{"title":"Directed-Energy Non-Lethal Weapons: An Evaluation of Their Ethical Use and Potential Applications","authors":"Seth E. Gordon","doi":"10.1007/978-3-030-28342-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-28342-1_6","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations","authors":"Michael Robillard","doi":"10.1007/978-3-030-90221-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_2","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model","authors":"A. Sivasankari, S. Krishnaveni","doi":"10.1007/978-3-030-16837-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7_5","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Verma, Abhirup Khanna, Amit Agrawal, A. Darwish, A. Hassanien
{"title":"Security and Privacy in Smart City Applications and Services: Opportunities and Challenges","authors":"A. Verma, Abhirup Khanna, Amit Agrawal, A. Darwish, A. Hassanien","doi":"10.1007/978-3-030-16837-7_1","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7_1","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Additive Manufacturing (AM) and WMD Proliferation","authors":"Andrew Conant","doi":"10.1007/978-3-030-28342-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-28342-1_4","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123401587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining Vulnerabilities of Pervasive IoT Devices and Their Geographic Distribution","authors":"Segun Awoniyi, M. A. Kazmi","doi":"10.1007/978-3-030-87166-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-87166-6_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121691957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erich Rome, M. Bogen, Daniel Lückerath, O. Ullrich, R. Worst, Eva Streberová, Margaux Dumonteil, M. Mendizabal, B. Abajo, E. Feliu, P. Bosch, A. Connelly, J. Carter
{"title":"Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change","authors":"Erich Rome, M. Bogen, Daniel Lückerath, O. Ullrich, R. Worst, Eva Streberová, Margaux Dumonteil, M. Mendizabal, B. Abajo, E. Feliu, P. Bosch, A. Connelly, J. Carter","doi":"10.1007/978-3-030-00024-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_4","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Applications for Nuclear Safeguards","authors":"Sarah L. Frazar","doi":"10.1007/978-3-030-86240-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-86240-4_3","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125425799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy, Encryption and Counter-Terrorism","authors":"Seumas Miller, T. Bossomaier","doi":"10.1007/978-3-030-90221-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Rise of the Modern Intelligence State","authors":"J. Hardy","doi":"10.1007/978-3-030-90221-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_7","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}