Keywords

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
2013-2014 Action Plan (1) 2D simulation engine (1) 3D (1)
3D modeling (1) 3D simulation (1) 3D simulation engine (1)
3D моделиране (1) 3M-Conception (1) Abkhazia (1)
Abu Bakr (1) academic dishonesty (1) access control (1)
access to information (1) accident (1) accountability (11)
ACCS (1) acquisition (3) acquisition management (1)
acqusition (1) action plan (2) Active Endeavour (1)
active measures (1) Active Reserve (1) adaptability (1)
adaptive control (1) adaptive Doppler filtering (2) adaptive hybrid estimation (1)
adaptiveness (1) ADL (6) advanced air capabilities. (1)
advanced distributed learning (4) Advanced Information Technology (1) advanced persistent threats (1)
Advanced Technology Demonstrations (1) aerodynamic (1) Afghanistan (2)
Agent Architecture (1) agent models (1) agent of influence (1)
agent-based simulation (1) aggregated combat simulations (1) agility (2)
AHP (2) Ahrar al Sham (1) Air Doctrine (1)
air force capabilities (1) Air Force Missions (1) Air Force Modernisation (1)
air force technologies (1) Air Force Transformation (2) Air Force transformation; expeditionary air capabilities; deployable air force packages; Air Expeditionary Wing (1)
air operations. (1) Air power (1) Air Situation Simulator (1)
aircraft motion models (1) airport security (1) airpower (2)
Airpower Model (1) airspace (1) airspace control authority (1)
Al Qaeda (1) al-Nusra (1) Al-Qaeda (3)
al-Qaeda in the Arabian Peninsula (1) Al-Qaeda in the Islamic Maghreb (1) al-Qaida (1)
alarm receiving system. (1) Albania (1) algorithmic noise (1)
allied operations (1) Alternative futures (2) ambiguity (1)
analysis (1) Analysis of Alternatives (1) analysis tool (1)
analytical hierarchy process. (1) and post-crisis operations. (1) and threats; system approach to security systems’ functional aspects analysis (1)
anonymity (2) ANSSI (1) anti-corruption (1)
antiquities (1) antivirus software. (1) anyplace (1)
anytime (1) AQ (1) AQAP (1)
Arab Spring (2) architectural models (1) Architecture for Model Integration (1)
argumentative negotiation (1) armed forces (4) Armed Forces transformation (3)
arms control (1) art (1) artificial immune systems (1)
artificial inteligence (1) artificial intelligence (1) ASCE plug-in (1)
assessment (2) assignment (1) assignments (1)
Assumption-based Planning (1) assurance level. (1) Assurance Method (1)
assurance requirements (1) asylum (1) asymmetric response (1)
Asymmetric Threats (2) attribute data processing (1) attribution theory (1)
audit (2) auditing (1) authentication (2)
authorization (1) automated design (1) automated learning (1)
automated management system (1) automatic translation (1) automaton (1)
Autonomous guided vehicles. (1) autonomy (1) availability (1)
awareness (3) awareness based training (1) awareness-raising. (1)
Ayman al-Zawahiri (1) B-61 (2) B-method (1)
balanced scorecard (6) Balkan Region (1) Balkans (1)
Baltics (1) bank card (1) bank clearing (1)
Barack Obama (2) Bayesian algorithms (1) Bayesian Decision-Making (1)
behavioural model (1) bilinear Pairing (1) binary relation (1)
bio-terrorism (1) Biological weapons (1) Biometric (2)
biometric identification (1) biometric system (1) BIOS (1)
biosecurity (1) Black Sea security (2) Black Swan theory (1)
Blacklists (1) BlackSeaFor (2) Blind Signature (1)
Block Truncation Coding (1) Blurring Borders between External and Internal Security (1) Boko Haram (1)
Boolean Algebra (1) border crossing (1) Bosnia and Herzegovina (1)
Browser Indicators (1) budget (1) budget transparency (2)
Budget Transparency Initiative (1) budgeting (2) budgeting. (1)
Bulgaria (4) Bulgarian Armed Forces (2) Bulgaria’s defence reform (1)
business risk (1) business-critical infrastructure (1) C2 (1)
C2 capabilities (1) C2 management (1) C2 principles (1)
C2IS (1) C3 (1) C4 (1)
C4 project management (1) C4I (3) C4I systems (3)
C4ISR (5) C4ISR Architecture (1) C4ISR capabilities (1)
C4ISR Structural Approach (1) C4ISR systems; operational (1) caliphate (1)
CALL (2) campaigns (1) CAOC (1)
capabilities (2) Capabilities Development (1) capabilities-based assessment (1)
capabilities-based planning (3) capability (1) Capability Assessment Methodology (1)
Capability costing (1) capability development (4) Capability Discussion Matrix (1)
capability divelopment (1) capability gaps (1) capability portfolio (1)
capability prioritization (1) capability requirements review (1) CASoS (1)
Catastrophe Loss Models (1) Caucasus (1) cause-effect relation (1)
