Academic literature on the topic 'Defence of information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defence of information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Defence of information"

1

Fatima Akram and Mahwesh Arooj Naz. "Ego defense mechanisms, medication adherence and self-management of the patients with type 2 diabetes." Journal of the Pakistan Medical Association 71, no. 2 (2020): 624–28. http://dx.doi.org/10.47391/jpma.706.

Full text
Abstract:
Objective: To explore relationship involving Ego Defence Mechanism, Medication Adherence and Self-Management of patients with type 2 diabetes. Method: The cross-sectional co-relational study was conducted at the Government College University, Lahore, Pakistan, from November 2017 to November 2018, and comprised diabetics aged 25-55 years. Other than demographic information, data was collected using the Urdu versions of the Defense Style Questionnaire, the Medication Adherence Scale, and the Diabetic Self-management Questionnaire. Data was analysed using SPSS 22. Results: Of the 150 patients, 75
APA, Harvard, Vancouver, ISO, and other styles
2

GHERMAN, Laurian. "DEFENCE ARCHITECTURE BASED ON INFORMATION AGE OODA LOOP." Review of the Air Force Academy 15, no. 3 (2017): 111–18. http://dx.doi.org/10.19062/1842-9238.2017.15.3.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy, and considering the fact that the defense forces are an inseparable part of state security, the study of their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored b
APA, Harvard, Vancouver, ISO, and other styles
4

Anand, Vinod. "Information technology and Defence forces." Strategic Analysis 23, no. 8 (1999): 1399–403. http://dx.doi.org/10.1080/09700169908455130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yao, Jianbo, and Tao Zhang. "Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game." Journal of Physics: Conference Series 2732, no. 1 (2024): 012002. http://dx.doi.org/10.1088/1742-6596/2732/1/012002.

Full text
Abstract:
Abstract The process of attack and defence of side channel attack can be regarded as the process of mutual information game, the two sides of the game are the cryptographic device designer (defence) and the enemy. The game goal of the defender is to reduce the local and global risks caused by side channel leakage by formulating relevant defence strategies; For the enemy, the goal of the game is just the opposite. From the perspective of making security strategy and reducing security risk, the mutual information game theory is introduced into the decision-making process of crypto chip designers
APA, Harvard, Vancouver, ISO, and other styles
6

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy. Considering that the defence forces are an inseparable part of state security, studying their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored by the defence for
APA, Harvard, Vancouver, ISO, and other styles
7

CIEŚLAK, Eugeniusz. "Air defense of the Baltic states. Looking toward the future." Safety & Defense 7, no. 2 (2021): 12–21. http://dx.doi.org/10.37105/sd.158.

Full text
Abstract:
The article offers the discussion of the origins, current state and the future of air defence of the Baltic states. It tries to relate developments in the field of air defense to changes in security environment, and defence polices of the Baltic states. The article starts with a retrospection on origins and developments of air defence of the Baltic states before they joined NATO. Then it focuses on early years of integration with NATO Integrated Air Defense System and implications for air defence of the Baltic states related to changes in the security of the Euro-Atlantic region stemming from
APA, Harvard, Vancouver, ISO, and other styles
8

Munro, Richard. "Indexing defence: an indexer’s defence." Indexer: The International Journal of Indexing: Volume 24, Issue 1 24, no. 1 (2004): 21–23. http://dx.doi.org/10.3828/indexer.2004.24.1.9.

Full text
Abstract:
Every profession has its own language, history and nuances. The military is no different. It is a profession shot through with mystique and its own terminology. Minefields for indexers abound. Without a sound knowledge of the period, event, person or equipment being indexed, mistakes, easily spotted by an ever-more informed and sophisticated readership, can be made.
APA, Harvard, Vancouver, ISO, and other styles
9

Marsh, P. "Paper defence [security]." Information Professional 2, no. 1 (2005): 34–37. http://dx.doi.org/10.1049/inp:20050105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Milojević, Ivan. "Accounting information system and information in the defence system." Oditor - casopis za Menadzment, finansije i pravo 3, no. 2 (2017): 54–66. http://dx.doi.org/10.5937/oditor1702054m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Defence of information"

1

Taylor, Jayne Louise. "Information processing & defence in psychosis." Thesis, Teesside University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518735.

