Journal articles on the topic 'Defence of information'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Defence of information.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fatima Akram and Mahwesh Arooj Naz. "Ego defense mechanisms, medication adherence and self-management of the patients with type 2 diabetes." Journal of the Pakistan Medical Association 71, no. 2 (2020): 624–28. http://dx.doi.org/10.47391/jpma.706.
Full textGHERMAN, Laurian. "DEFENCE ARCHITECTURE BASED ON INFORMATION AGE OODA LOOP." Review of the Air Force Academy 15, no. 3 (2017): 111–18. http://dx.doi.org/10.19062/1842-9238.2017.15.3.13.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.
Full textAnand, Vinod. "Information technology and Defence forces." Strategic Analysis 23, no. 8 (1999): 1399–403. http://dx.doi.org/10.1080/09700169908455130.
Full textYao, Jianbo, and Tao Zhang. "Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game." Journal of Physics: Conference Series 2732, no. 1 (2024): 012002. http://dx.doi.org/10.1088/1742-6596/2732/1/012002.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.
Full textCIEŚLAK, Eugeniusz. "Air defense of the Baltic states. Looking toward the future." Safety & Defense 7, no. 2 (2021): 12–21. http://dx.doi.org/10.37105/sd.158.
Full textMunro, Richard. "Indexing defence: an indexer’s defence." Indexer: The International Journal of Indexing: Volume 24, Issue 1 24, no. 1 (2004): 21–23. http://dx.doi.org/10.3828/indexer.2004.24.1.9.
Full textMarsh, P. "Paper defence [security]." Information Professional 2, no. 1 (2005): 34–37. http://dx.doi.org/10.1049/inp:20050105.
Full textMilojević, Ivan. "Accounting information system and information in the defence system." Oditor - casopis za Menadzment, finansije i pravo 3, no. 2 (2017): 54–66. http://dx.doi.org/10.5937/oditor1702054m.
Full textVejvodová, Petra. "Information and Psychological Operations as a Challenge to Security and Defence." Vojenské rozhledy 28, no. 4 (2019): 83–96. http://dx.doi.org/10.3849/2336-2995.28.2019.03.083-096.
Full textNicholson, D. "Defence Applications of Agent-Based Information Fusion." Computer Journal 54, no. 2 (2010): 263–73. http://dx.doi.org/10.1093/comjnl/bxq045.
Full textMelnyk, Dmytro. "PROTECTION OF NATIONAL CRITICAL INFORMATION INFRASTRUCTURE: ISSUES OF THE DAY AND SOLUTIONS." Administrative law and process, no. 3(38) (2022): 5–16. http://dx.doi.org/10.17721/2227-796x.2022.3.01.
Full textBharathi, Shyamraj. "INFORMATION TECHNOLOGY IN DEFENSE MANAGEMENT." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2019): 67–70. https://doi.org/10.5281/zenodo.2562917.
Full textBrunt, Rodney M. "In defence of bibliographic standards." Aslib Proceedings 37, no. 5 (1985): 213–19. http://dx.doi.org/10.1108/eb050966.
Full textLoo, Bee Wah, Pei Ling Tan, Siew Kian Tey, and Wan Yoke Chin. "Authentication Methods Selection in Information Security through Hybrid AHP and EGT." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 2 (2024): 171–85. http://dx.doi.org/10.37934/araset.50.2.171185.
Full textKlerk, Wouter Jan, Timo Schweckendiek, Frank den Heijer, and Matthijs Kok. "Value of Information of Structural Health Monitoring in Asset Management of Flood Defences." Infrastructures 4, no. 3 (2019): 56. http://dx.doi.org/10.3390/infrastructures4030056.
Full textSHYSHKA, Y. "Protection of human rights and freedoms in the information sphere." INFORMATION AND LAW, no. 1(10) (January 10, 2014): 101–5. http://dx.doi.org/10.37750/2616-6798.2014.1(10).272433.
Full textJuurvee, Ivo, and Uku Arold. "Psychological Defence and Cyber Security." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (2021): 70–94. http://dx.doi.org/10.7195/ri14.v19i1.1628.
