Academic literature on the topic 'Improving Defence and Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Improving Defence and Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Improving Defence and Security"
Saragih, Herlina JR, Rayanda Barnas, and Purwanto Purwanto. "Defense Management concepts improving Indonesian Maritime Security." Jurnal Pertahanan 2, no. 3 (September 29, 2016): 257. http://dx.doi.org/10.33172/jp.v2i3.104.
Full textDorosh, Lesia, and Vasyl Romanyk. "PESCO, CARD, EDF: Strategy, Analysis, and Financing in the European Union Security Guaratee." Humanitarian vision 6, no. 2 (November 25, 2020): 1–7. http://dx.doi.org/10.23939/shv2020.02.001.
Full textZaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 42–68. http://dx.doi.org/10.33731/52021.244518.
Full textZaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 4 (October 25, 2021): 33–53. http://dx.doi.org/10.33731/42021.243120.
Full textFiott, Daniel. "Improving CSDP Planning and Capability Development: Could there be a Frontex Formula?" European Foreign Affairs Review 18, Issue 1 (February 1, 2013): 47–62. http://dx.doi.org/10.54648/eerr2013003.
Full textBROŽIČ, LILIANA. "SECURITY AS AN IMPERATIVE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.00.
Full textPOPIEL, Henryk, Bogusław ROGOWSKI, and Krzysztof WALCZAK. "POLISH DEFENSE STANDARDS WITHIN THE EUROPEAN RANGE." National Security Studies 5, no. 1 (May 15, 2014): 311–20. http://dx.doi.org/10.37055/sbn/135200.
Full textNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Full textZaikivskyi, Oleksandr, and Oleksandr Onistrat. "Regulatory and legal support of intellectual property protection in the defense sphere (in the development of armaments and military equipment; in the implementation of international military- technical cooperation)." Theory and Practice of Intellectual Property, no. 6 (December 27, 2021): 49–67. http://dx.doi.org/10.33731/62021.248981.
Full textKosmacz-chorodowska, Anna. "Improving management in favour of defence and security on the basis of e-economy tools." Scientific Papers of Silesian University of Technology. Organization and Management Series 2018, no. 128 (2018): 231–42. http://dx.doi.org/10.29119/1641-3466.2018.128.19.
Full textDissertations / Theses on the topic "Improving Defence and Security"
Opasinov, Aleksandar, and Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances." Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.
Full textDå stora framsteg och användning av datakommunikation har ökat exponentiellt på en global skala, med en förödande exponering av attacker och säkerhetshot mot hemanvändare såväl som stora företag, finns detalltid ett behov av förbättrad nätverksskydd. IT-avdelningen hos företaget OneDefence, valdes för att utföra examensprojektet och baserade sig på organisationens angivna information för att förbättra deras nätverksförsvar. Syftet med denna rapport är att sammanställa en lista på tio länder som utgör de allvarligaste IT-hoten i världen, samt begränsa attackytan för organisationens nätverk så mycket som möjligt medan man behåller alla nödvändiga tjänster till användare utomlands. Efter att ha undersökt länderna, anordnades en prototyp för att efterlikna delar av OneDefences topologi av intresse och testattacker utfördes enligt metodologikapitlet. Resultaten av utredningarna visade att från de länder som utfört de allra allvarliga cyberhoten inkluderade bland annat Kina, Ryssland och Nordkorea, som har beräknats statistiskt baserat på antalet igenkända cyberwarfare attacker. Resultaten från de olika DoS-attackerna visade att en IPS bör vara kärnan i en organisations nätverksförsvar för att kunna bekämpa dessa intrång, samt potentiellt andra typer. Med hjälp av den prototyp som byggdes baserad på organisationens topologi, blockerades flera attacker rätt framgångsrikt, med en låg procentandel av paketen som gick genom säkerhetsenheten. Slutligen utforskades ytterligare förbättringar av försvarsförmågan hos organisationen genom att jämföra olika produkter och enheter. Detta resulterade i produkter från Fortinet-varumärket såsom FortiGate NGFW med UTM förmåga, då de erbjuder flera fördelar jämfört med konkurrenter.
Wu, Xuan. "Improving Electric Grid Security: Defense Planning and Security Constrained ACOPF via Robust Optimization." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1543563463428344.
Full textCaudle, Sharon L. "Homeland security and capabilities-based planning : improving national preparedness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCaudle.pdf.
Full textThesis Advisor(s): C.J. LaCivita, Kathryn E. Newcomer. Includes bibliographical references (p. 87-94). Also available online.
Morrell, Christopher Frank. "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/79791.
Full textPh. D.
Navas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.
