Academic literature on the topic 'Defender II'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defender II.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Defender II"
Fang, F., A. X. Jiang, and M. Tambe. "Protecting Moving Targets with Multiple Mobile Resources." Journal of Artificial Intelligence Research 48 (November 17, 2013): 583–634. http://dx.doi.org/10.1613/jair.4027.
Full textYunoshev, S. V., and M. Yu Zhirova. "THE EXPERIENCE OF REGULATION OF POWERS OF A DEFENSE LAWYER ACCORDING TO THE STATUTE OF CRIMINAL PROCEDURE OF 1864 AND THE RF CODE OF CRIMINAL PROCEDURE." Vektor nauki Tol’attinskogo gosudarstvennogo universiteta. Seria Uridicheskie nauki, no. 1 (2021): 69–76. http://dx.doi.org/10.18323/2220-7457-2021-1-69-76.
Full textFondevilla, Gustavo, and Rodrigo Meneses Reyes. "Is cheaper better? Public and private lawyers before criminal courts in Mexico City." International Journal of Law in Context 12, no. 1 (February 23, 2016): 63–80. http://dx.doi.org/10.1017/s1744552315000361.
Full textMcQuoid–Mason, David. "LEGAL AID IN NIGERIA: USING NATIONAL YOUTH SERVICE CORPS PUBLIC DEFENDERS TO EXPAND THE SERVICES OF THE LEGAL AID COUNCIL." Journal of African Law 47, no. 1 (April 2003): 107–16. http://dx.doi.org/10.1017/s0221855303002001.
Full textChen, Yu, John Daniel Eshleman, and Jared S. Soileau. "Business Strategy and Auditor Reporting." AUDITING: A Journal of Practice & Theory 36, no. 2 (September 1, 2016): 63–86. http://dx.doi.org/10.2308/ajpt-51574.
Full textRomero, Sérgio Luiz Gusmão Gimenes. "Antagonismo de classes no canto II da Ilíada: Tersites e a economia da guerra." Revista Investigações 31, no. 1 (December 29, 2018): 1. http://dx.doi.org/10.51359/2175-294x.2018.237842.
Full textRodrigues, Malcom Guimarães. "A EXPERIÊNCIA DA CARNE NA GENEALOGIA FOUCAULTIANA DA SUBJETIVIDADE." Síntese: Revista de Filosofia 47, no. 147 (March 31, 2020): 123. http://dx.doi.org/10.20911/21769389v47n147p123/2020.
Full textHobuss, João. "O QUE NOS DEFINE? ARISTÓTELES E A PSICOLOGIA DO AGENTE MORAL." Revista Dissertatio de Filosofia 41 (July 1, 2015): 305. http://dx.doi.org/10.15210/dissertatio.v41i0.8512.
Full textSanchez, Wagner Lopes. "Igreja Católica e liberdade religiosa: a renovação desencadeada pelo Concílio Vaticano II." REVER - Revista de Estudos da Religião 17, no. 3 (December 24, 2017): 123. http://dx.doi.org/10.23925/1677-1222.2017vol17i3a8.
Full textMiszewski, Dariusz. "Slavic idea in political thought of underground Poland during World War II." Review of Nationalities 7, no. 1 (December 1, 2017): 67–118. http://dx.doi.org/10.1515/pn-2017-0003.
Full textDissertations / Theses on the topic "Defender II"
Hammett, Jessica Mary. "Representations of community in Second World War civil defence." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/67159/.
Full textRowe, Philip. "'We shall defend our island' : investigating a forgotten militarised landscape." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/374724/.
Full textCamacho, Michael. "Thomistic Personalism: An Investigation, Explication, and Defense." Thesis, Boston College, 2009. http://hdl.handle.net/2345/666.
Full textThesis advisor: Peter Kreeft
An in-depth study of Karol Wojtyła's creative synthesis of medieval and modern thought, in which he brings together 1) traditional Thomistic metaphysics and anthropology and 2) the insights of contemporary phenomenology, in order to understand the reality of man as person in his integral totality
Thesis (BA) — Boston College, 2009
Submitted to: Boston College. College of Arts and Sciences
Discipline: College Honors Program
Discipline: Philosophy
Jackson, Peter Darron. "French military intelligence and Nazi Germany, 1936-1939." Thesis, University of Cambridge, 1995. https://www.repository.cam.ac.uk/handle/1810/273043.
