Biblio
Export 21441 results:
Američko javno-privatno partnerstvo i cyber sigurnost." Politička misao 51, no. 3 (2014): 76-100.
"Amfilohije osudio politiku Crne Gore prema Rusiji [Amfilohije Condemned Montenegro’s Policy Towards Russia]. Blic, 2014.
Ampliare lo sguardo. Genere e teoria politica. Roma: Donzelli, 2014.
Analysis: How Russia Annexed Crimea." IHS Jane’s Defense Weekly 51, no. 14 (2014): 5.
"Analysis of a Security System for Distributed Data Transmission of Voice In MT&S-2013 Conference. Sofia: Defence Institute, 2014.
Analysis of header usage patterns of HTTP request messages In 16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems., 2014.
Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S." Technical News − in Ukrainian 39-40 (2014): 15-19.
"Analysis of varying control inputs for a fixed wing unmanned aerial vehicle." In 17th IEEE International Multi Topic Conference 2014 . Karachi, Pakistan, 2014.
"Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups." International Journal of Electronics and Communication Engineering 8, no. 3 (2014).
"The Anatomy of Russian Information Warfare. The Crimean Operation, a Case Study In OSW Point of View series, Warsaw: Center for Eastern Studies. Vol. 42., 2014.
Angry Birds Web Page., 2014.
Ansar Beit al-Maqdis Pledges Allegiance to the Islamic State. SITE Intelligence, 2014.
Anti-corruption Policies Against State Capture. Sofia: Center for the Study of Democracy, 2014.
Application of Data Mining Methods in the Study of Crime Based on International Data Sources In School of Information Sciences. Vol. Academic dissertation. Tampere, Finland: University of Tampere, 2014.
Application of the self-organising map to visualisation of and exploration into historical development of criminal phenomena in the USA, 1960–2007 ." International Journal of Society Systems Science 6, no. 2 (2014).
"Applying Multimedia Technologies in The Information Systems of The Security and Defense Field In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Applying Resilience Thinking to Production Ecosystems." Ecosphere 5, no. 6 (2014): 73.
"AQAP and AQIM Release Joint Statement Condemning U.S.-led Alliance in Iraq and Syria, Urge Warring Factions to Unite. SITE Intelligence, 2014.
"Armenia Allowed in the Euroasian Union (Armeniiu vpustili v Evraziiskii soiuz)." Novaia gazeta (2014).
Artificial Intelligence: A Modern Approach. Third edition. Harlow, Essex, UK: Pearson Education, 2014.
Assessing Syria’s Jihad." In Middle Eastern Security, the US Pivot and the Rise of ISIS, 73. New York: Routledge, 2014.
"An Assessment on the Password Practices Among Students." Journal of Theoretical and Applied Information Technology 66, no. 3 (2014).
"