Full text
Abstract:
In recent years, previous research has indicated that symptoms such as delusional beliefs may have a defensive function against underlying negative schemata (Candido & Romney, 1991; Lyon et al. 1994). However, hitherto research has failed to examine information processing in psychosis across the processing spectrum. The aim of the present research was to investigate cognitive functioning in psychosis on several tasks operating at different levels of conscious and non-conscious processing in order to ascertain at what level the defence operates. The research also investigated the impact of pers
APA, Harvard, Vancouver, ISO, and other styles
2

Deakin, Robert Luke. "Economic information warfare : analysis of the relationship between the protection of financial information infrastructure and Australia's national security." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15900/1/Robert_Deakin_Thesis.pdf.

Full text
Abstract:
The thesis presents an argument for the re-alignment of Australia's National Security efforts so that they mirror the changes occurring in our economy and society. Specifically, it seeks outcomes that can focus our efforts in protecting the critical infrastructure including our financial information infrastructure, from new and emerging threats. The thesis presents a definition of security as it applies to the Nation-State and provides the evidence of the changes in conflict and global security. It outlines the changes in the National Security environment and identifies emerging forms o
APA, Harvard, Vancouver, ISO, and other styles
3

Deakin, Robert Luke. "Economic Information Warfare : Analysis of the relationship between the protection of Financial Information Infrastructure and Australia's National Security." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15900/.

Full text
Abstract:
The thesis presents an argument for the re-alignment of Australia's National Security efforts so that they mirror the changes occurring in our economy and society. Specifically, it seeks outcomes that can focus our efforts in protecting the critical infrastructure including our financial information infrastructure, from new and emerging threats. The thesis presents a definition of security as it applies to the Nation-State and provides the evidence of the changes in conflict and global security. It outlines the changes in the National Security environment and identifies emerging forms of co
APA, Harvard, Vancouver, ISO, and other styles
4

Stiff, Harald. "Explainable AI as a Defence Mechanism for Adversarial Examples." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260347.

Full text
Abstract:
Deep learning is the gold standard for image classification tasks. With its introduction came many impressive improvements in computer vision outperforming all of the earlier machine learning models. However, in contrast to the success it has been shown that deep neural networks are easily fooled by adversarial examples, data that have been modified slightly to cause the neural networks to make incorrect classifications. This significant disadvantage has caused an increased doubt in neural networks and it has been questioned whether or not they are safe to use in practice. In this thesis we pr
APA, Harvard, Vancouver, ISO, and other styles
5

Bester, Christoffel. "The management of information inside the general support base concept of the South African National Defence Force." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/16475.

Full text
Abstract:
Thesis (MMil)--Stellenbosch University, 2003.<br>ENGLISH ABSTRACT: Managing any government institution has become increasingly complicated as the requirements for accountability; streamlined operations and greater flexibility have multiplied. As effective and efficient management becomes more complex and the demands of constant change are more insistent, consequently the role of information as an organisational resource assumes greater importance for management on all levels inside the organisation. Management relies heavily on information to thrive. The value of information is derived fr
APA, Harvard, Vancouver, ISO, and other styles
6

Pullinger, Stephen Bernard. "Parliament and the defence debate : the generation, provision and use of specialist information." Thesis, University of Bradford, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.235642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weiss, Alexander Peter William. "The use of commercial off-the-shelf information technology in operational defence equipment." Thesis, University College London (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karlsson, Terése. "Contingency planning for Bofors Defence AB, an application of existing methods." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1639.

Full text
Abstract:
<p>Bofors Defence AB is in the process of updating and documenting the company’s routines for information security. The object is to be certified according to the standard ISO 17799-1 during 2003. Among other things updating means that the company will be provided with contingency plans who should insure a reliable IT-environment. Basically it is all about protecting the company’s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities. The aim of the Thesis was to apply existing methods in the making of contingency plans. T
APA, Harvard, Vancouver, ISO, and other styles
9

Björklund, Kristoffer. "What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104886.

Full text
Abstract:
Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. Through a literature review, this thesis explores prevalent techniques used by attackers and their efficacy. Furthermore, it investigates detection techniques and defensive measures against stegomalware. The results show that embedding information in images is common for exfiltrating data or sending smaller files to an infected host. Wor
APA, Harvard, Vancouver, ISO, and other styles
10

Lekhawatthanapong, Thattaporn. "Establishing statutory ground for the public interest defence under international copyright law." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/50736/.

