Academic literature on the topic 'Defence of information'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defence of information.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Defence of information"
Fatima Akram and Mahwesh Arooj Naz. "Ego defense mechanisms, medication adherence and self-management of the patients with type 2 diabetes." Journal of the Pakistan Medical Association 71, no. 2 (2020): 624–28. http://dx.doi.org/10.47391/jpma.706.
Full textGHERMAN, Laurian. "DEFENCE ARCHITECTURE BASED ON INFORMATION AGE OODA LOOP." Review of the Air Force Academy 15, no. 3 (2017): 111–18. http://dx.doi.org/10.19062/1842-9238.2017.15.3.13.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.
Full textAnand, Vinod. "Information technology and Defence forces." Strategic Analysis 23, no. 8 (1999): 1399–403. http://dx.doi.org/10.1080/09700169908455130.
Full textYao, Jianbo, and Tao Zhang. "Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game." Journal of Physics: Conference Series 2732, no. 1 (2024): 012002. http://dx.doi.org/10.1088/1742-6596/2732/1/012002.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.
Full textCIEŚLAK, Eugeniusz. "Air defense of the Baltic states. Looking toward the future." Safety & Defense 7, no. 2 (2021): 12–21. http://dx.doi.org/10.37105/sd.158.
Full textMunro, Richard. "Indexing defence: an indexer’s defence." Indexer: The International Journal of Indexing: Volume 24, Issue 1 24, no. 1 (2004): 21–23. http://dx.doi.org/10.3828/indexer.2004.24.1.9.
Full textMarsh, P. "Paper defence [security]." Information Professional 2, no. 1 (2005): 34–37. http://dx.doi.org/10.1049/inp:20050105.
Full textMilojević, Ivan. "Accounting information system and information in the defence system." Oditor - casopis za Menadzment, finansije i pravo 3, no. 2 (2017): 54–66. http://dx.doi.org/10.5937/oditor1702054m.
Full textDissertations / Theses on the topic "Defence of information"
Taylor, Jayne Louise. "Information processing & defence in psychosis." Thesis, Teesside University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518735.
Full textDeakin, Robert Luke. "Economic information warfare : analysis of the relationship between the protection of financial information infrastructure and Australia's national security." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15900/1/Robert_Deakin_Thesis.pdf.
Full textDeakin, Robert Luke. "Economic Information Warfare : Analysis of the relationship between the protection of Financial Information Infrastructure and Australia's National Security." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15900/.
Full textStiff, Harald. "Explainable AI as a Defence Mechanism for Adversarial Examples." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260347.
Full textBester, Christoffel. "The management of information inside the general support base concept of the South African National Defence Force." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/16475.
Full textPullinger, Stephen Bernard. "Parliament and the defence debate : the generation, provision and use of specialist information." Thesis, University of Bradford, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.235642.
Full textWeiss, Alexander Peter William. "The use of commercial off-the-shelf information technology in operational defence equipment." Thesis, University College London (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393106.
Full textKarlsson, Terése. "Contingency planning for Bofors Defence AB, an application of existing methods." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1639.
Full textBjörklund, Kristoffer. "What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104886.
Full textLekhawatthanapong, Thattaporn. "Establishing statutory ground for the public interest defence under international copyright law." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/50736/.
Full textBooks on the topic "Defence of information"
Office, National Audit. Ministry of Defence: The defence information infrastructure. Stationery Office, 2008.
Find full textCanada. Department of National Defence. Defence information management strategy. Department of National Defence, 2000.
Find full textCanada. Department of National Defence. Defence information management strategy. National Defence, 2000.
Find full textDesmond, Ball, and Babbage Ross 1949-, eds. Geographic information systems: Defence applications. Brassey's Australia, 1989.
Find full textNatarajan, V. C. Information war in the defence strategy. Trishul Publication, 1998.
Find full textOffice, National Audit. Ministry of Defence: Support information technology. H.M.S.O., 1991.
Find full textGreat Britain. Parliament. House of Commons. Committee of Public Accounts. Ministry of Defence: Support information technology. HMSO, 1992.
Find full textNorth Atlantic Treaty Organization. Advisory Group for Aerospace Research and Development. Planning and designing effective defence and related information services. AGARD, 1987.
Find full textDesmond, Ball, and Australian National University. Strategic and Defence Studies Centre, eds. Transforming the Australian Defence Force (ADF) for information superiority. Strategic and Defence Studies Centre, Australian National University, 2005.
Find full textNorth Atlantic Treaty Organization. Advisory Group for Aerospace Research and Development. Value of Information as an Integral Part of Aerospace and Defence R and D Programmes. s.n, 1985.
Find full textBook chapters on the topic "Defence of information"
Dijkstra, Hylke. "Information in EU Security and Defence." In The Politics of Information. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137325419_15.
Full textHerrmann, Dominik. "Cyber Espionage and Cyber Defence." In Information Technology for Peace and Security. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-25652-4_5.
Full textHan, David C., Jisun Park, Karen Fullam, and K. Suzanne Barber. "Application of Action Selection, Information Gathering, and Information Evaluation Technologies to UAV Target Tracking." In Defence Applications of Multi-Agent Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11683704_6.
