Добірка наукової літератури з теми "Improving Defence and Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Improving Defence and Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Improving Defence and Security"
Saragih, Herlina JR, Rayanda Barnas, and Purwanto Purwanto. "Defense Management concepts improving Indonesian Maritime Security." Jurnal Pertahanan 2, no. 3 (September 29, 2016): 257. http://dx.doi.org/10.33172/jp.v2i3.104.
Повний текст джерелаDorosh, Lesia, and Vasyl Romanyk. "PESCO, CARD, EDF: Strategy, Analysis, and Financing in the European Union Security Guaratee." Humanitarian vision 6, no. 2 (November 25, 2020): 1–7. http://dx.doi.org/10.23939/shv2020.02.001.
Повний текст джерелаZaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 42–68. http://dx.doi.org/10.33731/52021.244518.
Повний текст джерелаZaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 4 (October 25, 2021): 33–53. http://dx.doi.org/10.33731/42021.243120.
Повний текст джерелаFiott, Daniel. "Improving CSDP Planning and Capability Development: Could there be a Frontex Formula?" European Foreign Affairs Review 18, Issue 1 (February 1, 2013): 47–62. http://dx.doi.org/10.54648/eerr2013003.
Повний текст джерелаBROŽIČ, LILIANA. "SECURITY AS AN IMPERATIVE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.00.
Повний текст джерелаPOPIEL, Henryk, Bogusław ROGOWSKI, and Krzysztof WALCZAK. "POLISH DEFENSE STANDARDS WITHIN THE EUROPEAN RANGE." National Security Studies 5, no. 1 (May 15, 2014): 311–20. http://dx.doi.org/10.37055/sbn/135200.
Повний текст джерелаNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Повний текст джерелаZaikivskyi, Oleksandr, and Oleksandr Onistrat. "Regulatory and legal support of intellectual property protection in the defense sphere (in the development of armaments and military equipment; in the implementation of international military- technical cooperation)." Theory and Practice of Intellectual Property, no. 6 (December 27, 2021): 49–67. http://dx.doi.org/10.33731/62021.248981.
Повний текст джерелаKosmacz-chorodowska, Anna. "Improving management in favour of defence and security on the basis of e-economy tools." Scientific Papers of Silesian University of Technology. Organization and Management Series 2018, no. 128 (2018): 231–42. http://dx.doi.org/10.29119/1641-3466.2018.128.19.
Повний текст джерелаДисертації з теми "Improving Defence and Security"
Opasinov, Aleksandar, and Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances." Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.
Повний текст джерелаDå stora framsteg och användning av datakommunikation har ökat exponentiellt på en global skala, med en förödande exponering av attacker och säkerhetshot mot hemanvändare såväl som stora företag, finns detalltid ett behov av förbättrad nätverksskydd. IT-avdelningen hos företaget OneDefence, valdes för att utföra examensprojektet och baserade sig på organisationens angivna information för att förbättra deras nätverksförsvar. Syftet med denna rapport är att sammanställa en lista på tio länder som utgör de allvarligaste IT-hoten i världen, samt begränsa attackytan för organisationens nätverk så mycket som möjligt medan man behåller alla nödvändiga tjänster till användare utomlands. Efter att ha undersökt länderna, anordnades en prototyp för att efterlikna delar av OneDefences topologi av intresse och testattacker utfördes enligt metodologikapitlet. Resultaten av utredningarna visade att från de länder som utfört de allra allvarliga cyberhoten inkluderade bland annat Kina, Ryssland och Nordkorea, som har beräknats statistiskt baserat på antalet igenkända cyberwarfare attacker. Resultaten från de olika DoS-attackerna visade att en IPS bör vara kärnan i en organisations nätverksförsvar för att kunna bekämpa dessa intrång, samt potentiellt andra typer. Med hjälp av den prototyp som byggdes baserad på organisationens topologi, blockerades flera attacker rätt framgångsrikt, med en låg procentandel av paketen som gick genom säkerhetsenheten. Slutligen utforskades ytterligare förbättringar av försvarsförmågan hos organisationen genom att jämföra olika produkter och enheter. Detta resulterade i produkter från Fortinet-varumärket såsom FortiGate NGFW med UTM förmåga, då de erbjuder flera fördelar jämfört med konkurrenter.
