Advanced Sciences and Technologies for Security Applications最新文献

筛选
英文 中文
Directed-Energy Non-Lethal Weapons: An Evaluation of Their Ethical Use and Potential Applications 定向能非致命武器:其伦理使用和潜在应用的评估
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-28342-1_6
Seth E. Gordon
{"title":"Directed-Energy Non-Lethal Weapons: An Evaluation of Their Ethical Use and Potential Applications","authors":"Seth E. Gordon","doi":"10.1007/978-3-030-28342-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-28342-1_6","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations 论反恐定点清除行动中叙事、意象和社会信号的道德意义
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-90221-6_2
Michael Robillard
{"title":"On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations","authors":"Michael Robillard","doi":"10.1007/978-3-030-90221-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_2","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model 基于共享密码模型的图像隐写优化小波系数
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-16837-7_5
A. Sivasankari, S. Krishnaveni
{"title":"Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model","authors":"A. Sivasankari, S. Krishnaveni","doi":"10.1007/978-3-030-16837-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7_5","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security and Privacy in Smart City Applications and Services: Opportunities and Challenges 智慧城市应用与服务中的安全与隐私:机遇与挑战
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-16837-7_1
A. Verma, Abhirup Khanna, Amit Agrawal, A. Darwish, A. Hassanien
{"title":"Security and Privacy in Smart City Applications and Services: Opportunities and Challenges","authors":"A. Verma, Abhirup Khanna, Amit Agrawal, A. Darwish, A. Hassanien","doi":"10.1007/978-3-030-16837-7_1","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7_1","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Additive Manufacturing (AM) and WMD Proliferation 增材制造(AM)与大规模杀伤性武器扩散
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-28342-1_4
Andrew Conant
{"title":"Additive Manufacturing (AM) and WMD Proliferation","authors":"Andrew Conant","doi":"10.1007/978-3-030-28342-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-28342-1_4","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123401587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determining Vulnerabilities of Pervasive IoT Devices and Their Geographic Distribution 确定普遍物联网设备的漏洞及其地理分布
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-87166-6_9
Segun Awoniyi, M. A. Kazmi
{"title":"Determining Vulnerabilities of Pervasive IoT Devices and Their Geographic Distribution","authors":"Segun Awoniyi, M. A. Kazmi","doi":"10.1007/978-3-030-87166-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-87166-6_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121691957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change 基于风险的城市基础设施对气候变化影响脆弱性分析
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-00024-0_4
Erich Rome, M. Bogen, Daniel Lückerath, O. Ullrich, R. Worst, Eva Streberová, Margaux Dumonteil, M. Mendizabal, B. Abajo, E. Feliu, P. Bosch, A. Connelly, J. Carter
{"title":"Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change","authors":"Erich Rome, M. Bogen, Daniel Lückerath, O. Ullrich, R. Worst, Eva Streberová, Margaux Dumonteil, M. Mendizabal, B. Abajo, E. Feliu, P. Bosch, A. Connelly, J. Carter","doi":"10.1007/978-3-030-00024-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_4","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blockchain Applications for Nuclear Safeguards 区块链应用于核保障
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-86240-4_3
Sarah L. Frazar
{"title":"Blockchain Applications for Nuclear Safeguards","authors":"Sarah L. Frazar","doi":"10.1007/978-3-030-86240-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-86240-4_3","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125425799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy, Encryption and Counter-Terrorism 隐私、加密和反恐
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-90221-6_9
Seumas Miller, T. Bossomaier
{"title":"Privacy, Encryption and Counter-Terrorism","authors":"Seumas Miller, T. Bossomaier","doi":"10.1007/978-3-030-90221-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Rise of the Modern Intelligence State 现代情报国家的兴起
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-90221-6_7
J. Hardy
{"title":"The Rise of the Modern Intelligence State","authors":"J. Hardy","doi":"10.1007/978-3-030-90221-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_7","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信