Full textWoolven, Robin. "Civil defence in London 1935-1945 : the formation and implementation of the policy for, and the performance of, the A.R.P. (later C.D.) services in London." Thesis, King's College London (University of London), 2002. https://kclpure.kcl.ac.uk/portal/en/theses/civil-defence-in-london-19351945--the-formation-and-implementation-of-the-policy-for-and-the-performance-of-the-arp-later-cd-services-in-london(2c2aecb9-4a3f-44f4-8c38-2ff2330bc66c).html.
Full textBrooks, Amy. "“I’m Doin’ It for Defense”: Messages of American Popular Song to Women during World War II." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1383909020.
Full textKane, Eryn M. "The Guardians of Civilization: Neo-Republican Motherhood in Post-World War II America, 1945-1963." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1366640052.
Full textWithington, Thomas Jeavons. "Bomber Command's electronic warfare policy and suppression of enemy air defence posture during the Second World War." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8076/.
Full textWegmueller, Hans. "Civil-military relations in low-intensity conflict: Switzerland's territorial defense during World War II." Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/28028.
Full textPomponi, Renata Alma. "Control of manufacturing processes with MRP II : benefits and barriers in the defense aerospace industry." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/11167.
Full textBooks on the topic "Defender II"
Pindel, Kazimierz. Obrona terytorialna w II Rzeczypospolitej. Warszawa: Wydawn. Bellona, 1995.
Find full textStachula, Adolf. Obrona powietrzna II Rzeczypospolitej. Słupsk: Pomorska Akademia Pedagogiczna w Słupsku, 2001.
Find full textAA command: Britain's anti-aircraft defences of World War II. London: Methuen, 2001.
Find full textKrohn, Axel. Europäische Sicherheit II. Hamburg: Institut für Friedensforschung und Sicherheitspolitik an der Universität Hamburg, 1989.
Find full textW, Kaufmann H., ed. Fortress France: The Maginot Line and French defenses in World War II. Westport, Connecticut: Praeger Security International, 2006.
Find full textKaufmann, H. W., Tomasz Idzikowski, and J. E. Kaufmann. Fortress France: The Maginot Line and French Defenses in World War II. Westport, Connecticut: Praeger Security International, 2005.
Find full textHistory, Center of Military, ed. Defenses of the Americas: The U.S. Army campaigns of World War II. Washington, DC: [U.S. Army Center of Military History], 1991.
Find full textMuñoz, Alicia Cámara. Fortificación y ciudad en los reinos de Felipe II. Madrid: Nerea, 1998.
Find full textBook chapters on the topic "Defender II"
Pricopie, Remus. "Why IAU?" In The Promise of Higher Education, 63–69. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67245-4_10.
Full textManadhata, Pratyusa K. "Game Theoretic Approaches to Attack Surface Shifting." In Moving Target Defense II, 1–13. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_1.
Full textJain, Manish, Bo An, and Milind Tambe. "Security Games Applied to Real-World: Research Contributions and Challenges." In Moving Target Defense II, 15–39. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_2.
Full textBilar, Daniel, George Cybenko, and John Murphy. "Adversarial Dynamics: The Conficker Case Study." In Moving Target Defense II, 41–71. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_3.
Full textGonzalez, Cleotilde. "From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity." In Moving Target Defense II, 73–86. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_4.
Full textTorrieri, Don, Sencun Zhu, and Sushil Jajodia. "Cyber Maneuver Against External Adversaries and Compromised Nodes." In Moving Target Defense II, 87–96. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_5.
Full textYackoski, Justin, Harry Bullen, Xiang Yu, and Jason Li. "Applying Self-Shielding Dynamics to the Network Architecture." In Moving Target Defense II, 97–115. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_6.
Full textGoues, Claire Le, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason D. Hiser, John C. Knight, and Matthew Van Gundy. "Moving Target Defenses in the Helix Self-Regenerative Architecture." In Moving Target Defense II, 117–49. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_7.
Full textJackson, Todd, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, and Michael Franz. "Diversifying the Software Stack Using Randomized NOP Insertion." In Moving Target Defense II, 151–73. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_8.
Full textPappas, Vasilis, Michalis Polychronakis, and Angelos D. Keromytis. "Practical Software Diversification Using In-Place Code Randomization." In Moving Target Defense II, 175–202. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_9.
Full textConference papers on the topic "Defender II"
Gimenez, Jucelino. "VGD É O BICHO!" In II Congresso Brasileiro de Ciências Biológicas On-line. Revista Multidisciplinar Educação e Meio Ambiente, 2021. http://dx.doi.org/10.51189/rema/1648.
Full textShi, Zheyuan Ryan, Ziye Tang, Long Tran-Thanh, Rohit Singh, and Fei Fang. "Designing the Game to Play: Optimizing Payoff Structure in Security Games." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/71.
