Language:
English
繁體中文
Help
Login
Advanced Sciences and Technologies for Security Applications,
Titles
optical and digital techniques for i...
optical and digital techniques for information security
applications of systems thinking and...
applications of systems thinking and soft operations research in managing complexity
resilience by design
resilience by design
exploring the security landscape
exploring the security landscape
biosensors for security and bioterro...
biosensors for security and bioterrorism applications
analytical methods for nonproliferation
analytical methods for nonproliferation
combatting cybercrime and cyberterrorism
combatting cybercrime and cyberterrorism
urban resilience
urban resilience
disaster forensics
disaster forensics
open source intelligence investigation
open source intelligence investigation
leadership in extreme situations
leadership in extreme situations
community policing - a european pers...
community policing - a european perspective
cyberspace
cyberspace
cyber weaponry
cyber weaponry
cross-cultural dialogue as a conflic...
cross-cultural dialogue as a conflict management strategy
technology and the intelligence comm...
technology and the intelligence community
north american strategic defense in ...
north american strategic defense in the 21st century
active interrogation in nuclear security
active interrogation in nuclear security
game theory for managing security in...
game theory for managing security in chemical industrial areas
security by design
security by design
cyber criminology
cyber criminology
security and privacy trends in the i...
security and privacy trends in the industrial internet of things
cybersecurity and secure information...
cybersecurity and secure information systems
information sharing in military oper...
information sharing in military operations
inclusive policing from the inside out
inclusive policing from the inside out
open source intelligence investigation
open source intelligence investigation
biosensors for security and bioterro...
biosensors for security and bioterrorism applications
combatting cybercrime and cyberterrorism
combatting cybercrime and cyberterrorism
disaster forensics
disaster forensics
analytical methods for nonproliferation
analytical methods for nonproliferation
resilience by design
resilience by design
urban resilience
urban resilience
exploring the security landscape: no...
exploring the security landscape: non-traditional security challenges
applications of systems thinking and...
applications of systems thinking and soft operations research in managing complexity
north american strategic defense in ...
north american strategic defense in the 21st century:
cross-cultural dialogue as a conflic...
cross-cultural dialogue as a conflict management strategy
technology and the intelligence comm...
technology and the intelligence community
active interrogation in nuclear security
active interrogation in nuclear security
cyber weaponry
cyber weaponry
cyber criminology
cyber criminology
game theory for managing security in...
game theory for managing security in chemical industrial areas
security by design
security by design
asia-pacific security challenges
asia-pacific security challenges
surveillance in action
surveillance in action
resilience of cyber-physical systems
resilience of cyber-physical systems
critical infrastructure security and...
critical infrastructure security and resilience
emerging technologies for the analys...
emerging technologies for the analysis of forensic traces
risk and the theory of security risk...
risk and the theory of security risk assessment
safety dynamics
safety dynamics
blockchain and clinical trial
blockchain and clinical trial
deep learning applications for cyber...
deep learning applications for cyber security
cybersecurity and secure information...
cybersecurity and secure information systems
security and privacy trends in the i...
security and privacy trends in the industrial internet of things
counter-terrorism technologies
counter-terrorism technologies
global health security
global health security
countering violent extremism by winn...
countering violent extremism by winning hearts and minds
cyber-security in critical infrastru...
cyber-security in critical infrastructures
social media and the armed forces
social media and the armed forces
neuroscience and the problem of dual use
neuroscience and the problem of dual use
policing in the era of ai and smart ...
policing in the era of ai and smart societies
cyber defence in the age of ai, sma...
cyber defence in the age of ai, smart societies and augmented humanity
security and defence in europe
security and defence in europe
disruptive and game changing technol...
disruptive and game changing technologies in modern warfare
deterrence
deterrence
securing social identity in mobile p...
securing social identity in mobile platforms
global challenges in maritime security
global challenges in maritime security
science informed policing
science informed policing
shift in the security paradigm
shift in the security paradigm
combating security challenges in the...
combating security challenges in the age of big data
south africa's post-apartheid military
south africa's post-apartheid military
energy and environmental security in...
energy and environmental security in developing countries
water safety, security and sustainab...
water safety, security and sustainability
radiological and nuclear terrorism
radiological and nuclear terrorism
international security management
international security management
proliferation of weapons- and dual-u...
proliferation of weapons- and dual-use technologies
quantum technologies and military st...
quantum technologies and military strategy
tripping points on the roads to outw...
tripping points on the roads to outwit terror
border management in transformation
border management in transformation
digital forensic investigation of in...
digital forensic investigation of internet of things (iot) devices
data-driven mining, learning and ana...
data-driven mining, learning and analytics for secured smart cities
information security technologies fo...
information security technologies for controlling pandemics
leaders for tomorrow: challenges for...
leaders for tomorrow: challenges for military leadership in the age of asymmetric warfare
security in the global commons and b...
security in the global commons and beyond
cybersecurity, privacy and freedom p...
cybersecurity, privacy and freedom protection in the connected world
applied biosecurity: global health, ...
applied biosecurity: global health, biodefense, and developing technologies
sensemaking for security
sensemaking for security
blockchain for international security
blockchain for international security
challenges in the iot and smart envi...
challenges in the iot and smart environments
artificial intelligence in cyber sec...
artificial intelligence in cyber security: impact and implications
artificial intelligence and its contexts
artificial intelligence and its contexts
counter-terrorism, ethics and technology
counter-terrorism, ethics and technology
disruption, ideation and innovation for defence and security
big data privacy and security in smart cities
community resilience when disaster strikes
cbrne: challenges in the 21st century
cybercomplexity
security and defence: ethical and legal challenges in the face of current conflicts
machine learning for cyber agents
covid-19 disinformation: a multi-national, whole of society perspective
blockchain and other emerging technologies for digital business strategies
ai, blockchain and self-sovereign identity in higher education
wireless networks
applications for artificial intelligence and digital forensics in national security
averting nuclear war
asian organized crime and the anglosphere
global challenges in maritime security
(in)security
information management capabilities in public safety and security
Processing
...
Change password
Login