Wu, Xuan. "Improving Electric Grid Security: Defense Planning and Security Constrained ACOPF via Robust Optimization." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1543563463428344.
Повний текст джерелаCaudle, Sharon L. "Homeland security and capabilities-based planning : improving national preparedness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCaudle.pdf.
Повний текст джерелаThesis Advisor(s): C.J. LaCivita, Kathryn E. Newcomer. Includes bibliographical references (p. 87-94). Also available online.
Morrell, Christopher Frank. "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/79791.
Повний текст джерелаPh. D.
Navas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.
Повний текст джерелаInternet of Things (IoT) systems are increasingly being deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving Target Defense (MTD) is a cyberdefense paradigm that proposes to randomize components of systems, with the intention of thwarting cyberattacks that previously relied in the static nature of systems. Attackers are now constrained by time. MTD has been successfully implemented in conventional systems, but its use to improve IoT security is still lacking in the literature. Over the course of this thesis, we validated MTD as a cybersecurity paradigm suitable for IoT systems. We identified and synthesized existing MTD techniques for IoT using a systematic literature review method,and defined and used four novel entropy related metrics to measure MTD techniques qualitative properties. Secondly, we proposed a generic distributed MTD framework that allows the instantiation of concrete MTD strategies suitable for the constraints of the IoT. Finally, we designed an secure time synchronization protocol, and instantiated three particular MTD techniques: two at the upper network layers (e.g. port-hopping, and application RESTful interfaces) -and validated one of them in real hardware-, and the third one at the physical layer to achieve IoT systems resilient to insider attacks/jamming by using Direct Sequence Spread-Spectrum techniques with cryptographically-strong pseudo-random sequences
Pohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.
Повний текст джерелаYoung, Christopher J. "The European security and defence identity debate." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ56151.pdf.
Повний текст джерелаFrey, Stefanie. "Swiss defence and security policy 1945-73." Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.
Повний текст джерелаBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Повний текст джерелаWing, Ian Politics Australian Defence Force Academy UNSW. "Australian Defence in transition: responding to new security challenges." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Politics, 2002. http://handle.unsw.edu.au/1959.4/38662.
Повний текст джерелаКниги з теми "Improving Defence and Security"
1944-, Johnson Stuart E., and Larrabee F. Stephen, eds. Persian Gulf security--improving allied military contributions. Santa Monica, CA: Rand, 2000.
Знайти повний текст джерелаGlobal Maritime Information Sharing Symposium (2nd 2009 National Defense University). Streamlining information sharing: Improving efficiency, security, safety and the environment : Global Maritime Information Sharing Symposium 2009, September 15-17, National Defense University; Fort Lesley J. McNair, Washington, D.C. [Washington, DC: Office of Global Maritime Situational Awareness], 2009.
Знайти повний текст джерелаConahan, Frank C. Contract pricing: Improving Defense management and oversight : statement of Frank C. Conahan, Assistant Comptroller General, National Security and International Affairs Division, before the Committee on Governmental Affairs, United States Senate. Washington, D.C: The Office, 1992.
Знайти повний текст джерелаOffice, General Accounting. Nuclear nonproliferation: Limited progress in improving nuclear material security in Russia and the newly independent states : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Знайти повний текст джерелаBorg-Neervoort, Marlies ter. Defence technology assessment: Improving defence decision-making. Amsterdam: Nederlandse Organisatie voor Technologisch Aspectenonderzoek, 1987.
Знайти повний текст джерелаImproving financial accountability at the Department of Defense: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, of the One Hundred Eleventh Congress, second session, September 29, 2010. Washington: U.S. G.P.O., 2011.
