Works matching Security classification (Government documents)
1
- Quarterly Journal of Economics, 2011, v. 126, n. 3, p. 1375, doi. 10.1093/qje/qjr030
- Dube, Arindrajit;
- Kaplan, Ethan;
- Naidu, Suresh
- Article
3
- Defense Acquisition, 2021, v. 50, n. 1, p. 36
- Article
4
- Socioloski Pregled, 2021, v. 55, n. 4, p. 1674, doi. 10.5937/socpreg55-34725
- Николић, Немања Г.;
- Бојић, Љубиша М.;
- Јевтовић, Ана З.
- Article
5
- Brooklyn Law Review, 2015, v. 80, n. 3, p. 1191
- Article
6
- Journal of Law, Medicine & Ethics, 1994, v. 22, n. 3, p. 288
- Trey, Jeffery S.;
- Smith, Paul C.
- Article
7
- History Today, 2012, v. 62, n. 10, p. 72
- Article
8
- History Today, 2009, v. 59, n. 10, p. 34
- Article
9
- Computers (2073-431X), 2021, v. 10, n. 12, p. 160, doi. 10.3390/computers10120160
- Abioye, Temitope Elizabeth;
- Arogundade, Oluwasefunmi Tale;
- Misra, Sanjay;
- Adesemowo, Kayode;
- Damaševičius, Robertas
- Article
10
- Journal of Namibian Studies, 2023, v. 33, p. 2851
- Gadhavi, Lataben J.;
- Vaghasia, Madhuri V.
- Article
11
- Ukrainian Scientific Journal of Information Security, 2021, v. 27, n. 2, p. 79, doi. 10.18372/2225-5036.27.16004
- Article
12
- Ukrainian Scientific Journal of Information Security, 2017, v. 23, n. 2, p. 122, doi. 10.18372/2225-5036.23.11817
- Article
13
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 176, doi. 10.18372/2225-5036.20.7305
- Article
14
- Veterinary Ireland Journal, 2022, v. 12, n. 4, p. 1, doi. 10.1186/s13620-021-00182-6
- Borghart, G. M.;
- O'Grady, L. E.;
- Somers, J. R.
- Article
15
- Public Management Review, 2023, v. 25, n. 9, p. 1685, doi. 10.1080/14719037.2023.2222729
- Loyens, Kim;
- Borst, Rick;
- Heres, Leonie
- Article
16
- Journal of Software: Evolution & Process, 2021, v. 33, n. 10, p. 1, doi. 10.1002/smr.2376
- Wei, Ying;
- Sun, Xiaobing;
- Bo, Lili;
- Cao, Sicong;
- Xia, Xin;
- Li, Bin
- Article
17
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2022, n. 27, p. 6
- Article
18
- Business History, 2024, v. 66, n. 6, p. 1442, doi. 10.1080/00076791.2022.2134347
- Molteni, Marco;
- Pellegrino, Dario
- Article
19
- International Journal of Next-Generation Computing, 2021, v. 12, n. 3, p. 309, doi. 10.47164/ijngc.v12i3.830
- Gulzar, Bisma;
- Gupta, Ankur
- Article
20
- International Journal of Next-Generation Computing, 2021, v. 12, n. 2, p. 115
- Zodpe, Harshali;
- Shaikh, Arbaz
- Article
22
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 3, p. 932, doi. 10.1080/08850607.2022.2081048
- Article
23
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 2, p. 347, doi. 10.1080/08850607.2022.2102333
- Article
24
- International Journal of Intelligence & Counterintelligence, 2020, v. 33, n. 4, p. 747, doi. 10.1080/08850607.2020.1716431
- Article
25
- International Journal of Intelligence & Counterintelligence, 2018, v. 31, n. 1, p. 116, doi. 10.1080/08850607.2017.1374800
- Article
26
- International Journal of Intelligence & Counterintelligence, 2018, v. 31, n. 1, p. 102, doi. 10.1080/08850607.2017.1374797
- Article
27
- International Journal of Intelligence & Counterintelligence, 2017, v. 30, n. 3, p. 643, doi. 10.1080/08850607.2017.1297130
- Article
28
- International Journal of Intelligence & Counterintelligence, 2016, v. 29, n. 4, p. 700, doi. 10.1080/08850607.2016.1148488
- Article
29
- International Journal of Intelligence & Counterintelligence, 2016, v. 29, n. 4, p. 724, doi. 10.1080/08850607.2016.1148485
- Article
30
- 2013
- Podbregar, Mojca Ferjančič;
- Anžič, Andrej;
- Podbregar, Iztok
- Case Study
31
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 4, p. 639, doi. 10.1080/08850607.2012.705184
- Article
32
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 4, p. 786, doi. 10.1080/08850607.2012.678698
- Article
33
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 2, p. 330, doi. 10.1080/08850607.2012.652548
- Article
34
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 1, p. 1, doi. 10.1080/08850607.2011.598782
- Article
35
- International Journal of Intelligence & Counterintelligence, 2007, v. 20, n. 1, p. 79, doi. 10.1080/08850600600889027
- Shoham, Dany;
- Jacobsen, Stuart M.
- Article
36
- International Journal of Intelligence & Counterintelligence, 2007, v. 20, n. 1, p. 50, doi. 10.1080/08850600600888698
- Kramer, Lisa A.;
- Heuer Jr, Richards J.
- Article
37
- Future Internet, 2025, v. 17, n. 1, p. 15, doi. 10.3390/fi17010015
- Petrillo, Luca;
- Martinelli, Fabio;
- Santone, Antonella;
- Mercaldo, Francesco
- Article
38
- Future Internet, 2024, v. 16, n. 2, p. 55, doi. 10.3390/fi16020055
- Li, Meng;
- Liu, Jiqiang;
- Yang, Yeping
- Article
39
- Military Technical Courier / Vojnotehnicki Glasnik, 2014, v. 62, n. 2, p. 121, doi. 10.5937/vojtehg62-4696
- Article
40
- 2015
- Buszman, Krystian;
- Listewnik, Karol;
- Sobczynski, Tomasz
- Case Study
41
- Buletin Stiintific, 2013, v. 18, n. 1, p. 75
- Article
42
- Alternative Law Journal, 2011, v. 36, n. 3, p. 204
- Article
43
- Alternative Law Journal, 2007, v. 32, n. 1, p. 7, doi. 10.1177/1037969X0703200104
- Article
44
- World of Accounting Science, 2023, v. 25, n. 3, p. 399, doi. 10.31460/mbdd.1231921
- Article
45
- Albany Law Review, 2016, v. 80, n. 3, p. 1131
- Article
46
- Rutgers Computer & Technology Law Journal, 2018, v. 44, n. 2, p. 210
- Article
47
- CounterPunch, 2023, p. 291
- Article
48
- CounterPunch, 2023, p. 73
- Article
49
- William & Mary Law Review, 2015, v. 56, n. 4, p. 1221
- Article
50
- Australian Journal of International Affairs, 2009, v. 63, n. 3, p. 390, doi. 10.1080/10357710903104851
- Article