Academic literature on the topic 'Security complex'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security complex.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security complex"

1

Dhume, Sadanand. "Singapore's Security Complex." Foreign Policy, no. 127 (November 2001): 86. http://dx.doi.org/10.2307/3183303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boyle, Philip, and Kevin D. Haggerty. "Spectacular Security: Mega-Events and the Security Complex." International Political Sociology 3, no. 3 (September 2009): 257–74. http://dx.doi.org/10.1111/j.1749-5687.2009.00075.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Collinson, Helen. "Security: the complex crypto relationship." Computers & Security 14, no. 4 (January 1995): 299. http://dx.doi.org/10.1016/0167-4048(95)90039-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Buzan, Barry. "The Southeast Asian Security Complex." Contemporary Southeast Asia 10, no. 1 (June 1988): 1–16. http://dx.doi.org/10.1355/cs10-1a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lai, Ying-Cheng, Adilson Motter, Takashi Nishikawa, Kwangho Park, and Liang Zhao. "Complex networks: Dynamics and security." Pramana 64, no. 4 (April 2005): 483–502. http://dx.doi.org/10.1007/bf02706197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Volevodz, A. G. "Legal security in fuel and energy complex: statement of problem." SOCAR Proceedings, no. 3 (September 30, 2019): 97–112. http://dx.doi.org/10.5510/ogp20190300403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kilroy, Richard, Abelardo Rodriguez, and Todd Hataley. "Security Inequalities in North America: Reassessing Regional Security Complex Theory." Journal of Strategic Security 10, no. 4 (December 2017): 1–28. http://dx.doi.org/10.5038/1944-0472.10.4.1613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

M. Xheladini, Fatmir. "Regional Security Complex: The Macedonian Context." European Journal of Multidisciplinary Studies 3, no. 1 (December 1, 2016): 34. http://dx.doi.org/10.26417/ejms.v3i1.p34-37.

Full text
Abstract:
The traditional concepts of security analysis addresses concerns that deal with security at the state level leaving ample room for the concerns regarding security aspects that are not addressed through these lenses appropriately. The challenges that international system of security is facing range in variety from ones that are different in form to the time sequence that they appear in a different space and geographical location. These may include factors that are objective and subjective and as such they characterize the nature of relationships between states. Behavior of the states may at times include an action that conceptualizes within a geographical framework based on attributes that states poses. Given this, Buzan has presented the idea of security complex that is defined as a group of states in which perceptions and key concerns over security are interrelated. In this context the security complex is tied together through geographical, political, historical economic and cultural issues amongst others. Hence regional issues have an important role in the building of security logic for countries individually or in a group and may impact the formulation of policies internally or externally. Based on these considerations in this article we analyze the security issues of Macedonia and how they reflect upon the wider security agenda of the countries in the region in a two-way reflection.
APA, Harvard, Vancouver, ISO, and other styles
10

Aghazada, M. M., P. M. Pavlova, and G. A. Nikolova. "Great Mediterranean as a Security Complex." Herald of Omsk University. Series Historical studies 8, no. 3 (2021): 117–22. http://dx.doi.org/10.24147/2312-1300.2021.8(3).117-122.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security complex"

1

Hamad, Mohammed Hassan Ahmed. "Regional security complex theory and IGAD's regime." Thesis, University of Reading, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thompson, A. I. "Digital watermarking for multimedia security using complex wavelets." Thesis, Queen's University Belfast, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492336.

Full text
Abstract:
Digital data hiding has gained popularity in recent years as a way of settling intellectual property rights disputes, the ease with which digital media can be copied and distributed has led to a need for a method of identifying the original owner ofthe media. Data hiding allows for the embedding of information in a host signal that can later be extracted as proof of ownership or for some other purpose. Robustness, imperceptibility and capacity are the three conflicting attributes of data hiding systems. This thesis is dedicated to the establishment of data hiding algorithms that will achieve new standards of imperceptibility and robustness and consequently lead to higher data hiding capacity. It is proposed to apply Spread Transform embedding that combines the two main methods of data hiding, Spread Spectrum (SS) and Quantization Index Modulation (QIM). Complex wavelets are employed as the watermark embedding domain. These wavelet transforms have several advantages over discretely sampled wavelet transforms such as improved directional selectivity. Visual models are developed for these wavelet transforms. The application of these wavelet transforms to the area of digital watermarking is considered including an information theoretic approach to derive the optimal capacity limits ofthe considered watermarking algorithms. In addition to grey scale image watermarking the application of the considered wavelet transforms and embedding algorithms are extended to the case of video and colour image watermarking.
APA, Harvard, Vancouver, ISO, and other styles
3

