. 1 (2004): 15-17.
"Authentication and Integrity in Outsourced Databases." In 11th Annual Network and Distributed System Security Symposium –NDSS04. California, USA, 2004.
"Balancing Act, The Challenges and Benefits of Volunteers. The Urban Institute, 2004.
The Balkans after the 2004 Enlargement of NATO and the European Union:What Next?" Connections: The Quarterly Journal 3, no. 2 (2004): 115-121.
"Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computing 1, no. 1 (2004): 11-33.
"Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computin 1, no. 1 (2004): 11-33.
"Batching Schnorr Identification Scheme with Applications to Privacy- Preserving Authorization and Low-Band width Communication Devices." Advances in Cryptology – ASIACRYPT 2004, Lecture Notes in Computer Sciences 3329 (2004).
"