CAX (9) CAX Management environment (1) CBRN (1)
CBRNE (1) CCIS (1) CCNA Security curriculum (1)
CDMA (1) cellular automata model of conflict (1) cellular communications (1)
Central Asia (3) centralisation (2) centralised organisation (1)
centralized management (1) centre of gravity. (1) CERT (3)
certification authority (1) certification program (1) CFACC (1)
challenge-response (1) change management (1) chaos (1)
Character Segmentation (1) characteristics (1) Charter of the United Nations (1)
Chechnya (1) chemical weapons (1) Chief Information Officer (1)
China (1) CIED (2) CIIP; security; cyber threats; conventional vs. IT-related security threats; infrastructure vulnerability; CIIP R&D; network society. (1)
CIMIC (1) CIP (2) CIRC (2)
Cisco Systems’ courses (1) civil assistance (1) Civil Emergencies (1)
Civil protection (6) Civil Security (3) civil society (1)
civil society; policy (1) Civil to Military cooperation and integra­tion (1) civil-military (1)
Civil-Military Combination Strategies (1) civil-military cooperation (3) Civil-military interaction (1)
Civil-Military Interoperability (2) Civil-military relations (4) civilian aspect of diplomacy (1)
civilian control (3) CJTF (1) classification (1)
Clausewitz (1) client-server complexes (1) client/server. (1)
climate change (1) Cloud computing (3) cloud testing (1)
cluster (1) Clustering algorithm (1) cluttered environment (1)
CNO; malicious computer-mediated activities; interdependencies created by network-based power; private sector - government cooperation; IT-related security regimes. (1) co-creation (1) coalition (2)
coalition aerospace operations center (1) coalition ATO (1) coalition command and control (1)
coalition interoperability (1) Coalition operations (2) coastal areas risks (1)
code of conduct (2) code of ethics (1) coding (1)
cognitive (1) Cognitive Approach (1) Cognitive Modeling (1)
coherence (1) cohesion (1) cold boot (1)
collaboration (1) collaborative decision-making (1) collaborative development (1)
collaborative learning (1) com-parative analysis (1) Combat Potential (1)
Combination rules (1) Combined Operations (1) ComBlackSeaNavMet (1)
Command & Control (1) command and control (11) Command and Control Information Systems (1)
Command and control technologies (1) Command Post Exercise (2) common cause failures (2)
common challenges (1) common criteria. (1) Common Foreign and Security Policy (1)
common funding (1) Common Security and Defence Policy (2) common threat perception (1)
communication (2) Communications (4) Communications and Information Systems (1)
community (1) company (1) comparative analysis (1)
comparative legal analysis (1) competence framework (1) competencies (1)
complex adaptive systems (1) Complex man-machine systems (1) complexity (2)
complexity studies (1) compliant motion (1) Comprehensive approach (9)
Comprehensive Approach. (1) comprehensive ap­proach (1) Comprehensive security (2)
comprehen¬sive approach (1) Computation Node (1) Computational Intelligence (1)
Computer Aided Dispatch (1) computer aided exercises (CAX). (2) Computer Assisted eXercises (1)
Computer Assisted Exercises (CAX) (2) Computer generated forces (2) computer graphics (1)
computer networks (1) computer security (1) computer systems reliability (1)
Computer Virology (1) computer-assisted language learning (1) Computing Laboratory (1)
concept (1) Concept Development and Experimentation (1) Conceptual Research Oriented Combat Agent Distillation Implemented in the Littoral Environment (1)
Conference Key Distribution System (1) confidence building (1) confidence- and security-building measures (1)
confidentiality (1) conflict (2) Conflict management (1)
conflict resolution (1) Conjunctive rule (1) CONOPS (1)
Consortium. (1) Constraint Satisfaction/Propagation (1) context (1)
context scenario (2) context scenarios (1) context translation (1)
contextual scenario (1) Continuous DSmT (1) contract management (1)
control (1) convergence (1) con¬trol (1)
Cookies (1) cooperation (1) Cooperative Defence Projects (1)
Cooperative development team (1) cooperative procurement (2) cooperative security (2)
coordination (4) Copy attack (1) copyright (1)
Copyright Protection Scheme (1) correlation infrastructure (1) corruption (10)
corruption effects (1) corruption factors (1) corruption networks (1)
cost effectiveness (1) Cost Module (1) cost-effectiveness (1)
COTS (1) COTS software (1) counter-cyberterrorism (1)
Counter-terrorism (4) counterinsurgency (2) Counterterrorism (4)
coupling factors (1) credit card. (1) Creeping Dissolution of the Monopoly of National Power (1)