Full text
Abstract:
Maintaining a fair balance between individuals’ interests and the public interest is arguably believed to be the most effective approach in serving the ultimate objective of copyright: to promote social, economic and cultural development for the benefit of both rightsholders and the public at large. Through this balanced approach, creativity can be maximised and thrive better than by tilting towards one or the other. In copyright law, such balance is reflected by the way in which the short-term grant of exclusive rights respects the long-term public interest represented by limitations and exce
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Defence of information"

1

Office, National Audit. Ministry of Defence: The defence information infrastructure. Stationery Office, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Canada. Department of National Defence. Defence information management strategy. Department of National Defence, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Canada. Department of National Defence. Defence information management strategy. National Defence, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Desmond, Ball, and Babbage Ross 1949-, eds. Geographic information systems: Defence applications. Brassey's Australia, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Natarajan, V. C. Information war in the defence strategy. Trishul Publication, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, National Audit. Ministry of Defence: Support information technology. H.M.S.O., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Great Britain. Parliament. House of Commons. Committee of Public Accounts. Ministry of Defence: Support information technology. HMSO, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

North Atlantic Treaty Organization. Advisory Group for Aerospace Research and Development. Planning and designing effective defence and related information services. AGARD, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Desmond, Ball, and Australian National University. Strategic and Defence Studies Centre, eds. Transforming the Australian Defence Force (ADF) for information superiority. Strategic and Defence Studies Centre, Australian National University, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

North Atlantic Treaty Organization. Advisory Group for Aerospace Research and Development. Value of Information as an Integral Part of Aerospace and Defence R and D Programmes. s.n, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Defence of information"

1

Dijkstra, Hylke. "Information in EU Security and Defence." In The Politics of Information. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137325419_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Herrmann, Dominik. "Cyber Espionage and Cyber Defence." In Information Technology for Peace and Security. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25652-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Han, David C., Jisun Park, Karen Fullam, and K. Suzanne Barber. "Application of Action Selection, Information Gathering, and Information Evaluation Technologies to UAV Target Tracking." In Defence Applications of Multi-Agent Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11683704_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Matam, Rakesh, and Somanath Tripathy. "Defence against Wormhole Attacks in Wireless Mesh Networks." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rickles, Dean. "All Possible Perspectives: A (Partial) Defence of Eddington’s Physics." In Information and Interaction. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43760-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Yanbin, Hongxu Yun, Fu Wang, Yong Ding, Yongzhong Huang, and Wenfen Liu. "Defence Against Adversarial Attacks Using Clustering Algorithm." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0118-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Tingting, and Chris Hankin. "Effective Defence Against Zero-Day Exploits Using Bayesian Networks." In Critical Information Infrastructures Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71368-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gao, Yansong, and Surya Nepal. "A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks." In Information Systems Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65610-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brito, D. L., and M. D. Intriligator. "Arms Races and the Outbreak of War: Application of Principal-agent Relationships and Asymmetric Information." In Peace, Defence and Economic Analysis. Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18898-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Szymanek, Andrzej. "“Defence-in-Depth” Strategy in Transport Risk Management." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16472-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Defence of information"

1

Zaydi, Mounia, and Yassine Maleh. "GAI-Driven Offensive Cybersecurity: Transforming Pentesting for Proactive Defence." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013378700003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Feng, Wenbo, Sanyam Vyas, and Tingting Li. "Autonomous Cyber Defence by Quantum-Inspired Deep Reinforcement Learning." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013151800003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Omer, Abdul Rehman, Muhammad Shahid Khan, and Abdullah Yousafzai. "Robust Federated Learning: Defence against Model Poisoning using Mean Filtering." In 2024 Horizons of Information Technology and Engineering (HITE). IEEE, 2024. https://doi.org/10.1109/hite63532.2024.10777143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hiremath, Prathamesh M., and Saravanan C. "A Comprehensive Study of Virtual Reality (VR) in Defence Combat Training." In 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2024. https://doi.org/10.1109/csitss64042.2024.10816818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faily, Shamal. "Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence." In 2025 International Conference on Military Communication and Information Systems (ICMCIS). IEEE, 2025. https://doi.org/10.1109/icmcis64378.2025.11047961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xin, Chunyan Yang, and Ming Xie. "Optimized Design of Security Attack and Defence Strategies for Virtual Network Simulation Platforms." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10672988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Venturino, Antonello, Enrica d’Afflisio, Nicola Forti, Paolo Braca, Peter Willett, and Moe Z. Win. "Adaptive Resilience in Navigation: Multi-Spoofing Attacks Defence with Statistical Hypothesis Testing and Directional Receivers." In 2024 27th International Conference on Information Fusion (FUSION). IEEE, 2024. http://dx.doi.org/10.23919/fusion59988.2024.10706399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wei, Xiaodong, Lina Chen, Siwei Li, and Mingfei Zeng. "Research on cyber security attack and defence strategy simulation in a virtual network environment." In Fourth International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2024), edited by Massimo Ficco and Yixian Yang. SPIE, 2025. https://doi.org/10.1117/12.3058606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Amiet, Andrew. "Design, Test and Manufacture of Radar Absorbing Materials for Australian Defence Platforms." In SSPC 2016 Greencoat. SSPC, 2016. https://doi.org/10.5006/s2016-00002.