Full textInternet of Things (IoT) systems are increasingly being deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving Target Defense (MTD) is a cyberdefense paradigm that proposes to randomize components of systems, with the intention of thwarting cyberattacks that previously relied in the static nature of systems. Attackers are now constrained by time. MTD has been successfully implemented in conventional systems, but its use to improve IoT security is still lacking in the literature. Over the course of this thesis, we validated MTD as a cybersecurity paradigm suitable for IoT systems. We identified and synthesized existing MTD techniques for IoT using a systematic literature review method,and defined and used four novel entropy related metrics to measure MTD techniques qualitative properties. Secondly, we proposed a generic distributed MTD framework that allows the instantiation of concrete MTD strategies suitable for the constraints of the IoT. Finally, we designed an secure time synchronization protocol, and instantiated three particular MTD techniques: two at the upper network layers (e.g. port-hopping, and application RESTful interfaces) -and validated one of them in real hardware-, and the third one at the physical layer to achieve IoT systems resilient to insider attacks/jamming by using Direct Sequence Spread-Spectrum techniques with cryptographically-strong pseudo-random sequences
Pohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.
Full textYoung, Christopher J. "The European security and defence identity debate." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ56151.pdf.
Full textFrey, Stefanie. "Swiss defence and security policy 1945-73." Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textWing, Ian Politics Australian Defence Force Academy UNSW. "Australian Defence in transition: responding to new security challenges." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Politics, 2002. http://handle.unsw.edu.au/1959.4/38662.
Full textBooks on the topic "Improving Defence and Security"
1944-, Johnson Stuart E., and Larrabee F. Stephen, eds. Persian Gulf security--improving allied military contributions. Santa Monica, CA: Rand, 2000.
Find full textGlobal Maritime Information Sharing Symposium (2nd 2009 National Defense University). Streamlining information sharing: Improving efficiency, security, safety and the environment : Global Maritime Information Sharing Symposium 2009, September 15-17, National Defense University; Fort Lesley J. McNair, Washington, D.C. [Washington, DC: Office of Global Maritime Situational Awareness], 2009.
Find full textConahan, Frank C. Contract pricing: Improving Defense management and oversight : statement of Frank C. Conahan, Assistant Comptroller General, National Security and International Affairs Division, before the Committee on Governmental Affairs, United States Senate. Washington, D.C: The Office, 1992.
Find full textOffice, General Accounting. Nuclear nonproliferation: Limited progress in improving nuclear material security in Russia and the newly independent states : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textBorg-Neervoort, Marlies ter. Defence technology assessment: Improving defence decision-making. Amsterdam: Nederlandse Organisatie voor Technologisch Aspectenonderzoek, 1987.
Find full textImproving financial accountability at the Department of Defense: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, of the One Hundred Eleventh Congress, second session, September 29, 2010. Washington: U.S. G.P.O., 2011.
Find full textDemocrats, Liberal. Defence and security. Dorchester: Liberal Democrat Pubns., 1998.
Find full textImproving financial and business management at the Department of Defense: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, October 16, 2007. Washington: U.S. G.P.O., 2008.
Find full textGreat Britain. Museums and Galleries Commission. Improving museum security. London: Museums & Galleries Commission, 1997.
Find full textNeedle, Jerome A. Improving transit security. Washington, D.C: National Academy Press, 1997.
Find full textBook chapters on the topic "Improving Defence and Security"
Kanturska, Urszula, Jan-Dirk Schmöcker, Achille Fonzone, and Michael G. H. Bell. "Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport." In Game Theoretic Risk Analysis of Security Threats, 199–227. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_9.
Full textMohaisen, Aziz, and Scott Hollenbeck. "Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs." In Information Security Applications, 65–80. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9_5.
Full textCheung, Catherine, Julio J. Valdés, and Jobin Puthuparampil. "Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques." In Recent Advances in Computational Intelligence in Defense and Security, 605–34. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26450-9_22.
Full textLi, Nianyu, Mingyue Zhang, Eunsuk Kang, and David Garlan. "Engineering Secure Self-Adaptive Systems with Bayesian Games." In Fundamental Approaches to Software Engineering, 130–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_7.
Full textMcCormack, John, and Tim Burnett. "Defence acquisition." In Managing Security, 160–76. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-11.
Full textLeuffen, Dirk, Berthold Rittberger, and Frank Schimmelfennig. "Security and Defence." In Differentiated Integration, 184–220. London: Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-28501-0_7.
Full textDoran, Susan. "Security and Defence." In England and Europe in the Sixteenth Century, 42–79. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-26990-7_3.
Full textBluth, Christoph. "Defence and Security." In Khrushchev and Khrushchevism, 194–214. London: Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18646-4_12.
Full textRice, Condoleezza. "Defence and Security." In The Soviet Union Under Gorbachev, 192–209. London: Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18648-8_11.
Full textDönges, Hannah E., and Stephanie C. Hofmann. "Defence As Security." In Routledge Handbook Of Defence Studies, 29–39. Abingdon, Oxon: New York, NY: Routledge, [2018]: Routledge, 2018. http://dx.doi.org/10.4324/9781315650463-4.