Madia, James D. "Homeland security organizations design contingencies in complex environments." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5559.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
Protecting America from terrorism, natural disasters, and other threats has never been more important or as complex an endeavor as it is today. From asymmetrical warfare to economic meltdown, the environments are increasingly unstable, dynamic and complex, yet many U.S. homeland security organizations are designed around a 19th century model created for the Industrial Age. Information Age challenges demand new ideas for organizational design. Traditional mechanistic and hierarchical bureaucracies must be re-examined. This thesis explores case studies that include an intelligence organization fighting bioterrorism and a military unit battling insurgents in asymmetrical warfare. Case study research was selected to examine "how" and "why" questions related to organic organizational design in dynamic and complex environments. Organic designs provide a better fit because they leveraged three critical capabilities for these environments: communication dissemination, sense-making, and timely conversion of information to action. This fit is accomplished through elements, such as decentralized decision authority, emergent leadership, low specialization, low formalization, use of liaisons, and a reliance on performance controls, which in turn, contribute to decentralized allocation of decision rights, unconstrained patterns of interaction, and broad distribution of information. Organizations of the future will benefit from the insights that emerged from this research.
APA, Harvard, Vancouver, ISO, and other styles
4

Franke, Benedikt. "Rethinking complex security cooperation with special reference to Africa's emerging peace and security architecture." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.

Full text
Abstract:
The ability to design and reason about architectures (here understood as organisations which are designed according to hierarchies of roles and those processes that link them) which co-exist and interact within complex environments is of increasing importance. With the introduction of more interconnected technology affecting the way in which stakeholders manage information and conduct their operations, the need for such a capability is clear. Current approaches either address this issue with a mathematical approach which presents an obstacle to most non-specialist analysts, or they choose not to incorporate the full spread of factors that fall within the scope of this thesis. This thesis aims to develop a capability that provides those decision-makers who have information security management responsibilities with the means to analyse isolated, as well as interacting, security and business architectures. It aims to provide this capability at a level of modelling abstraction that is accessible to such non-technical specialists. The first stage of the thesis builds on earlier work on hierarchical structures by Beautement and Pym (2010b). It is dedicated to the development of a suitable conceptual framework which is both general and flexible enough to embody the required properties of a system, as well as their method of implementation spread across hierarchies of rˆoles describing organisations. This concept is expanded to describe how such architectures may interact with one another, and notation which is helpful in discussing these operations carefully is also developed. The framework is then applied to three broad areas within information security, those of trust (which is interpreted as a specific property within a given domain), heuristics (which are broadly treated as actions that should be undertaken during certain conditions), and access control. In each case the suitability of the framework is investigated, leading to refinements in the model which support the common goal of providing a novel view on these approaches to security analysis. This view is characterised by a unified consideration of the underlying architectures, to properties and policies applied across organisations. A key driver in conducting this analysis is to enable the description of how properties, fundamental to the legitimacy of systems, may firstly be established and then by how they may be compromised—providing a view on system vulnerabilities in that controls may fail or be circumvented. Following this, the framework is also intended as a tool to address such vulnerabilities, and to provide a means by which to scope measures designed to mitigate them.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Khalifa, Talal Mohammed. "The Gulf and Southeast Asia : regional security complex and regional security community : a comparative study." Thesis, University of Exeter, 2012. http://hdl.handle.net/10036/3625.