crime (1) crime-terror nexus (1) Crimea (2)
criminal business (1) crisis (2) crisis management (10)
crisis management architecture (1) crisis management operations (1) crisis management strategy (1)
crisis management structures (1) crisis management. (1) crisis operations (1)
crisis plans (1) crisis response operations (1) critical energy infrastructure (1)
critical energy infrastructure protection (1) Critical Information Infrastructure Protection (2) Critical Infrastructure (12)
Critical Infrastructure Protection (4) critical infrastructure; Critical Infrastructure Protection; comprehensive security; security policy; coordination; collaboration (1) Critical infrastructures (2)
critical infrastruc¬ture (1) Critical Success (1) critique (1)
CROCADILE (1) cross-border resiliency (1) cross-impact (1)
cross-sectoral approach (1) cryptographic software (1) cryptography (6)
CSDM Views (15) CSDP (1) CSTO (1)
culture (2) curriculum (3) cyber (3)
cyber attacks (1) Cyber defence (2) cyber diversity (1)
cyber security (7) cyber security culture (1) cyber space (1)
cyber threats (6) cyber war (2) cyber warfare; morphology; human mind as target; neocortical warfare; information attacks; international law. (1)
cyber-physical systems (1) cyber-terrorism (1) cyberat-tack (1)
cyberattack (2) cybercrime (3) cyberpace (1)
Cybersecurity (17) Cybersecurity Innovation (1) cybersecurity management practices (1)
cybersecurity organisation (1) cybersecurity policy (1) cybersecurity strategy (2)
cybersecurity system (1) cybersecurity threats (1) cybersecurity training methodology (1)
cyberspace (5) cyberterrorism (3) cyberwar (2)
Cyberwar; information society; risk perception; risk society; cyber risks: physical vs. virtual; US policy response; cyber attacks; critical information infrastructures; information warfare; public-private sector partnership. (1) Czech Republic (1) Czechoslovakia (1)
daily human needs (1) DAT (1) Data Fusion (2)
Data Hiding (1) data mining (2) Data Modeling (1)
data processing; target tracking; adaptive estimation; linear prediction (1) data protection (1) Data/User Privacy (1)
database-as-a-service (1) DDoS attacks (1) decentral¬ized management (1)
deception operations (1) Decision Analysis (1) decision making (1)
Decision Support (6) decision support system (1) decision support systems (2)
Decision-making (4) Decision-making process (1) Decision-making. (1)
decision-support (1) dedovshchina (1) defects (1)
defence (3) defence acquisition (1) defence against terrorism (2)
defence and security policy (1) defence audit. (1) defence budget (3)
defence budgeting (1) defence capabilities (3) Defence capability (1)
defence capa­bilities (1) defence expenditure (1) defence expenditures. (1)
Defence governance (2) defence industry (1) defence institution building (2)
defence institution building. (1) defence management (4) defence planning (5)
Defence Planning Procedure (1) defence policy (9) defence policy model (1)
defence policy review (1) Defence procurement (2) Defence reform (3)
Defence resource management (3) defence spending (1) defence staff (1)
Defence Support to Civilian Authorities (3) defense acquisition (3) defense acquisition management (1)
defense capabilities initiative (1) defense economics (1) defense industrial policy (1)
Defense Information infrastructure (1) Defense Institution Building (1) defense management (1)
defense planning (1) defense planning risks (1) defense policy (1)
Defense policy; Foresight-based defense planning; Scenario; Drivers; Defense expenditures (1) defense politics (1) Defense procurement (1)
defense procurement policy (1) defense R&D. (2) defense reform (2)
Defense reorganization (1) Defense resource management (1) Defense Resource Management Model (DRMM) (1)
defense resource program management (1) deliberate planning (1) democracy (1)
democratic control (1) democratic oversight (2) Dempster-Shafer (1)
Dempster-Shafer theory (1) Dempster’s rule (1) dependability indicators (1)
Dependable Computing System (1) design (1) desk research (1)
deterministic computer model (1) deterministic scenario (1) Deterrence (1)
development strategy (1) Dezert-Smarandache Theory (1) de­fense capabilities (1)
diagnostic (1) digital development (1) Digital divide; civil society; global governance decision-making; grass-roots empowerment; plurality of voices (1)
digital signature (1) Digital Signature. (1) diplomacy (1)
direct energy (1) Direct Task (1) Directorate for Emergency Management (1)
disarmament (1) Disaster (1) Disaster Management (2)
