


default search action
Meeting Security Challenges Through Data Analytics and Decision Support 2016
- Elisa Shahbazian, Galina Rogova:

Meeting Security Challenges Through Data Analytics and Decision Support. NATO Science for Peace and Security Series - D: Information and Communication Security 47, IOS Press 2016, ISBN 978-1-61499-715-3 - Galina Rogova, James Llinas:

Arguing About Uncertain Heterogeneous Information for Threat Assessment. 3-17 - Elisa Shahbazian:

Intelligence Analysis: Needs and Solutions. 18-31 - Dave Braines

:
Building Agile Human/Machine Teams with Controlled Natural Language. 32-43 - David Griol, Jesús García Herrero, José Manuel Molina:

Military Usages of Speech and Language Technologies: A Review. 44-68 - Valentina Dragos

:
Comparative Studies on Using Semantic Filtering for Open Relation Identification. 69-77 - Éloi Bossé, Basel Solaiman:

Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems. 78-85 - Alan N. Steinberg:

Data Fusion and Response Management. 86-98 - Surik Khudaverdyan, Stepan Tsaturyan, Ashok Vaseashta

:
Selective Sensitivity Sensor for Explosive Detection and Identification. 99-107 - David G. Asatryan, Naira Asatryan:

Protection and Recovery of Tampered Images Using Self-Embedding Procedures. 108-113 - Jolanta Rodzos

:
Terrorism as a Threat to Tourism. 114-122 - Liviu-Daniel Galatchi:

Sustainable Development as a Tool Against Environmental Vulnerability. 123-129 - Andrea Mucedola:

Toward a Better Future Through Maritime Security. 133-142 - Dominique Cant:

What Matters Most Is Not the Size of the "Storm" but the Scale of the Impact. 143-146 - Lauro Snidaro

, Ingrid Visentini:
Reasoning with Relational Models for Maritime Domain Security. 147-155 - Joachim Biermann:

PASSAGES - A System for Improved Safety and Security of Maritime Operations in Arctic Areas. 156-167 - Ondrej Vanek, Stepán Kopriva, Jakub Ondrácek, Ondrej Hrstka, Michal Pechoucek

:
Modeling Maritime Contraband Trafficking Activities with the Agent-Based Approach. 168-183 - Ondrej Vanek, Stepán Kopriva, Ondrej Hrstka, Michal Pechoucek

:
ARETHUS - A Decision Support Platform for Reasoning About Security. 184-202 - Samvel Muradyan, Robert Hakobyan, Artashes Hakobyan, Vahan Tovmasyan, Artashes Tovmasyan:

Main Aspects of Border Crossing Control Security Provision. 203-206 - Anthony W. Isenor

, Yannick Allard, Michel Mayrand:
Comparing Information Structures Used in the Maritime Defence and Security Domain. 207-218 - Narek Hayrapetyan, Robert Hakobyan, Aghasy Poghosyan, Vazgen Gabrielyan:

Border Surveillance Using UAVs with Thermal Camera. 219-225 - Hayk Hakobyan, Robert Hakobyan, Koryun Aslanyan:

Human Identification Using Virtual 3D Imaging to Control Border Crossing. 226-230 - Gayane Markarova:

Hide and Seek in the Information Age. 243-247 - Gevorg Margarov

, Mher Markosyan, Yeghisabet Alaverdyan:
Real Time Streaming Algorithm. 248-255 - Yeghisabet Alaverdyan:

Efficiency of Generating Highly Nonlinear Boolean Functions over Quasigroups. 256-263 - Anahit Arshakyan:

Secure Data Hiding in PDF Files Using an Encrypted Secret Message. 264-270 - Vladimir Hovsepyan:

Secure Real-Time Data Transfer in the Cloud. 271-275 - Gurgen Khachatryan, Mihran Hovsepyan, Aram Jivanyan:

Two-Party Oblivious DFA Evaluation Protocol. 276-286 - Artak Khemchyan:

Distributed Data Storage in Cloud Systems Based on Error Correcting Codes. 287-292 - Hrvoje Belani

, Igor Ljubi, Bruno Blaskovic
:
A Security Assessment Framework for e-Health: A Croatian Perspective. 293-300 - Hrachya V. Astsatryan:

Security Issues of the e-Infrastructure for Environmental Research. 301-307 - Sergiy Gnatyuk

:
Critical Aviation Information Systems Cybersecurity. 308-316 - Gevorg Margarov

:
Information Security - Basis of the Education System for Digital Generation Z. 317-325 - Ján Genci:

Are We Ready to Educate Security Professionals? 326-330 - Yelena Satimowa

, Assel Bytleuowa:
A Study of Security Threats in the Private Cloud. 331-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