Full textMatam, Rakesh, and Somanath Tripathy. "Defence against Wormhole Attacks in Wireless Mesh Networks." In Information Systems Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_13.
Full textRickles, Dean. "All Possible Perspectives: A (Partial) Defence of Eddington’s Physics." In Information and Interaction. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43760-6_4.
Full textZheng, Yanbin, Hongxu Yun, Fu Wang, Yong Ding, Yongzhong Huang, and Wenfen Liu. "Defence Against Adversarial Attacks Using Clustering Algorithm." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0118-0_25.
Full textLi, Tingting, and Chris Hankin. "Effective Defence Against Zero-Day Exploits Using Bayesian Networks." In Critical Information Infrastructures Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71368-7_11.
Full textGao, Yansong, and Surya Nepal. "A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks." In Information Systems Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65610-2_4.
Full textBrito, D. L., and M. D. Intriligator. "Arms Races and the Outbreak of War: Application of Principal-agent Relationships and Asymmetric Information." In Peace, Defence and Economic Analysis. Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18898-7_6.
Full textSzymanek, Andrzej. "“Defence-in-Depth” Strategy in Transport Risk Management." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16472-9_5.
Full textConference papers on the topic "Defence of information"
Zaydi, Mounia, and Yassine Maleh. "GAI-Driven Offensive Cybersecurity: Transforming Pentesting for Proactive Defence." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013378700003899.
Full textFeng, Wenbo, Sanyam Vyas, and Tingting Li. "Autonomous Cyber Defence by Quantum-Inspired Deep Reinforcement Learning." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013151800003899.
Full textOmer, Abdul Rehman, Muhammad Shahid Khan, and Abdullah Yousafzai. "Robust Federated Learning: Defence against Model Poisoning using Mean Filtering." In 2024 Horizons of Information Technology and Engineering (HITE). IEEE, 2024. https://doi.org/10.1109/hite63532.2024.10777143.
Full textHiremath, Prathamesh M., and Saravanan C. "A Comprehensive Study of Virtual Reality (VR) in Defence Combat Training." In 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2024. https://doi.org/10.1109/csitss64042.2024.10816818.
Full textFaily, Shamal. "Biting the CHERI bullet: Blockers, Enablers and Security Implications of CHERI in Defence." In 2025 International Conference on Military Communication and Information Systems (ICMCIS). IEEE, 2025. https://doi.org/10.1109/icmcis64378.2025.11047961.
Full textLi, Xin, Chunyan Yang, and Ming Xie. "Optimized Design of Security Attack and Defence Strategies for Virtual Network Simulation Platforms." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10672988.
Full textVenturino, Antonello, Enrica d’Afflisio, Nicola Forti, Paolo Braca, Peter Willett, and Moe Z. Win. "Adaptive Resilience in Navigation: Multi-Spoofing Attacks Defence with Statistical Hypothesis Testing and Directional Receivers." In 2024 27th International Conference on Information Fusion (FUSION). IEEE, 2024. http://dx.doi.org/10.23919/fusion59988.2024.10706399.
Full textWei, Xiaodong, Lina Chen, Siwei Li, and Mingfei Zeng. "Research on cyber security attack and defence strategy simulation in a virtual network environment." In Fourth International Conference on Computer Technology, Information Engineering, and Electron Materials (CTIEEM 2024), edited by Massimo Ficco and Yixian Yang. SPIE, 2025. https://doi.org/10.1117/12.3058606.
Full textAmiet, Andrew. "Design, Test and Manufacture of Radar Absorbing Materials for Australian Defence Platforms." In SSPC 2016 Greencoat. SSPC, 2016. https://doi.org/10.5006/s2016-00002.
Full textBarnett, Stephen M., and Thomas Brougham. "Information security: from classical to quantum." In SPIE Security + Defence, edited by Gary W. Kamerman, Ove Steinvall, Gary J. Bishop, et al. SPIE, 2012. http://dx.doi.org/10.1117/12.974560.
Full textReports on the topic "Defence of information"
Reed, C. URN Namespace for the Defence Geospatial Information Working Group (DGIWG). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6288.
Full textPerdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, 2022. http://dx.doi.org/10.46337/220602.
Full textRossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.
Full textBaldwin, Gretchen. The Image and the Perception: Gender-responsive Strategic Communications in EU Civilian CSDP Missions. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/lqlo5040.
Full textAndrews, Archie. Defense Healthcare Information Assurance Program. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada398276.
Full textDickert, J. H. Defense Technical Information Center thesaurus. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/486136.
Full textDickert, John H. Defense Technical Information Center Thesaurus. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada378274.
Full textPinchuk, O. P., and A. A. Prokopenko. Actual areas of development of digital competence of officers of the armed forces of Ukraine. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.33407/lib.naes.728788.
Full textKrelina, Michal. Military and Security Dimensions of Quantum Technologies. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/zvtl1529.
Full textKendall, Cynthia, and Bill Beyer. Defense Information Infrastructure: Rationale for Defense Management Report Decision 918. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada266014.
Full text