Знайти повний текст джерелаDemocrats, Liberal. Defence and security. Dorchester: Liberal Democrat Pubns., 1998.
Знайти повний текст джерелаImproving financial and business management at the Department of Defense: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, October 16, 2007. Washington: U.S. G.P.O., 2008.
Знайти повний текст джерелаGreat Britain. Museums and Galleries Commission. Improving museum security. London: Museums & Galleries Commission, 1997.
Знайти повний текст джерелаNeedle, Jerome A. Improving transit security. Washington, D.C: National Academy Press, 1997.
Знайти повний текст джерелаЧастини книг з теми "Improving Defence and Security"
Kanturska, Urszula, Jan-Dirk Schmöcker, Achille Fonzone, and Michael G. H. Bell. "Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport." In Game Theoretic Risk Analysis of Security Threats, 199–227. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_9.
Повний текст джерелаMohaisen, Aziz, and Scott Hollenbeck. "Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs." In Information Security Applications, 65–80. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9_5.
Повний текст джерелаCheung, Catherine, Julio J. Valdés, and Jobin Puthuparampil. "Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques." In Recent Advances in Computational Intelligence in Defense and Security, 605–34. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26450-9_22.
Повний текст джерелаLi, Nianyu, Mingyue Zhang, Eunsuk Kang, and David Garlan. "Engineering Secure Self-Adaptive Systems with Bayesian Games." In Fundamental Approaches to Software Engineering, 130–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_7.
Повний текст джерелаMcCormack, John, and Tim Burnett. "Defence acquisition." In Managing Security, 160–76. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-11.
Повний текст джерелаLeuffen, Dirk, Berthold Rittberger, and Frank Schimmelfennig. "Security and Defence." In Differentiated Integration, 184–220. London: Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-28501-0_7.
Повний текст джерелаDoran, Susan. "Security and Defence." In England and Europe in the Sixteenth Century, 42–79. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-26990-7_3.
Повний текст джерелаBluth, Christoph. "Defence and Security." In Khrushchev and Khrushchevism, 194–214. London: Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18646-4_12.
Повний текст джерелаRice, Condoleezza. "Defence and Security." In The Soviet Union Under Gorbachev, 192–209. London: Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18648-8_11.
Повний текст джерелаDönges, Hannah E., and Stephanie C. Hofmann. "Defence As Security." In Routledge Handbook Of Defence Studies, 29–39. Abingdon, Oxon: New York, NY: Routledge, [2018]: Routledge, 2018. http://dx.doi.org/10.4324/9781315650463-4.
Повний текст джерелаТези доповідей конференцій з теми "Improving Defence and Security"
Barrat, Catherine, and Gildas Chauvel. "Improving cooling of cavity blackbodies." In SPIE Security + Defence, edited by David A. Huckridge and Reinhard Ebert. SPIE, 2013. http://dx.doi.org/10.1117/12.2028874.
Повний текст джерелаOttaviani, Carlo, Riccardo Laurenza, Thomas P. W. Cope, Gaetana Spedalieri, Samuel L. Braunstein, and Stefano Pirandola. "Secret key capacity of the thermal-loss channel: improving the lower bound." In SPIE Security + Defence, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2244899.
Повний текст джерелаAnderson, D., and D. G. Thomson. "Improving rotorcraft survivability to RPG attack using inverse methods." In SPIE Europe Security + Defence, edited by David H. Titterton and Mark A. Richardson. SPIE, 2009. http://dx.doi.org/10.1117/12.832298.
Повний текст джерелаHeineman, William R., Carl J. Seliskar, Laura K. Morris, and Samuel A. Bryan. "Spectroelectrochemistry as a strategy for improving selectivity of sensors for security and defense applications." In SPIE Security + Defence, edited by Roberto Zamboni, François Kajzar, and Attila A. Szep. SPIE, 2012. http://dx.doi.org/10.1117/12.965308.