Full textZimmerman, David. "Information and the Air Defence Revolution, 1917–40." Journal of Strategic Studies 27, no. 2 (2004): 370–94. http://dx.doi.org/10.1080/0140239042000255968.
Full textLeng, Roger. "Defence Strategies for Information Deficit: Negotiating the CPIA." International Journal of Evidence & Proof 1, no. 4 (1997): 215–31. http://dx.doi.org/10.1177/136571279700100403.
Full textАрхангельский, V. Arkhangelskiy, Фомичева, Irina Fomicheva, Труфанов, and V. Trufanov. "Prospects of russian defence information in public utility." Economics 1, no. 2 (2013): 40–46. http://dx.doi.org/10.12737/587.
Full textSceral, Mario, John Ahmet Erkoyuncu, and Essam Shehab. "Identifying information asymmetry challenges in the defence sector." Procedia Manufacturing 19 (2018): 127–34. http://dx.doi.org/10.1016/j.promfg.2018.01.018.
Full textPhillips, Sheena, and Malcolm Spaven. "Defence and Disarmament Information: principles, problems and practicalities." Information Development 2, no. 1 (1986): 15–22. http://dx.doi.org/10.1177/026666698600200101.
Full textCoutts, J. A. "Disclosure of Information to the Defence before Committal." Journal of Criminal Law 63, no. 5 (1999): 416–18. http://dx.doi.org/10.1177/002201839906300514.
Full textEverett, Cath. "Securing the defence." Infosecurity 6, no. 6 (2009): 20–22. http://dx.doi.org/10.1016/s1742-6847(09)70014-x.
Full textStoianov, Nikolai, and Maya Bozhilova. "A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information." Information & Security: An International Journal 46, no. 2 (2020): 182–97. http://dx.doi.org/10.11610/isij.4613.
Full textMattila, Juha Kai. "Cyber Defence is More Than Just Cybersecurity." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 436–44. https://doi.org/10.34190/eccws.24.1.3458.
Full textHandra, Tessa, and Veera Pandiyan Kaliani Sundram. "The Effect of Human Resource Information Systems (HRIS) and Artificial Intelligence on Defense Industry Performance." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 4, no. 2 (2023): 155–63. http://dx.doi.org/10.34306/itsdi.v4i2.584.
Full textCameron, Iain. "Secrecy and Disclosure of Information in Sweden." European Public Law 30, Issue 2 (2024): 117–32. http://dx.doi.org/10.54648/euro2024007.
Full textChainy, Gagan Bihari Nityananda, Biswaranjan Paital, and Jagneswar Dandapat. "An Overview of Seasonal Changes in Oxidative Stress and Antioxidant Defence Parameters in Some Invertebrate and Vertebrate Species." Scientifica 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/6126570.
Full textDyčka, Lukáš, Taivo Rõkk, and Zdzisław Śliwa. "Defence strategies of the smaller NATO states – a comparative study." Vojenské rozhledy 29, no. 4 (2020): 023–45. http://dx.doi.org/10.3849/2336-2995.29.2020.04.023-045.
Full textBradbury, Danny. "Offensive defence." Network Security 2013, no. 7 (2013): 9–12. http://dx.doi.org/10.1016/s1353-4858(13)70081-3.
Full textSemenenko, Oleh, Serhii Kirsanov, Artur Movchan, Mykola Ihnatiev, and Uzef Dobrovolskyi. "Impact of computer-integrated technologies on cybersecurity in the defence sector." Naukovij žurnal «Tehnìka ta energetika» 15, no. 2 (2024): 118–29. http://dx.doi.org/10.31548/machinery/2.2024.118.
Full textChochowska, Anna, Krzysztof Chochowski, Anna Zych, and Igor Britchenko. "Prospects for the Development of the Defence Industry in Poland." Politics & Security 10, no. 4 (2024): 39–48. https://doi.org/10.5281/zenodo.15388116.
Full textShcherbyna, Ye M. "LEGAL WAYS TO COMBAT INFORMATION RARE IN UKRAINE." Actual problems of native jurisprudence, no. 06 (March 2, 2020): 34–37. http://dx.doi.org/10.15421/391989.