Full text
Abstract:
The study covers two regions. These are shown to constitute ‘Regional security complexes’. The Gulf region and the Gulf Cooperation Council (GCC) and the Association of Southeast Asian Nations (ASEAN) in the Southeast Asian region are the focus of study. The defence and security circumstances of the two regions and the responses of the regions’ governments severally and cooperatively are examined. The study has had to take account of the geographic, historical, ethno-cultural differences between the two regions. These are shown to be influential in their respective security responses. Nonetheless, the thesis demonstrates how the regions can be understood in terms of a common theoretical framework. The study is undertaken primarily within the framework of the theory of ‘Regional Security Complex’ (RSCT), as developed by Buzan and Waever in Regions and Power. Regional security complexes are areas of internal “security interdependence” and securitisation. The theory (RSCT) is discussed critically. ‘Security Communities’ is a major comparative feature of the study. Amitav Acharya develops this approach in Constructing a Security Community in Southeast Asia. Emphasis is on the “creative construction” of a ‘security community’. The Gulf Cooperation Council may also be viewed in this way. ‘Regional security complex’ and ‘regional security community’ are not alternative theories of regional inter-state relations. The second is superstructural on the prior facts of regional security complexity. The GCC is a partial response to regional security and is a securitising actor in the region. ASEAN is an attempt at region-wide inclusiveness and conflict avoidance. Institutional management of security is described. The two regional approaches differ as beliefs that the “enmity/amity balance” is amenable to official regional policy and action: the Gulf and GCC are apparently locked in a dominant ‘enmity’ scenario; ASEAN seeks to establish a regime of ‘amity’. Whether ASEAN is notably less militarily oriented than the Gulf is questioned. States’ insistence on national security ‘resilience’ and ASEAN norms of ‘sovereignty’, ‘non-interference’ and conflict avoidance’ impede regional security development. ASEAN’s progress towards an ‘ASEAN Security Community’ is examined. The study discusses practicalities of these policies. The application and limitations of ‘Revolution in military affairs’ (RMA) are discussed. The military are viewed as a principal operational actor in any regional security response to conditions of regional security complexity. An examination of state-military relations is based on the concepts of ‘grand strategy’ and ‘military doctrine’.
APA, Harvard, Vancouver, ISO, and other styles
7

Green, Andrew Brian. "Is there a Central Asian security complex?, an application of security complex theory and securitization to problems relating to identity in Central Asia." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ52990.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kiss, Kristina, and P. G. Pererva. "Strategic problems of economic security of Ukraine." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raszewski, Slawomir. "European Union energy policy and the Black Sea/Caspian region : between security community and security complex?" Thesis, University of Leeds, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590293.

Full text
Abstract:
The return of energy security, as an issue of growing importance in international relations. has been a hallmark of the post-Cold War period. The systemic rift of 9/11 served as a 'wake-up call' in creating awareness of energy dependence and the associated political instability nexus, leading to energy diversification and conservation measures being initiated in major energy-consuming regions. Owing to its differing trade and supply structures, the role of natural gas as a fuel of choice to fill the gap between the era of oil and the era of nuclear/renewable energy bas become part of the energy security agenda while exposing it to a number of factors which have made it a key regional issue. Originally a bearer of an identity of an 'energy community', the European Union (EU) has been a leading proponent of this process. This thesis will provide a systematic re-examination of the foreign energy policy of the EU towards the Black Sea/Caspian region providing an explanation for EU policy failures during the critical years from 2004 to 2009. Despite a mature gas trade relationship with and its proximity to the energy rich nations of the Former Soviet Union (FSU), EU-Russia energy relations experienced a severe refreezing following the change of political leadership in Russia after 2000, which took place against a backdrop of rising global market prices for oil and, linked. to this, similar rises in the price of gas. During the same period the two transformative enlargements into Central and Eastern Europe (CEE) promised new energy policy opportunities. yet they have also created looming challenges in the process of creating a broader energy security community. The emerging conflation of the Caspian Sea region with the Black Sea region in energy terms, with Turkey as the conduit linking the energy-producing regions of the Caucasus and Central Asia with consuming states in Europe, have mutually become exposed to geopolitical realities that are clustered in the broader region. Drawing on extensive fieldwork data collected both in Brussels and Ankara the thesis provides vital information and analysis on the criticality of energy supply and the transit side of the policy and sheds new light on this process in the case study. The thesis identifies the causes of the deadlock affecting the policy-making process at the EU level and at the regional level in the Black/Caspian Sea region by examining both the internal and external dynamics which have frustrated the policymaking process. A focus in the EU on liberalisation and energy diversification have been hallmarks of the internal dynamics of the EU's policymaking processes. This has direct1y further added to the increased 'bureaucratisation' of the EU's energy policymaking process. Drawing on Allison's Foreign Policy Analysis Bureaucratic Politics (BPO) paradigm, primary and secondary data, including primary interviews with policy-makers, the thesis illuminates this little studied area and fills a gap in the literatures. The thesis also highlights at the regional level Ankara's new foreign and diplomacy-based energy policy dynamism juxtaposed with Moscow's omnipresence in regional energy security affairs. This regional juxtaposition of Ankara's energy needs and Moscow's omnipresence in the region poses difficult challenges for the implementation of EU energy policy as is discussed in the thesis.
APA, Harvard, Vancouver, ISO, and other styles
10

Khalid, Muhammad Adnan, and Qamar Nazir. "Security Issue of BGP in complex Peering and Transit Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2447.