Повний текст джерелаTrofimov, Vyacheslav A., and Vladislav V. Trofimov. "Real-time computer processing of image from THz passive imaging device for improving of images." In SPIE Security + Defence, edited by Neil A. Salmon and Eddie L. Jacobs. SPIE, 2012. http://dx.doi.org/10.1117/12.965546.
Повний текст джерелаHarder, James A., and Michaelene Sprague. "Improving transmission and image contrast in medium and high performance optical systems using weighted average angle of incidence techniques to optimize coatings." In SPIE Europe Security and Defence, edited by Gari Owen. SPIE, 2008. http://dx.doi.org/10.1117/12.797531.
Повний текст джерела"Simulation for Education: Improving Personal Responsiveness in Case of Violent Attack." In The 11th International Defence and Homeland Security Simulation Worskhop. CAL-TEK srl, 2021. http://dx.doi.org/10.46354/i3m.2021.dhss.002.
Повний текст джерелаWhitman, Lucy S., Colin Lewis, and John P. Oakley. "Improving human object recognition performance using video enhancement techniques." In European Symposium on Optics and Photonics for Defence and Security, edited by Tim P. Donaldson and Colin Lewis. SPIE, 2004. http://dx.doi.org/10.1117/12.581827.
Повний текст джерелаFiliberti, Daniel P., and Robert A. Schowengerdt. "Improving multisource image fusion using thematic content." In Defense and Security, edited by Zia-ur Rahman, Robert A. Schowengerdt, and Stephen E. Reichenbach. SPIE, 2004. http://dx.doi.org/10.1117/12.541678.
Повний текст джерелаLanzagorta, Marco, Jeffrey Uhlmann, Truc Le, Oliverio Jitrik, and Salvador E. Venegas-Andraca. "Improving quantum sensing efficiency with virtual modes." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2016. http://dx.doi.org/10.1117/12.2223981.
Повний текст джерелаЗвіти організацій з теми "Improving Defence and Security"
Davies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135010.
Повний текст джерелаWing, Ian. The Australian Defence Force: Broadened Concepts of Security Operations. Fort Belvoir, VA: Defense Technical Information Center, October 1998. http://dx.doi.org/10.21236/ada386066.
Повний текст джерелаAlt, Josef. The Future of the European Security and Defence Policy. Fort Belvoir, VA: Defense Technical Information Center, April 2006. http://dx.doi.org/10.21236/ada475658.
Повний текст джерелаTagarev, Todor. Methodology for Defence Planning in the Context of Security Strategy Planning. Procon, 2007. http://dx.doi.org/10.11610/it4sec.0016.
Повний текст джерелаMillar, Katharine, James Shires, and Tatiana Tropina. Gender Approaches to Cybersecurity: Design, Defence and Response. The United Nations Institute for Disarmament Research, January 2021. http://dx.doi.org/10.37559/gen/21/01.
Повний текст джерелаEstevens, João. Migration crisis in the EU: developing a framework for analysis of national security and defence strategies. IPRI-NOVA, May 2018. http://dx.doi.org/10.23906/wp57/2018.
Повний текст джерелаMarkets, Policies Institutions. Improving tenure security for pastoralists in East Africa. Washington, DC: International Food Policy Research Institute, 2020. http://dx.doi.org/10.2499/p15738coll2.134136.
Повний текст джерелаLinquist, Daniel A. Assessing Security Cooperation: Improving Methods to Maximize Effects. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada589336.
Повний текст джерелаDuben, Andey Kirillovich. IMPROVING THE INFORMATION SECURITY SYSTEM: COMPARATIVE LEGAL ANALYSIS. DOI СODE, 2022. http://dx.doi.org/10.18411/3673_2022_2_197_203.
Повний текст джерелаManzoor, Ahmad. Improving the International Governance of Food Security and Trade. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2011. http://dx.doi.org/10.7215/ag_ip_20110923.
Повний текст джерела