Full textConference papers on the topic "Improving Defence and Security"
Barrat, Catherine, and Gildas Chauvel. "Improving cooling of cavity blackbodies." In SPIE Security + Defence, edited by David A. Huckridge and Reinhard Ebert. SPIE, 2013. http://dx.doi.org/10.1117/12.2028874.
Full textOttaviani, Carlo, Riccardo Laurenza, Thomas P. W. Cope, Gaetana Spedalieri, Samuel L. Braunstein, and Stefano Pirandola. "Secret key capacity of the thermal-loss channel: improving the lower bound." In SPIE Security + Defence, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2244899.
Full textAnderson, D., and D. G. Thomson. "Improving rotorcraft survivability to RPG attack using inverse methods." In SPIE Europe Security + Defence, edited by David H. Titterton and Mark A. Richardson. SPIE, 2009. http://dx.doi.org/10.1117/12.832298.
Full textHeineman, William R., Carl J. Seliskar, Laura K. Morris, and Samuel A. Bryan. "Spectroelectrochemistry as a strategy for improving selectivity of sensors for security and defense applications." In SPIE Security + Defence, edited by Roberto Zamboni, François Kajzar, and Attila A. Szep. SPIE, 2012. http://dx.doi.org/10.1117/12.965308.
Full textTrofimov, Vyacheslav A., and Vladislav V. Trofimov. "Real-time computer processing of image from THz passive imaging device for improving of images." In SPIE Security + Defence, edited by Neil A. Salmon and Eddie L. Jacobs. SPIE, 2012. http://dx.doi.org/10.1117/12.965546.
Full textHarder, James A., and Michaelene Sprague. "Improving transmission and image contrast in medium and high performance optical systems using weighted average angle of incidence techniques to optimize coatings." In SPIE Europe Security and Defence, edited by Gari Owen. SPIE, 2008. http://dx.doi.org/10.1117/12.797531.
Full text"Simulation for Education: Improving Personal Responsiveness in Case of Violent Attack." In The 11th International Defence and Homeland Security Simulation Worskhop. CAL-TEK srl, 2021. http://dx.doi.org/10.46354/i3m.2021.dhss.002.
Full textWhitman, Lucy S., Colin Lewis, and John P. Oakley. "Improving human object recognition performance using video enhancement techniques." In European Symposium on Optics and Photonics for Defence and Security, edited by Tim P. Donaldson and Colin Lewis. SPIE, 2004. http://dx.doi.org/10.1117/12.581827.
Full textFiliberti, Daniel P., and Robert A. Schowengerdt. "Improving multisource image fusion using thematic content." In Defense and Security, edited by Zia-ur Rahman, Robert A. Schowengerdt, and Stephen E. Reichenbach. SPIE, 2004. http://dx.doi.org/10.1117/12.541678.
Full textLanzagorta, Marco, Jeffrey Uhlmann, Truc Le, Oliverio Jitrik, and Salvador E. Venegas-Andraca. "Improving quantum sensing efficiency with virtual modes." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2016. http://dx.doi.org/10.1117/12.2223981.
Full textReports on the topic "Improving Defence and Security"
Davies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135010.
Full textWing, Ian. The Australian Defence Force: Broadened Concepts of Security Operations. Fort Belvoir, VA: Defense Technical Information Center, October 1998. http://dx.doi.org/10.21236/ada386066.
Full textAlt, Josef. The Future of the European Security and Defence Policy. Fort Belvoir, VA: Defense Technical Information Center, April 2006. http://dx.doi.org/10.21236/ada475658.
Full textTagarev, Todor. Methodology for Defence Planning in the Context of Security Strategy Planning. Procon, 2007. http://dx.doi.org/10.11610/it4sec.0016.
Full textMillar, Katharine, James Shires, and Tatiana Tropina. Gender Approaches to Cybersecurity: Design, Defence and Response. The United Nations Institute for Disarmament Research, January 2021. http://dx.doi.org/10.37559/gen/21/01.
Full textEstevens, João. Migration crisis in the EU: developing a framework for analysis of national security and defence strategies. IPRI-NOVA, May 2018. http://dx.doi.org/10.23906/wp57/2018.
Full textMarkets, Policies Institutions. Improving tenure security for pastoralists in East Africa. Washington, DC: International Food Policy Research Institute, 2020. http://dx.doi.org/10.2499/p15738coll2.134136.
Full textLinquist, Daniel A. Assessing Security Cooperation: Improving Methods to Maximize Effects. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada589336.
Full textDuben, Andey Kirillovich. IMPROVING THE INFORMATION SECURITY SYSTEM: COMPARATIVE LEGAL ANALYSIS. DOI СODE, 2022. http://dx.doi.org/10.18411/3673_2022_2_197_203.
Full textManzoor, Ahmad. Improving the International Governance of Food Security and Trade. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2011. http://dx.doi.org/10.7215/ag_ip_20110923.
Full text