Biblio
Export 21400 results:
Constitutional Change and Security Forces in Southeast Asia: Lessons from Thailand and Myanmar, Contemporary Southeast Asia." A Journal of International and Strategic Affairs 36, no. 1 (2014): 101-127.
"Constructing credential-based E-voting systems from offline E-coin protocols." Journal of Network and Computer Applications 42 (2014): 39-44.
"Contact Theory and the Concept of Prejudice: Metaphysical and Moral Explorations and an Epistemological Question." Theory & Psychology 24, no. 1 (2014): 40-57.
"Content Language Integrated Learning in Polish Higher Military Education." Connections: The Quarterly Journal 13, no. 3 (2014): 105-115.
"Contextualizing Radicalization: The Emergence of the “Sauerland-Group” from Radical Networks and the Salafist Movement." Studies in Conflict and Terrorism 37, no. 8 (2014): 638-653.
"Contributions in belief functions and plausible and paradoxical reasoning theories: Application to supervised classification of satellite images." In International Image Processing, Applications and Systems Conference. Sfax, Tunisia, 2014.
"Convergence of Chemistry and Biology: Report of the Scientific Advisory Board’s Temporary Working Group. The Hague: OPCW: Organisation for the Prohibition of Chemical Weapons, 2014.
Cooperative Arms Control in Europe: The Consequences of Complexity, Decay, Power, and Norms." In Expert Roundtable on Conventional Arms Control and Confidence-Building Measures in Europe, OSCE Security Days. Vienna, 2014.
""Cops or Soldiers?" The Economist (2014).
Corruption and Anti-Corruption in Bulgaria (2013-14). Sofia: Center for Study of Democracy (CSD), 2014.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. New York: Crown, 2014.
"Countering Hybrid Threats: Challenges for the West." Strategic Comments 2014, no. 40 (2014): 21.
Countering Terrorism and Violent Extremism in Pakistan: Why Policewomen Must Have a Role In Policybrief . Institute for Inclusive Security, 2014.
Counter-Terrorism and Federalism. Gateway House (Indian Council on Global Relations), 2014.
Counter-Terrorism Bill: What It Contains." Telegraph (2014).
"Country crime analysis using the self-organizing map, with special regard to demographic factors." AI & SOCIETY 29, no. 1 (2014): 53-68.
"Country study: Hungary In Analysis of Civil Security Systems in Europe., 2014.
Country study: Poland In Analysis of Civil Security Systems in Europe. Accessed., 2014.
Crimea Invaded by High Readiness Forces of the Russian Federation." Suomen Sotilas (2014).
"The criminalisation of terrorists' online preparatory acts." In Cyberterrorism: Understanding, Assessment, and Response, 155-173., 2014.
"Critical evaluation of vital role of human beings and computer systems in decision making process." International Journal of Engineering Science and Innovative Technology (IJESIT) 3, no. 1 (2014).
"Critical Information Infrastructure Protection: Towards Global Cyber Security In Regional Department of Defense Resources Management Studies. Romanian National Defense University, 2014.