Full text
Abstract:
abstract The techniques used to measure, design, and test Radar Absorbing Materials (RAM) are described. Absorbing additives are added to polymer materials at a range of concentrations in the laboratory, and then tested over the frequency range of interest to determine the material’s permittivity and permeability. The techniques and algorithms used to extract these values are dependent upon the material under test and the type of information required. Once accurately determined, these values are used in a computer optimization code designed to find the best additive concentration and thickness
APA, Harvard, Vancouver, ISO, and other styles
10

Barnett, Stephen M., and Thomas Brougham. "Information security: from classical to quantum." In SPIE Security + Defence, edited by Gary W. Kamerman, Ove Steinvall, Gary J. Bishop, et al. SPIE, 2012. http://dx.doi.org/10.1117/12.974560.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Defence of information"

1

Reed, C. URN Namespace for the Defence Geospatial Information Working Group (DGIWG). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.

Full text
Abstract:
Information security and associated vulnerabilities have long been a pressing challenge, from the fundamental scientific backstage to the frontline across the most diverse sectors of society. At the tip of the iceberg of this problem, the citizens immediately feel that the reservation of privacy and the degradation of the quality and security of the information and communication on which they depend for the day-to-day activities, already of crucial relevance, are at stake. Naturally though, the challenges do not end there. There is a whole infrastructure for storing information, processing and
APA, Harvard, Vancouver, ISO, and other styles
3

Rossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.

Full text
Abstract:
Due to the increased reliance of governments on digital data, it is probably safe to suggest that, without it, there would be no state left to defend. Because, without data, there might not even be a continuity of government, and consequently no state, in a time of crisis. Hence, this paper looks at critical national digital data as a key feature of national security. This paper shows why and how the protection of digitalised critical national data is important for a country’s defence at different levels of conflict, both below and above the threshold of armed conflict. This issue can be studi
APA, Harvard, Vancouver, ISO, and other styles
4

Baldwin, Gretchen. The Image and the Perception: Gender-responsive Strategic Communications in EU Civilian CSDP Missions. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/lqlo5040.

Full text
Abstract:
The European Union (EU) is doubling down on its efforts to strengthen the civilian dimensions of its Common Security and Defence Policy (CSDP) and increase the effectiveness of its civilian crisis management missions. Two thematic areas that received stronger attention in the newly updated Civilian CSDP Compact in May 2023 are gender equality and strategic communications. Yet in civilian CSDP missions, overlap between these areas—which come together as ‘gender-responsive strategic communications’—remains limited. There has also only been limited research on the overlap between gender expertise
APA, Harvard, Vancouver, ISO, and other styles
5

Andrews, Archie. Defense Healthcare Information Assurance Program. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada398276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dickert, J. H. Defense Technical Information Center thesaurus. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/486136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dickert, John H. Defense Technical Information Center Thesaurus. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada378274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pinchuk, O. P., and A. A. Prokopenko. Actual areas of development of digital competence of officers of the armed forces of Ukraine. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.33407/lib.naes.728788.

Full text
Abstract:
The purpose of the study is to find ways to solve the current problem of improving the military education system. The needs in the formation and development of digital competencies of military management officers in different competence areas were studied: information and data literacy, communication and collaboration, digital content creation, safety and problem solving are studied. Possession of a high level of competence in these areas, according to the authors, significantly affects the professional development of officers during their military careers. The attention is focused on the poss
APA, Harvard, Vancouver, ISO, and other styles
9

Krelina, Michal. Military and Security Dimensions of Quantum Technologies. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/zvtl1529.

Full text
Abstract:
Quantum technologies are advancing rapidly from experimental research into strategic defence and security applications, fundamentally altering how information is sensed, shared and secured. Ground- and satellite-based quantum key distribution networks are already being deployed by China and the European Union, promising virtually unbreakable communication. Quantum sensing systems, capable of precise navigation without a global navigation satellite system as well as subterranean and underwater detection, are nearing operational use. In computing, there are expectations that within one to three
APA, Harvard, Vancouver, ISO, and other styles
10

Kendall, Cynthia, and Bill Beyer. Defense Information Infrastructure: Rationale for Defense Management Report Decision 918. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada266014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!