Full textCremonini, Marco. "A partial self-defence." Infosecurity 4, no. 5 (2007): 50. http://dx.doi.org/10.1016/s1754-4548(07)70130-4.
Full textKozioł, Jerzy. "Scientific Information in the didactics of National Defence University." Security and Defence Quarterly 2, no. 1 (2014): 90–107. http://dx.doi.org/10.5604/23008741.1152798.
Full textFarquhar, G. "The Defence Research Information Centre: services and new developments." Aslib Proceedings 41, no. 5 (1989): 169–78. http://dx.doi.org/10.1108/eb051137.
Full textBesancenot, Damien, and Radu Vranceanu. "EUROPEAN DEFENCE FIRMS: THE INFORMATION BARRIER ON PRIVATE FINANCE." Defence and Peace Economics 17, no. 1 (2006): 23–36. http://dx.doi.org/10.1080/10242690500216580.
Full textReykers, Yf, and Daan Fonck. "No wings attached? Civil–military relations and agent intrusion in the procurement of fighter jets." Cooperation and Conflict 55, no. 1 (2019): 66–85. http://dx.doi.org/10.1177/0010836719850203.
Full textSchaab, Peter, Kristian Beckers, and Sebastian Pape. "Social engineering defence mechanisms and counteracting training strategies." Information & Computer Security 25, no. 2 (2017): 206–22. http://dx.doi.org/10.1108/ics-04-2017-0022.
Full textGrydchyna, Viktoriia. "The use of military media to raise the political awareness of Ukrainian military personnel in the system of formal and informal education." Visnyk Taras Shevchenko National University of Kyiv. Military-Special Sciences, no. 3 (55) (2023): 5–11. http://dx.doi.org/10.17721/1728-2217.2023.55.5-11.
Full textHasanova, Ilhama Zakir kizi. "PARTICIPATION OF A DEFENSE LAWYER IN THE COLLECTION AND VERIFICATION OF EVIDENCE." Наукові записки Львівського університету бізнесу та права. Серія економічна. Серія юридична, no. 29 (June 30, 2021): 291–301. https://doi.org/10.5281/zenodo.5801876.
Full textWu, Di, Xiangbin Yan, Rui Peng, and Shaomin Wu. "Optimal defence-attack strategies between one defender and two attackers." Journal of the Operational Research Society 71, no. 11 (2019): 1830–46. http://dx.doi.org/10.1080/01605682.2019.1630332.
Full textFlora, S. J. S. "Special Issue on Defence Against Biological and Chemical Agents." Defence Life Science Journal 1, no. 1 (2016): 05. http://dx.doi.org/10.14429/dlsj.1.10099.
Full textStarnes, Richard. "The Trojan Defence." Network Security 2003, no. 12 (2003): 8. http://dx.doi.org/10.1016/s1353-4858(03)00007-2.
Full textIvanishkina, Yulia, and Margarita Shmatova. "Soviet rear at risk of chemical warfare: the formation and the development of Anti-Gas Protective Service of the Local Air Defense in the period of the Second World War (1941—1945)." OOO "Zhurnal "Voprosy Istorii" 2022, no. 8-1 (2022): 50–61. http://dx.doi.org/10.31166/voprosyistorii202208statyi06.
Full textRojas, Bibiana, Emily Burdfield-Steel, Hannu Pakkanen, et al. "How to fight multiple enemies: target-specific chemical defences in an aposematic moth." Proceedings of the Royal Society B: Biological Sciences 284, no. 1863 (2017): 20171424. http://dx.doi.org/10.1098/rspb.2017.1424.
Full textBatkovsky, A. M., M. S. Kryukova, and E. N. Trofimets. "INFORMATION-ANALYTICAL TECHNOLOGIES FOR LAW ENFORCEMENT AGENCIES AND DEFENCE INDUSTRY." Radio industry, no. 1 (January 1, 2016): 117–26. http://dx.doi.org/10.21778/2413-9599-2016-1-117-126.
Full text