Applying the System Approach to the Study of Critical Infrastructure Author(s): Boyan Mednikarov, Nedko Dimitrov, Kalin Kalinov04 Jul 2007
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force Author(s): Henk Emmens04 Jul 2007
An Efficient and Secure Remote Authentication Scheme Using Smart Cards Author(s): Chin-Chen Chang, Jung- San Lee04 Jul 2006
Secure User-Friendly Remote Authentication Schemes Author(s): Tzung-Her Chen, Du-Shiau Tsai, Gwoboa Horng04 Jul 2006
Choosing t-out-of-n Secrets by Oblivious Transfer Author(s): Jung- San Lee, Chin-Chen Chang04 Jul 2006
A Generalization of the Classic Combination Rules to DSm Hyper-power Sets Author(s): Milan Daniel04 Jul 2006
Credit Card Fraud Detection Using Self-Organizing Maps Author(s): Vladimir Zaslavsky, Anna Strizhak04 Jul 2006
A New Class of Fusion Rules Based on T-Conorm and T-Norm Fuzzy Operators Author(s): Albena Tchamova, Jean Dezert, Florentin Smarandache04 Jul 2006
Special Operations Forces in the Fight Against Terrorism on National Territory Author(s): Plamen Torlakov04 Jul 2006
Ordered DSmT and its Application to the Definition of Continuous DSm Models Author(s): Frédéric Dambreville04 Jul 2006
Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management Author(s): George Handy, John Kimball, Jeffrey Winbourne04 Jul 2006
Terrorism on the Sea, Piracy, and Maritime Security Author(s): Boyan Mednikarov, Kiril Kolev04 Jul 2006