default search action
Meeting Security Challenges Through Data Analytics and Decision Support 2016
- Elisa Shahbazian, Galina Rogova:
Meeting Security Challenges Through Data Analytics and Decision Support. NATO Science for Peace and Security Series - D: Information and Communication Security 47, IOS Press 2016, ISBN 978-1-61499-715-3 - Galina Rogova, James Llinas:
Arguing About Uncertain Heterogeneous Information for Threat Assessment. 3-17 - Elisa Shahbazian:
Intelligence Analysis: Needs and Solutions. 18-31 - Dave Braines:
Building Agile Human/Machine Teams with Controlled Natural Language. 32-43 - David Griol, Jesús García Herrero, José Manuel Molina:
Military Usages of Speech and Language Technologies: A Review. 44-68 - Valentina Dragos:
Comparative Studies on Using Semantic Filtering for Open Relation Identification. 69-77 - Éloi Bossé, Basel Solaiman:
Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems. 78-85 - Alan N. Steinberg:
Data Fusion and Response Management. 86-98 - Surik Khudaverdyan, Stepan Tsaturyan, Ashok Vaseashta:
Selective Sensitivity Sensor for Explosive Detection and Identification. 99-107 - David G. Asatryan, Naira Asatryan:
Protection and Recovery of Tampered Images Using Self-Embedding Procedures. 108-113 - Jolanta Rodzos:
Terrorism as a Threat to Tourism. 114-122 - Liviu-Daniel Galatchi:
Sustainable Development as a Tool Against Environmental Vulnerability. 123-129 - Andrea Mucedola:
Toward a Better Future Through Maritime Security. 133-142 - Dominique Cant:
What Matters Most Is Not the Size of the "Storm" but the Scale of the Impact. 143-146 - Lauro Snidaro, Ingrid Visentini:
Reasoning with Relational Models for Maritime Domain Security. 147-155 - Joachim Biermann:
PASSAGES - A System for Improved Safety and Security of Maritime Operations in Arctic Areas. 156-167 - Ondrej Vanek, Stepán Kopriva, Jakub Ondrácek, Ondrej Hrstka, Michal Pechoucek:
Modeling Maritime Contraband Trafficking Activities with the Agent-Based Approach. 168-183 - Ondrej Vanek, Stepán Kopriva, Ondrej Hrstka, Michal Pechoucek:
ARETHUS - A Decision Support Platform for Reasoning About Security. 184-202 - Samvel Muradyan, Robert Hakobyan, Artashes Hakobyan, Vahan Tovmasyan, Artashes Tovmasyan:
Main Aspects of Border Crossing Control Security Provision. 203-206 - Anthony W. Isenor, Yannick Allard, Michel Mayrand:
Comparing Information Structures Used in the Maritime Defence and Security Domain. 207-218 - Narek Hayrapetyan, Robert Hakobyan, Aghasy Poghosyan, Vazgen Gabrielyan:
Border Surveillance Using UAVs with Thermal Camera. 219-225 - Hayk Hakobyan, Robert Hakobyan, Koryun Aslanyan:
Human Identification Using Virtual 3D Imaging to Control Border Crossing. 226-230 - Gayane Markarova:
Hide and Seek in the Information Age. 243-247 - Gevorg Margarov, Mher Markosyan, Yeghisabet Alaverdyan:
Real Time Streaming Algorithm. 248-255 - Yeghisabet Alaverdyan:
Efficiency of Generating Highly Nonlinear Boolean Functions over Quasigroups. 256-263 - Anahit Arshakyan:
Secure Data Hiding in PDF Files Using an Encrypted Secret Message. 264-270 - Vladimir Hovsepyan:
Secure Real-Time Data Transfer in the Cloud. 271-275 - Gurgen Khachatryan, Mihran Hovsepyan, Aram Jivanyan:
Two-Party Oblivious DFA Evaluation Protocol. 276-286 - Artak Khemchyan:
Distributed Data Storage in Cloud Systems Based on Error Correcting Codes. 287-292 - Hrvoje Belani, Igor Ljubi, Bruno Blaskovic:
A Security Assessment Framework for e-Health: A Croatian Perspective. 293-300 - Hrachya V. Astsatryan:
Security Issues of the e-Infrastructure for Environmental Research. 301-307 - Sergiy Gnatyuk:
Critical Aviation Information Systems Cybersecurity. 308-316 - Gevorg Margarov:
Information Security - Basis of the Education System for Digital Generation Z. 317-325 - Ján Genci:
Are We Ready to Educate Security Professionals? 326-330 - Yelena Satimowa, Assel Bytleuowa:
A Study of Security Threats in the Private Cloud. 331-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.