Description |
1 online resource. |
Physical Medium |
polychrome |
Description |
text file |
Series |
NATO science for peace and security series, D, Information and communication security ; vol. 47
|
|
NATO science for peace and security series. Sub-series D, Information and communication security ; v. 47.
|
Note |
"Proceedings of the NATO Advanced Research Workshop on Meeting Security Challenges Through Data Analytics and Decision Support, Aghveran, Armenia, 1-5 June 2015." |
|
International conference proceedings. |
|
Includes indexes. |
Contents |
Title Page; Preface; Contents; Section 1. Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management. |
|
Selective Sensitivity Sensor for Explosive Detection and IdentificationProtection and Recovery of Tampered Images Using Self-Embedding Procedures; Terrorism as a Threat to Tourism; Sustainable Development as a Tool Against Environmental Vulnerability; Section 2. Maritime and Border Security; Toward a Better Future Through Maritime Security; What Matters Most Is Not the Size of the ``Storm'' but the Scale of the Impact; Reasoning with Relational Models for Maritime Domain Security; PASSAGES -- A System for Improved Safety and Security of Maritime Operations in Arctic Areas. |
|
Modeling Maritime Contraband Trafficking Activities with the Agent-Based ApproachARETHUS -- A Decision Support Platform for Reasoning About Security; Main Aspects of Border Crossing Control Security Provision; Comparing Information Structures Used in the Maritime Defence and Security Domain; Border Surveillance Using UAVs with Thermal Camera; Human Identification Using Virtual 3D Imaging to Control Border Crossing; Naval Ship Classification with Generalized Belief Functions Using a New Approximation Algorithm; Section 3. Cyber Security; Hide and Seek in the Information Age. |
|
Real Time Streaming AlgorithmEfficiency of Generating Highly Nonlinear Boolean Functions over Quasigroups; Secure Data Hiding in PDF Files Using an Encrypted Secret Message; Secure Real-Time Data Transfer in the Cloud; Two-Party Oblivious DFA Evaluation Protocol; Distributed Data Storage in Cloud Systems Based on Error Correcting Codes; A Security Assessment Framework for e-Health: A Croatian Perspective; Security Issues of the e-Infrastructure for Environmental Research; Critical Aviation Information Systems Cybersecurity. |
|
Information Security -- Basis of the Education System for Digital Generation ZAre We Ready to Educate Security Professionals?; A Study of Security Threats in the Private Cloud; Subject Index; Author Index. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Terrorism -- Prevention -- Congresses.
|
|
Terrorism -- Prevention. |
|
National security -- Congresses.
|
|
National security. |
|
Computer security -- Congresses.
|
|
Computer security. |
Genre/Form |
Electronic books.
|
|
Conference papers and proceedings.
|
|
Conference papers and proceedings.
|
Added Author |
Shahbazian, E. (Elisa), editor.
|
|
Rogova, Galina, editor.
|
ISBN |
9781614997160 (electronic book) |
|
1614997160 (electronic book) |
|
9781614997153 (print) |
|