Full text
Abstract:

Border Gateway Protocol (BGP) is a critical routing protocol of the internet, used to

exchange routing information between autonomous systems (ASes). BGP is highly

vulnerable to many attacks that can cause routing disturbance on the internet. This

paper describes BGP attacks, misconfigurations, causes of misconfigurations, impact

of these attacks and misconfigurations in BGP and counter measures. Also we

analyze new security architectures for BGP, comparison of these security protocols

and their deployment issues. At the end we propose new security solution that is

Defensive Routing Policy (DRP) to prevent BGP from malicious attacks and

misconfigurations. DRP is operationally deployable and very effective to solve BGP

problems.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security complex"

1

Ero, Comfort. Sierra Leone's security complex. London: Conflict, Security & Development Group at the Centre for Defence Studies, King's College, University of London, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

NATO Advanced Research Workshop on Complex Societal Dynamics: Security Challenges and Opportunities (2009 Zagreb, Croatia). Complex societal dynamics: Security challenges and opportunities. Amsterdam: IOS Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Department of Energy. Office of Inspections and Special Inquiries. Incident of security concern at the Y-12 National Security Complex. Washington, D.C.]: U.S. Dept. of Energy, Office of Inspector General, Office of Inspections and Special Inquiries, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Foundation, Observer Research, ed. Security in a complex era: Emerging challenges facing India. New Delhi: Observer Research Foundation, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kostecki, Wojciech. Europe after the Cold War: The security complex theory. Warsaw: Instytut Studiów Politycznych PAN, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Drohan, Thomas Alan. A new strategy for complex warfare: Combined effects in East Asia. New York: Cambria Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Venter, Hein, Mariki Eloff, Les Labuschagne, Jan Eloff, and Rossouw von Solms, eds. New Approaches for Security, Privacy and Trust in Complex Environments. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-72367-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rietjens, S. J. H. Civil-military cooperation in response to a complex emergency: Just another drill? Leiden: Brill, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hayes, Bradd C. Doing windows: Non-traditional military responses to complex emergencies. [Washington, D.C.]: National Defense University, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The dual state: Parapolitics, Carl Schmitt and the national security complex. Burlington, VT: Ashgate, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security complex"

1

Bosworth, Eric, and Adrian Gheorghe. "Energy Security: A Problem of Complex Systems and Complex Situations." In Energy Security, 235–46. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0719-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lekunze, Manu. "Societal security." In Complex Adaptive Systems, Resilience and Security in Cameroon, 48–71. New York, NY : Routledge, 2019. | Series: Routledge contemporary Africa series: Routledge, 2019. http://dx.doi.org/10.4324/9780429273445-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Battersby, Paul. "Converging in the Shadows: Complex Crime, Complex Security." In The Unlawful Society, 51–84. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137282965_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hydrick, Ashley, and Elizabeth Dunn. "Food Security and Complex Disasters." In Handbook of Security Science, 1–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-51761-2_26-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hydrick, Ashley, and Elizabeth Dunn. "Food Security and Complex Disasters." In Handbook of Security Science, 599–617. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yasmin, Lailufar. "Complex Interdependence and Security Architecture." In Regional Security in South Asia and the Gulf, 82–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003283058-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Trufanov, Andrey, Nikolay Kinash, Alexei Tikhomirov, Olga Berestneva, and Alessandra Rossodivita. "Optimal Information Security Investment in Modern Social Networking." In Complex Networks VIII, 175–82. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54241-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moffat, James, Michael Bathe, and Lorna Frewer. "The Hybrid War Model: A Complex Adaptive Model of Complex Urban Conflict." In OR, Defence and Security, 77–100. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137454072_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lekunze, Manu. "Modern state security." In Complex Adaptive Systems, Resilience and Security in Cameroon, 72–90. New York, NY : Routledge, 2019. | Series: Routledge contemporary Africa series: Routledge, 2019. http://dx.doi.org/10.4324/9780429273445-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tashi, Igli, and Solange Ghernaouti-Hélie. "A Security Assurance Model to Holistically Assess the Information Security Posture." In Complex Intelligent Systems and Their Applications, 83–108. New York, NY: Springer New York, 2010. http://dx.doi.org/10.1007/978-1-4419-1636-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security complex"