Full textSerreli, Giovanni. "La seconda metà del XVI secolo: un punto di svolta nell’organizzazione difensiva del Regno di Sardegna." In FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11404.
Full textFaibarn, W. D. M. "The British defence requirement for satellites." In IEE Colloquium on Military Satellite Communications II. IEE, 1997. http://dx.doi.org/10.1049/ic:19971064.
Full textSworder, David D., John E. Boyd, and R. G. Hutchins. "Map-enhanced tracking II." In Defense and Security Symposium, edited by Oliver E. Drummond. SPIE, 2006. http://dx.doi.org/10.1117/12.663536.
Full text"Session 5A Privacy, security, DOS and defences II." In Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004). IEEE, 2004. http://dx.doi.org/10.1109/icon.2004.1409204.
Full textMunkeby, Steve H., and John R. Spofford. "UGV/Demo II Program: status through Demo C and Demo II preparations." In Aerospace/Defense Sensing and Controls, edited by Scott A. Speigle. SPIE, 1996. http://dx.doi.org/10.1117/12.241074.
Full textMahler, Ronald. "On multitarget pairwise-Markov models, II." In SPIE Defense + Security, edited by Ivan Kadar. SPIE, 2017. http://dx.doi.org/10.1117/12.2262787.
Full textKlipstein, P. C., E. Avnon, D. Azulai, Y. Benny, R. Fraenkel, A. Glozman, E. Hojman, et al. "Type II superlattice technology for LWIR detectors." In SPIE Defense + Security, edited by Bjørn F. Andresen, Gabor F. Fulop, Charles M. Hanson, John L. Miller, and Paul R. Norton. SPIE, 2016. http://dx.doi.org/10.1117/12.2222776.
Full textTing, David Z., Alexander Soibel, Arezou Khoshakhlagh, Linda Höglund, Sam A. Keo, Sir B. Rafol, Cory J. Hill, et al. "Antimonide type-II superlattice barrier infrared detectors." In SPIE Defense + Security, edited by Bjørn F. Andresen, Gabor F. Fulop, Charles M. Hanson, John L. Miller, and Paul R. Norton. SPIE, 2017. http://dx.doi.org/10.1117/12.2266263.
Full textReports on the topic "Defender II"
Lindgren, John C. Advanced Distributed Simulation Technology II (ADST II) Extended Air Defense Testbed (EADTB). Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada363420.
Full textOdeen, Philip A., and William G. Howard. Defense Science Board Task Force on Logistics Transformation - Phase II. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada385885.
Full textWall, Alan R. Theater Missile Defense in World War II - Some Operational Art Considerations. Fort Belvoir, VA: Defense Technical Information Center, February 1999. http://dx.doi.org/10.21236/ada363065.
Full textDEPARTMENT OF DEFENSE WASHINGTON DC. Department of Defense Annual Statement of Assurance, Volume II for Fiscal Year 1996. Fort Belvoir, VA: Defense Technical Information Center, December 1996. http://dx.doi.org/10.21236/ada328127.
Full textDEFENSE SCIENCE BOARD WASHINGTON DC. Report of the Defense Science Board Task Force on Enabling Joint Force Capabilities - Phase II. Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada428786.
Full textAnderson, Lowell B., Jerome Bracken, and Marilyn C. Bracken. Review of Department of Defense Education Activity (DODEA) Schools. Volume II: Quantitative Analysis of Educational Quality. Fort Belvoir, VA: Defense Technical Information Center, October 2000. http://dx.doi.org/10.21236/ada385886.
Full textLonge, Timothy, R. Chuang, D. Johnston, C. Brand, and Gary McKown. Fort Holabird Defense Investigative Service (DIS), Base Realignment and Closure (BRAC) Cleanup Plan (BCP), Version II. Fort Belvoir, VA: Defense Technical Information Center, December 1998. http://dx.doi.org/10.21236/ada467428.
Full textWright, Larry. Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II. Fort Belvoir, VA: Defense Technical Information Center, March 2001. http://dx.doi.org/10.21236/ada385282.
Full textDEFENSE SCIENCE BOARD WASHINGTON DC. Protecting the Homeland Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II. Fort Belvoir, VA: Defense Technical Information Center, March 2001. http://dx.doi.org/10.21236/ada399019.
Full textHermann, Robert, and Larry Welch. The Defense Science Board 1997 Summer Study Task Force on DoD Responses to Transnational Threats. Volume II. Force Protection Report. Fort Belvoir, VA: Defense Technical Information Center, October 1997. http://dx.doi.org/10.21236/ada338911.
Full text