語系:
繁體中文
English
說明(常見問題)
登入
Advanced Sciences and Technologies for Security Applications,
書目資訊
open source intelligence investigation
open source intelligence investigation
information sharing in military oper...
information sharing in military operations
cyber defence in the age of ai, sma...
cyber defence in the age of ai, smart societies and augmented humanity
applications for artificial intelligence and digital forensics in national security
counter-terrorism, ethics and technology
counter-terrorism, ethics and technology
emerging technologies for the analys...
emerging technologies for the analysis of forensic traces
technology and the intelligence comm...
technology and the intelligence community
cyber weaponry
cyber weaponry
cybersecurity, privacy and freedom p...
cybersecurity, privacy and freedom protection in the connected world
analytical methods for nonproliferation
analytical methods for nonproliferation
applications of systems thinking and...
applications of systems thinking and soft operations research in managing complexity
social media and the armed forces
social media and the armed forces
exploring the security landscape: no...
exploring the security landscape: non-traditional security challenges
data-driven mining, learning and ana...
data-driven mining, learning and analytics for secured smart cities
security and defence: ethical and legal challenges in the face of current conflicts
science informed policing
science informed policing
blockchain and clinical trial
blockchain and clinical trial
applied biosecurity: global health, ...
applied biosecurity: global health, biodefense, and developing technologies
open source intelligence investigation
open source intelligence investigation
active interrogation in nuclear security
active interrogation in nuclear security
deep learning applications for cyber...
deep learning applications for cyber security
blockchain and other emerging technologies for digital business strategies
global challenges in maritime security
information management capabilities in public safety and security
wireless networks
(in)security
applications of systems thinking and...
applications of systems thinking and soft operations research in managing complexity
north american strategic defense in ...
north american strategic defense in the 21st century
optical and digital techniques for i...
optical and digital techniques for information security
machine learning for cyber agents
big data privacy and security in smart cities
combatting cybercrime and cyberterrorism
combatting cybercrime and cyberterrorism
neuroscience and the problem of dual use
neuroscience and the problem of dual use
tripping points on the roads to outw...
tripping points on the roads to outwit terror
sensemaking for security
sensemaking for security
biosensors for security and bioterro...
biosensors for security and bioterrorism applications
security by design
security by design
community policing - a european pers...
community policing - a european perspective
cross-cultural dialogue as a conflic...
cross-cultural dialogue as a conflict management strategy
safety dynamics
safety dynamics
security and defence in europe
security and defence in europe
energy and environmental security in...
energy and environmental security in developing countries
combatting cybercrime and cyberterrorism
combatting cybercrime and cyberterrorism
cyber weaponry
cyber weaponry
cbrne: challenges in the 21st century
radiological and nuclear terrorism
radiological and nuclear terrorism
asian organized crime and the anglosphere
cybersecurity and secure information...
cybersecurity and secure information systems
security in the global commons and b...
security in the global commons and beyond
information security technologies fo...
information security technologies for controlling pandemics
blockchain for international security
blockchain for international security
community resilience when disaster strikes
analytical methods for nonproliferation
analytical methods for nonproliferation
international security management
international security management
leaders for tomorrow: challenges for...
leaders for tomorrow: challenges for military leadership in the age of asymmetric warfare
digital forensic investigation of in...
digital forensic investigation of internet of things (iot) devices
cybercomplexity
active interrogation in nuclear security
active interrogation in nuclear security
security and privacy trends in the i...
security and privacy trends in the industrial internet of things
surveillance in action
surveillance in action
cybersecurity and secure information...
cybersecurity and secure information systems
cross-cultural dialogue as a conflic...
cross-cultural dialogue as a conflict management strategy
global health security
global health security
inclusive policing from the inside out
inclusive policing from the inside out
critical infrastructure security and...
critical infrastructure security and resilience
artificial intelligence in cyber sec...
artificial intelligence in cyber security: impact and implications
border management in transformation
border management in transformation
ai, blockchain and self-sovereign identity in higher education
resilience by design
resilience by design
resilience by design
resilience by design
resilience of cyber-physical systems
resilience of cyber-physical systems
countering violent extremism by winn...
countering violent extremism by winning hearts and minds
combating security challenges in the...
combating security challenges in the age of big data
disruptive and game changing technol...
disruptive and game changing technologies in modern warfare
averting nuclear war
game theory for managing security in...
game theory for managing security in chemical industrial areas
proliferation of weapons- and dual-u...
proliferation of weapons- and dual-use technologies
technology and the intelligence comm...
technology and the intelligence community
artificial intelligence and its contexts
artificial intelligence and its contexts
policing in the era of ai and smart ...
policing in the era of ai and smart societies
risk and the theory of security risk...
risk and the theory of security risk assessment
south africa's post-apartheid military
south africa's post-apartheid military
covid-19 disinformation: a multi-national, whole of society perspective
leadership in extreme situations
leadership in extreme situations
cyber criminology
cyber criminology
game theory for managing security in...
game theory for managing security in chemical industrial areas
deterrence
deterrence
cyber criminology
cyber criminology
security by design
security by design
north american strategic defense in ...
north american strategic defense in the 21st century:
urban resilience
urban resilience
security and privacy trends in the i...
security and privacy trends in the industrial internet of things
shift in the security paradigm
shift in the security paradigm
cyber-security in critical infrastru...
cyber-security in critical infrastructures
water safety, security and sustainab...
water safety, security and sustainability
challenges in the iot and smart envi...
challenges in the iot and smart environments
quantum technologies and military st...
quantum technologies and military strategy
exploring the security landscape
exploring the security landscape
urban resilience
urban resilience
global challenges in maritime security
global challenges in maritime security
disruption, ideation and innovation for defence and security
asia-pacific security challenges
asia-pacific security challenges
disaster forensics
disaster forensics
disaster forensics
disaster forensics
cyberspace
cyberspace
biosensors for security and bioterro...
biosensors for security and bioterrorism applications
securing social identity in mobile p...
securing social identity in mobile platforms
counter-terrorism technologies
counter-terrorism technologies
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入