1

Iskhakov, S. Yu, A. A. Shelupanov, and R. V. Mescheryakov. "Assessment of security systems complex networks security." In 2014 Dynamics of Systems, Mechanisms and Machines (Dynamics). IEEE, 2014. http://dx.doi.org/10.1109/dynamics.2014.7005656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blacknell, David. "Resolution in complex SAR images." In Defense and Security, edited by Edmund G. Zelnio and Frederick D. Garber. SPIE, 2004. http://dx.doi.org/10.1117/12.542160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Lifang, and XiuKun Yang. "Face recognition in complex backgrounds." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.543638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Doerry, A. W. "Representing SAR complex image pixels." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2016. http://dx.doi.org/10.1117/12.2214516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Capodieci, Andrew, Jimmy S. Gill, and Mark D. Ollis. "Wheel placement reasoning in complex terrain." In SPIE Defense + Security, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Hoa G. Nguyen. SPIE, 2017. http://dx.doi.org/10.1117/12.2266990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lauzon, Marc, Camille-Alain Rabbath, and Eric Gagnon. "UAV autonomy for complex environments." In Defense and Security Symposium, edited by Grant R. Gerhart, Charles M. Shoemaker, and Douglas W. Gage. SPIE, 2006. http://dx.doi.org/10.1117/12.669552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gregorio- de Souza, Ian, Vincent H. Berk, Annarita Giani, George Bakos, Marion Bates, George Cybenko, and Doug Madory. "Detection of complex cyber attacks." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.670131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Naqvi, Syed, and Michel Riguidel. "Security assurances for intelligent complex systems." In Defense and Security Symposium, edited by Kevin L. Priddy and Emre Ertin. SPIE, 2007. http://dx.doi.org/10.1117/12.719441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sedinic, Ivan, and Tamara Perusic. "Security Risk Management in complex organization." In 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2015. http://dx.doi.org/10.1109/mipro.2015.7160481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crespi, Valentino, Yong Sheng, and George Cybenko. "Trackability in complex situations and environments." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.670132.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security complex"

1

Lai, Ying-Cheng. Security of Complex Networks. Fort Belvoir, VA: Defense Technical Information Center, February 2010. http://dx.doi.org/10.21236/ada567229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vorobeychik, Yevgeniy. Strategic analysis of complex security scenarios. Office of Scientific and Technical Information (OSTI), September 2012. http://dx.doi.org/10.2172/1051713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Byrne, Raymond Harry, James Brian Rigdon, Brandon Robinson Rohrer, Glenn A. Laguna, Rush D. III Robinett, ), Kenneth Neal Groom, David Gerald Wilson, Robert J. Bickerstaff, and John J. Harrington. Design tools for complex dynamic security systems. Office of Scientific and Technical Information (OSTI), January 2007. http://dx.doi.org/10.2172/902217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elam, Shana, P. Bassett, and Kate McMordie Stoughton. Y-12 National Security Complex Water Assessment. Office of Scientific and Technical Information (OSTI), November 2010. http://dx.doi.org/10.2172/1034594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fox, Lora, and Laura Powledge. Statement of Work Y-12 National Security Complex Security Infrastructure Revitalization Program Project ? Combination Inspector. Office of Scientific and Technical Information (OSTI), July 2021. http://dx.doi.org/10.2172/1817288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Howard, Russell D. Educating Special Forces Junior Leaders for a Complex Security Environment. Fort Belvoir, VA: Defense Technical Information Center, July 2009. http://dx.doi.org/10.21236/ada514491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Castle, James M., Alfred C. Faber, Schneegas Jr., and D. A. Anarchy in the Streets: Restoring Public Security in Complex Contingencies. Fort Belvoir, VA: Defense Technical Information Center, May 1998. http://dx.doi.org/10.21236/ada353556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Landwehr, Carl E., and H. O. Lubbes. Determining Security Requirements for Complex Systems with the Orange Book. Fort Belvoir, VA: Defense Technical Information Center, January 1985. http://dx.doi.org/10.21236/ada465540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beck, G. S. Annual Storm Water Report for the Y-12 National Security Complex. Office of Scientific and Technical Information (OSTI), January 2007. http://dx.doi.org/10.2172/921626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, Nathanael J. K., Katherine A. Jones, Alisa Bandlow, Linda Karen Nozick, Lucas Waddell, Drew Levin, and Jonathan Whetzel. A Complex Systems Approach to More Resilient Multi-Layered Security Systems. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1431482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography