To see the other types of publications on this topic, follow the link: Defence of information.

Journal articles on the topic 'Defence of information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Defence of information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fatima Akram and Mahwesh Arooj Naz. "Ego defense mechanisms, medication adherence and self-management of the patients with type 2 diabetes." Journal of the Pakistan Medical Association 71, no. 2 (2020): 624–28. http://dx.doi.org/10.47391/jpma.706.

Full text
Abstract:
Objective: To explore relationship involving Ego Defence Mechanism, Medication Adherence and Self-Management of patients with type 2 diabetes. Method: The cross-sectional co-relational study was conducted at the Government College University, Lahore, Pakistan, from November 2017 to November 2018, and comprised diabetics aged 25-55 years. Other than demographic information, data was collected using the Urdu versions of the Defense Style Questionnaire, the Medication Adherence Scale, and the Diabetic Self-management Questionnaire. Data was analysed using SPSS 22. Results: Of the 150 patients, 75
APA, Harvard, Vancouver, ISO, and other styles
2

GHERMAN, Laurian. "DEFENCE ARCHITECTURE BASED ON INFORMATION AGE OODA LOOP." Review of the Air Force Academy 15, no. 3 (2017): 111–18. http://dx.doi.org/10.19062/1842-9238.2017.15.3.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy, and considering the fact that the defense forces are an inseparable part of state security, the study of their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored b
APA, Harvard, Vancouver, ISO, and other styles
4

Anand, Vinod. "Information technology and Defence forces." Strategic Analysis 23, no. 8 (1999): 1399–403. http://dx.doi.org/10.1080/09700169908455130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yao, Jianbo, and Tao Zhang. "Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game." Journal of Physics: Conference Series 2732, no. 1 (2024): 012002. http://dx.doi.org/10.1088/1742-6596/2732/1/012002.

Full text
Abstract:
Abstract The process of attack and defence of side channel attack can be regarded as the process of mutual information game, the two sides of the game are the cryptographic device designer (defence) and the enemy. The game goal of the defender is to reduce the local and global risks caused by side channel leakage by formulating relevant defence strategies; For the enemy, the goal of the game is just the opposite. From the perspective of making security strategy and reducing security risk, the mutual information game theory is introduced into the decision-making process of crypto chip designers
APA, Harvard, Vancouver, ISO, and other styles
6

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy. Considering that the defence forces are an inseparable part of state security, studying their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored by the defence for
APA, Harvard, Vancouver, ISO, and other styles
7

CIEŚLAK, Eugeniusz. "Air defense of the Baltic states. Looking toward the future." Safety & Defense 7, no. 2 (2021): 12–21. http://dx.doi.org/10.37105/sd.158.

Full text
Abstract:
The article offers the discussion of the origins, current state and the future of air defence of the Baltic states. It tries to relate developments in the field of air defense to changes in security environment, and defence polices of the Baltic states. The article starts with a retrospection on origins and developments of air defence of the Baltic states before they joined NATO. Then it focuses on early years of integration with NATO Integrated Air Defense System and implications for air defence of the Baltic states related to changes in the security of the Euro-Atlantic region stemming from
APA, Harvard, Vancouver, ISO, and other styles
8

Munro, Richard. "Indexing defence: an indexer’s defence." Indexer: The International Journal of Indexing: Volume 24, Issue 1 24, no. 1 (2004): 21–23. http://dx.doi.org/10.3828/indexer.2004.24.1.9.

Full text
Abstract:
Every profession has its own language, history and nuances. The military is no different. It is a profession shot through with mystique and its own terminology. Minefields for indexers abound. Without a sound knowledge of the period, event, person or equipment being indexed, mistakes, easily spotted by an ever-more informed and sophisticated readership, can be made.
APA, Harvard, Vancouver, ISO, and other styles
9

Marsh, P. "Paper defence [security]." Information Professional 2, no. 1 (2005): 34–37. http://dx.doi.org/10.1049/inp:20050105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Milojević, Ivan. "Accounting information system and information in the defence system." Oditor - casopis za Menadzment, finansije i pravo 3, no. 2 (2017): 54–66. http://dx.doi.org/10.5937/oditor1702054m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Vejvodová, Petra. "Information and Psychological Operations as a Challenge to Security and Defence." Vojenské rozhledy 28, no. 4 (2019): 83–96. http://dx.doi.org/10.3849/2336-2995.28.2019.03.083-096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nicholson, D. "Defence Applications of Agent-Based Information Fusion." Computer Journal 54, no. 2 (2010): 263–73. http://dx.doi.org/10.1093/comjnl/bxq045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Melnyk, Dmytro. "PROTECTION OF NATIONAL CRITICAL INFORMATION INFRASTRUCTURE: ISSUES OF THE DAY AND SOLUTIONS." Administrative law and process, no. 3(38) (2022): 5–16. http://dx.doi.org/10.17721/2227-796x.2022.3.01.

Full text
Abstract:
Advantages of the modern digital world and development of information technologies stipulated appearance of new threats to national security in an information sphere. All more frequent by the objects of cyberattacs, amount and power of which grows constantly, the information resources of financial institutions, enterprises of transport and power engineering, public organs, which guarantee security, defense, safety in case of disasters. Therefore a research purpose is a search of solutions of issues of the day for protection of national critical information infrastructure. Methods. For implemen
APA, Harvard, Vancouver, ISO, and other styles
14

Bharathi, Shyamraj. "INFORMATION TECHNOLOGY IN DEFENSE MANAGEMENT." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2019): 67–70. https://doi.org/10.5281/zenodo.2562917.

Full text
Abstract:
<em>&lsquo;Media moulds national and international opinion. It can be a potent force multiplier or a force degrader. Even in the circumstances of the proxy war, the battles for the hearts and minds are paramount importance. There is no point winning the battle of bullets if you result alienating the masses.&rdquo; This article deals with the information technology in defence management. It deals with meaning, evolution of information technology, main component of security technology, sensors and communication, information technology in intelligence gathering and also the requirement of moderni
APA, Harvard, Vancouver, ISO, and other styles
15

Brunt, Rodney M. "In defence of bibliographic standards." Aslib Proceedings 37, no. 5 (1985): 213–19. http://dx.doi.org/10.1108/eb050966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Loo, Bee Wah, Pei Ling Tan, Siew Kian Tey, and Wan Yoke Chin. "Authentication Methods Selection in Information Security through Hybrid AHP and EGT." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 2 (2024): 171–85. http://dx.doi.org/10.37934/araset.50.2.171185.

Full text
Abstract:
The information security leader frequently encounters the challenge of choosing the appropriate defence strategy. Effective multi-criteria decision-making (MCDM) is essential in the field of information security for determining the optimal strategies that involve more than one party. To address this challenge, we propose a hybrid model that combines the strengths of the Analytic Hierarchy Process (AHP) with Evolutionary Game Theory (EGT). The hybrid model helps the information security leader assess the criteria for security controls and make the optimal decisions to protect the organization's
APA, Harvard, Vancouver, ISO, and other styles
17

Klerk, Wouter Jan, Timo Schweckendiek, Frank den Heijer, and Matthijs Kok. "Value of Information of Structural Health Monitoring in Asset Management of Flood Defences." Infrastructures 4, no. 3 (2019): 56. http://dx.doi.org/10.3390/infrastructures4030056.

Full text
Abstract:
One of the most rapidly emerging measures in infrastructure asset management is Structural Health Monitoring (SHM), which aims at reducing uncertainty in structural performance by using monitoring equipment. As earthen flood defence structures typically have large strength uncertainties, such techniques can be particularly promising. However, insight in the key characteristics for successful SHM for flood defences is lacking, which hampers the practical implementation. In this study, we explore the benefits of pore pressure monitoring, one of the most promising SHM techniques for earthen flood
APA, Harvard, Vancouver, ISO, and other styles
18

SHYSHKA, Y. "Protection of human rights and freedoms in the information sphere." INFORMATION AND LAW, no. 1(10) (January 10, 2014): 101–5. http://dx.doi.org/10.37750/2616-6798.2014.1(10).272433.

Full text
Abstract:
The base categories of defence of information rights are examined in the article. On the basis of analysis of current domestic legislation conclusions are drawn in relation to the types of human and citizens’ information rights. The methods of defence of information rights are explored, recommendations of their application are given.
APA, Harvard, Vancouver, ISO, and other styles
19

Juurvee, Ivo, and Uku Arold. "Psychological Defence and Cyber Security." Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, no. 1 (2021): 70–94. http://dx.doi.org/10.7195/ri14.v19i1.1628.

Full text
Abstract:
Disruptive developments in the field of information and communication technology have enabled malicious actors to turn elements of the digital ecosystem into information weapons in hybrid conflict. Estonia has tackled the new security realm with comprehensive national defence that is built upon understanding that the society itself is object of security and should provide appropriate safeguards and responses. Estonian conceptualisations of national cybersecurity, cyber psychological defence, strategic communications are elaborated in the light of actual seminal threat situations. Analysis of e
APA, Harvard, Vancouver, ISO, and other styles
20

Zimmerman, David. "Information and the Air Defence Revolution, 1917–40." Journal of Strategic Studies 27, no. 2 (2004): 370–94. http://dx.doi.org/10.1080/0140239042000255968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Leng, Roger. "Defence Strategies for Information Deficit: Negotiating the CPIA." International Journal of Evidence & Proof 1, no. 4 (1997): 215–31. http://dx.doi.org/10.1177/136571279700100403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Архангельский, V. Arkhangelskiy, Фомичева, Irina Fomicheva, Труфанов, and V. Trufanov. "Prospects of russian defence information in public utility." Economics 1, no. 2 (2013): 40–46. http://dx.doi.org/10.12737/587.

Full text
Abstract:
The urgency of market research software and hardware-way data transfer for use in the infrastructure sectors. Based on the analysis of secondary sources and field studies revealed trends and copyrights are the integral assessment of the prospects of development of this market, conducted an appraisal of the competitive position of domestic and foreign manufacturers of software and hardware-way data transfer.
APA, Harvard, Vancouver, ISO, and other styles
23

Sceral, Mario, John Ahmet Erkoyuncu, and Essam Shehab. "Identifying information asymmetry challenges in the defence sector." Procedia Manufacturing 19 (2018): 127–34. http://dx.doi.org/10.1016/j.promfg.2018.01.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Phillips, Sheena, and Malcolm Spaven. "Defence and Disarmament Information: principles, problems and practicalities." Information Development 2, no. 1 (1986): 15–22. http://dx.doi.org/10.1177/026666698600200101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Coutts, J. A. "Disclosure of Information to the Defence before Committal." Journal of Criminal Law 63, no. 5 (1999): 416–18. http://dx.doi.org/10.1177/002201839906300514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Everett, Cath. "Securing the defence." Infosecurity 6, no. 6 (2009): 20–22. http://dx.doi.org/10.1016/s1742-6847(09)70014-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Stoianov, Nikolai, and Maya Bozhilova. "A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information." Information & Security: An International Journal 46, no. 2 (2020): 182–97. http://dx.doi.org/10.11610/isij.4613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mattila, Juha Kai. "Cyber Defence is More Than Just Cybersecurity." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 436–44. https://doi.org/10.34190/eccws.24.1.3458.

Full text
Abstract:
Power projection through the cyber environment has become customary in competition, confrontation, and conflict between states. Cyber exploitation is supporting Iranian information warfare against its neighbours and the US. Russia is attacking Ukraine's cyber environment as part of its information and physical operations. The US and China wield cyber means as part of their strategic competition. Information security and cybersecurity, as part of it, focus on technical and procedural areas of cyber defence but miss the tactical, operational, and strategic levels required for national defence. C
APA, Harvard, Vancouver, ISO, and other styles
29

Handra, Tessa, and Veera Pandiyan Kaliani Sundram. "The Effect of Human Resource Information Systems (HRIS) and Artificial Intelligence on Defense Industry Performance." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 4, no. 2 (2023): 155–63. http://dx.doi.org/10.34306/itsdi.v4i2.584.

Full text
Abstract:
The purpose of this research is to analyze the effect of the Human Resource Information System (HRIS) on the performance of the defence industry and the influence of artificial intelligence on the performance of the defence industry during the disruption era. This study uses a quantitative research approach. The samples processed were 160 defence industry employees. The primary data collection technique is done by distributing questionnaires to respondents. The questionnaire uses a Likert scale as a measure of data. Data analysis was carried out through structural equation modelling with Smart
APA, Harvard, Vancouver, ISO, and other styles
30

Cameron, Iain. "Secrecy and Disclosure of Information in Sweden." European Public Law 30, Issue 2 (2024): 117–32. http://dx.doi.org/10.54648/euro2024007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Chainy, Gagan Bihari Nityananda, Biswaranjan Paital, and Jagneswar Dandapat. "An Overview of Seasonal Changes in Oxidative Stress and Antioxidant Defence Parameters in Some Invertebrate and Vertebrate Species." Scientifica 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/6126570.

Full text
Abstract:
Antioxidant defence system, a highly conserved biochemical mechanism, protects organisms from harmful effects of reactive oxygen species (ROS), a by-product of metabolism. Both invertebrates and vertebrates are unable to modify environmental physical factors such as photoperiod, temperature, salinity, humidity, oxygen content, and food availability as per their requirement. Therefore, they have evolved mechanisms to modulate their metabolic pathways to cope their physiology with changing environmental challenges for survival. Antioxidant defences are one of such biochemical mechanisms. At low
APA, Harvard, Vancouver, ISO, and other styles
32

Dyčka, Lukáš, Taivo Rõkk, and Zdzisław Śliwa. "Defence strategies of the smaller NATO states – a comparative study." Vojenské rozhledy 29, no. 4 (2020): 023–45. http://dx.doi.org/10.3849/2336-2995.29.2020.04.023-045.

Full text
Abstract:
Defence strategies of smaller NATO states represent interesting source of information about defence policies of this pool of countries. Definition of what constitutes "small state" is discussed in first step. In second step, this study compares 10 selected NATO countries Defence Strategies in terms of identified risks and threats, future military capabilities to counter threats, processes of drafting defence papers, level of details and approving authorities. Outlining these indicators and characteristics provide useful overview for future draft of National defence strategies within countries
APA, Harvard, Vancouver, ISO, and other styles
33

Bradbury, Danny. "Offensive defence." Network Security 2013, no. 7 (2013): 9–12. http://dx.doi.org/10.1016/s1353-4858(13)70081-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Semenenko, Oleh, Serhii Kirsanov, Artur Movchan, Mykola Ihnatiev, and Uzef Dobrovolskyi. "Impact of computer-integrated technologies on cybersecurity in the defence sector." Naukovij žurnal «Tehnìka ta energetika» 15, no. 2 (2024): 118–29. http://dx.doi.org/10.31548/machinery/2.2024.118.

Full text
Abstract:
The research relevance is determined by the ever-increasing threat of cyberattacks and the need to protect defence systems from these threats through the introduction of integrated computer technologies. The study aims to develop strategies for ensuring digital security in the defence sector, addressing the impact of information technology. The study analyses the impact of integrated computer technologies on information security in the military sphere, develops cybersecurity strategies and analyses examples of their application in the defence sector. The study determined that integrated comput
APA, Harvard, Vancouver, ISO, and other styles
35

Chochowska, Anna, Krzysztof Chochowski, Anna Zych, and Igor Britchenko. "Prospects for the Development of the Defence Industry in Poland." Politics & Security 10, no. 4 (2024): 39–48. https://doi.org/10.5281/zenodo.15388116.

Full text
Abstract:
This article presents considerations regarding the prospects of the Polish defence industry. It discusses, among other things, the state of the domestic defence industry, indicates opportunities and threats to its development, as well as the general assumptions of the Technical Modernisation Plan of the Armed Forces of the Republic of Poland. In addition, it defines the essence of agreements concluded with entities of the domestic defence industry, namely offset, framework and implementation agreements. It also analyses the sources of financing of agreements concluded for the purpose of modern
APA, Harvard, Vancouver, ISO, and other styles
36

Shcherbyna, Ye M. "LEGAL WAYS TO COMBAT INFORMATION RARE IN UKRAINE." Actual problems of native jurisprudence, no. 06 (March 2, 2020): 34–37. http://dx.doi.org/10.15421/391989.

Full text
Abstract:
In the article the problem of existence of informative corporate raid is investigated in Ukraine, legal ways of overcoming (minimizations of harm) of informative corporate raid in modern realities. In the epoch of information technologies the question of defence of the information and information becomes all more actual about itself in her primitive kind. And it touches not only the certain personal data but also information of пр business reputation of legal entity. Now the question of defence of business reputation of legal entities becomes urgent, through abuse of the certain interested cit
APA, Harvard, Vancouver, ISO, and other styles
37

Cremonini, Marco. "A partial self-defence." Infosecurity 4, no. 5 (2007): 50. http://dx.doi.org/10.1016/s1754-4548(07)70130-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kozioł, Jerzy. "Scientific Information in the didactics of National Defence University." Security and Defence Quarterly 2, no. 1 (2014): 90–107. http://dx.doi.org/10.5604/23008741.1152798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Farquhar, G. "The Defence Research Information Centre: services and new developments." Aslib Proceedings 41, no. 5 (1989): 169–78. http://dx.doi.org/10.1108/eb051137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Besancenot, Damien, and Radu Vranceanu. "EUROPEAN DEFENCE FIRMS: THE INFORMATION BARRIER ON PRIVATE FINANCE." Defence and Peace Economics 17, no. 1 (2006): 23–36. http://dx.doi.org/10.1080/10242690500216580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Reykers, Yf, and Daan Fonck. "No wings attached? Civil–military relations and agent intrusion in the procurement of fighter jets." Cooperation and Conflict 55, no. 1 (2019): 66–85. http://dx.doi.org/10.1177/0010836719850203.

Full text
Abstract:
This article studies civil–military relations in defence procurement. Applying insights from the principal–agent model, we argue that decision-making about defence procurement is inherently vulnerable to agency problems. Given the technical nature of these dossiers, governments and parliaments are often heavily dependent upon military expertise, creating leeway for defence administrations to steer decision-making towards their preferences. By means of a case study of the replacement of the F-16 fighter jets in Belgium, we examine whether and how complex defence procurement dossiers allow for e
APA, Harvard, Vancouver, ISO, and other styles
42

Schaab, Peter, Kristian Beckers, and Sebastian Pape. "Social engineering defence mechanisms and counteracting training strategies." Information & Computer Security 25, no. 2 (2017): 206–22. http://dx.doi.org/10.1108/ics-04-2017-0022.

Full text
Abstract:
Purpose This paper aims to outline strategies for defence against social engineering that are missing in the current best practices of information technology (IT) security. Reason for the incomplete training techniques in IT security is the interdisciplinary of the field. Social engineering is focusing on exploiting human behaviour, and this is not sufficiently addressed in IT security. Instead, most defence strategies are devised by IT security experts with a background in information systems rather than human behaviour. The authors aim to outline this gap and point out strategies to fill the
APA, Harvard, Vancouver, ISO, and other styles
43

Grydchyna, Viktoriia. "The use of military media to raise the political awareness of Ukrainian military personnel in the system of formal and informal education." Visnyk Taras Shevchenko National University of Kyiv. Military-Special Sciences, no. 3 (55) (2023): 5–11. http://dx.doi.org/10.17721/1728-2217.2023.55.5-11.

Full text
Abstract:
B a c k g r o u n d . The political awareness of military personnel is the basis for the formation of ideological beliefs and motivation for the armed defense of Ukraine. Since 2014, Ukraine has been repelling the armed aggression of the Russian Federation (RF), and starting February 24, 2022, the country is in the phase of a large-scale military invasion. General mobilization increased the Ukrainian army with non-professional military personnel. Political awareness formed on pro-Ukrainian positions is able to neutralize the informational and psychological influences of the enemy. Until 2021,
APA, Harvard, Vancouver, ISO, and other styles
44

Hasanova, Ilhama Zakir kizi. "PARTICIPATION OF A DEFENSE LAWYER IN THE COLLECTION AND VERIFICATION OF EVIDENCE." Наукові записки Львівського університету бізнесу та права. Серія економічна. Серія юридична, no. 29 (June 30, 2021): 291–301. https://doi.org/10.5281/zenodo.5801876.

Full text
Abstract:
The authors note that the legal basis for the participation of a defence attorney in criminal proceedings is based on norms of the constitutional guarantee of everyone a citizen to receive qualified legal assistance, which in his turn follows from the obligation of the state to ensure reliable protection of rights and freedoms of citizen. In addition, the legal status of a defence lawyer is based on the norms of moral and ethical content, which in their totality form the professional ethics of a lawyer.&nbsp; The defence attorney is the most important participant in legal proceedings against w
APA, Harvard, Vancouver, ISO, and other styles
45

Wu, Di, Xiangbin Yan, Rui Peng, and Shaomin Wu. "Optimal defence-attack strategies between one defender and two attackers." Journal of the Operational Research Society 71, no. 11 (2019): 1830–46. http://dx.doi.org/10.1080/01605682.2019.1630332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Flora, S. J. S. "Special Issue on Defence Against Biological and Chemical Agents." Defence Life Science Journal 1, no. 1 (2016): 05. http://dx.doi.org/10.14429/dlsj.1.10099.

Full text
Abstract:
WELCOME to the inaugural issue of the Defence Life Science Journal. The Defence Life Science Journal (DLSJ) is an international journal and is published by Defence Scientific Information &amp;amp; Documentation Centre (DESIDOC) on behalf of Defence Research and Development Organization (DRDO). The journal is dedicated to publishing research covering a wide spectrum of applications in the emerging field in the field of defence/military life support system. Broadly it will cover; Molecular biology, biophysics, biochemistry, psychology, physiology, biotechnology, pharmacology and toxicology (anim
APA, Harvard, Vancouver, ISO, and other styles
47

Starnes, Richard. "The Trojan Defence." Network Security 2003, no. 12 (2003): 8. http://dx.doi.org/10.1016/s1353-4858(03)00007-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ivanishkina, Yulia, and Margarita Shmatova. "Soviet rear at risk of chemical warfare: the formation and the development of Anti-Gas Protective Service of the Local Air Defense in the period of the Second World War (1941—1945)." OOO "Zhurnal "Voprosy Istorii" 2022, no. 8-1 (2022): 50–61. http://dx.doi.org/10.31166/voprosyistorii202208statyi06.

Full text
Abstract:
The article presents with the Local Air Defence’s diverse activity for providing chemical rear protection in 1941-1945. The information is based on the archival sources some of which are firstly introduced into a scientific discourse. The article deals with the problems of anti-gas shelters equipment and means of chemical protection production. Particular attention is given to cooperation between the Local Air Defence and the Main Military Chemical Directorate. The data of the latter played the key role in the identification of the main directions of the rear chemical protection. The article r
APA, Harvard, Vancouver, ISO, and other styles
49

Rojas, Bibiana, Emily Burdfield-Steel, Hannu Pakkanen, et al. "How to fight multiple enemies: target-specific chemical defences in an aposematic moth." Proceedings of the Royal Society B: Biological Sciences 284, no. 1863 (2017): 20171424. http://dx.doi.org/10.1098/rspb.2017.1424.

Full text
Abstract:
Animals have evolved different defensive strategies to survive predation, among which chemical defences are particularly widespread and diverse. Here we investigate the function of chemical defence diversity, hypothesizing that such diversity has evolved as a response to multiple enemies. The aposematic wood tiger moth ( Arctia plantaginis ) displays conspicuous hindwing coloration and secretes distinct defensive fluids from its thoracic glands and abdomen. We presented the two defensive fluids from laboratory-reared moths to two biologically relevant predators, birds and ants, and measured th
APA, Harvard, Vancouver, ISO, and other styles
50

Batkovsky, A. M., M. S. Kryukova, and E. N. Trofimets. "INFORMATION-ANALYTICAL TECHNOLOGIES FOR LAW ENFORCEMENT AGENCIES AND DEFENCE INDUSTRY." Radio industry, no. 1 (January 1, 2016): 117–26. http://dx.doi.org/10.21778/2413-9599-2016-1-117-126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!