disaster preparedness (9) disaster relief (1) disaster response (9)
Disaster Scenario (1) discrete dynamic optimization. (1) Discrete Logarithm. (1)
disinformation (1) dissemination (1) Distance course (1)
distance learning (2) distance learning systems. (1) Distributed Computing. (1)
distributed information systems (1) Distributed interactive simulation (DIS) (1) distributed learning (2)
distributed sensor networks (1) distributed simulation (3) Distributed Technical Knowledge Representation (1)
diversity (1) DMA (1) doctrine (1)
Document Exchange. (1) DoD Architecture Framework (2) DODAF (2)
domestic operations (1) DRA (1) drill (1)
driver dimension (1) DRM (1) drug trafficking (1)
DSm model (1) DSm rule of combination (1) DSm theory (1)
DSmT (3) DSS (1) DST (1)
Dual Capable Aircraft (1) dual use (1) Dual use information systems; regulation; computer network operations (1)
Dubois-Prade’s rule (1) Dynamic Identity (1) dynamic modelling (1)
Dynamic Programming (2) Dynamic programming. (1) dynamic risk assessment (1)
dynamics (1) dynamics of conflict (1) e-Government (4)
e-Government. (1) e-learning (4) e-payment (1)
e-Voting. (1) early warning (1) early warning system (1)
earthquake hazard (1) earthquake safety (1) earthquake scenario. (1)
Eastern Europe (1) ECI (1) Economic Analysis (1)
economic crisis (1) Economic Evaluation of Alternatives (1) Economic issues (1)
ecosystem (1) ECURIE (1) EDA. (1)
EDRIM (1) Education (3) Education of Maritime Personnel (1)
educational system (2) EEoA (1) Effect-Based Operations (1)
Effect-based operations; battlespace; understanding (1) effectiveness (6) Effects and Criticality Analysis (1)
efficiency (8) Egypt (2) EKS (1)
electromagnetic emission. (1) Electronic Payment Systems (1) Electronic tender (1)
Electronic Voting. (1) Electronic Warfare (1) ElGamal Public Key Crypto-System (1)
emergency management (4) Emergency Management Architecture (1) Emergency Management Information System (1)
Emergency Management Scenarios (1) Emergency Notification and Alert System for the Danube River Basin (1) emergency operation center (1)
emergency planning and response (1) emergency preparedness (1) Emergency Response System (1)
Emerging Security Challenges (1) EMU (1) Encrypted Data (1)
energy dependence (1) energy security (3) ENISA (2)
enrolment phase (1) enterprise (1) Enterprise Architecture (2)
Entropy (2) Environmental Protection (1) Environmental safety (1)
erosion (1) ESDP (2) ESSO (1)
establishment (1) estimates (1) Estonia (1)
Ethics (1) ethnic conflict (1) EU (2)
EU decision-making (1) EU Directive 114/2008 (1) EU framework (1)
EU integration (2) EU missions (1) EU security (1)
EU security research (1) EUCIP (1) Eurasian Union (1)
Euro (1) Europe (1) European Critical Infrastructure Protection (1)
European defence technologi­cal and industrial base (1) European project (1) European Security (1)
European Security. (1) European states (1) European Union (6)
evaluation (1) evaluation criteria (1) evaluation process (1)
event management (1) evidence (1) evidence reasoning (1)
Evidence Theory (1) evolution of Mexican intelligence (1) Evolution of modelling (1)
evolutionary development. (1) evolu¬tion of software (1) exercise (1)
expected annual lose (1) expeditionary operations (1) experimentation (1)
expert systems (1) Experts fusion (1) Extensible knowledge space (1)
Extreme Value Theory (1) Factor (1) Failure Modes (1)
fair level of PQoS (1) False Negatives. (1) False Positives (1)
fault-tolerant architectures (1) Federal Republic of Yugoslavia (1) federated identity confidentiality (1)
Federation Development and Execution Process (FEDEP) (1) field command and control (1) fighter aviation (1)
fin mixer (1) Financial Center (1) financial scenarios (1)
financial transactions (1) Finland (1) first responders (1)
flood (1) flood hazard modeling. (1) flooding (1)
FMECA (1) FOCUS (1) FOCUS project (1)
Force Development (2) force development view (1) Force Goals. (1)
Force Information Infrastructure (1) Force Management (2) force management system (1)
force modernization (3) Force Module (1) Force planning (5)
force protection standards (1) force structure (2) force structuring (1)
Forecasting (1) foreign fighters (3) foreign policy (1)
foresight (7) Formal methods (2) Formal Task (1)
formalization (1) Forward secrecy (1) fractal clustering. (1)
Fractal Dimension (1) framework (1) France (2)
Fraud Detection (1) Free-Text Processing (1) functional capability (1)
Functional Safety (1) Functional-Architectural Model. (1) fundamental rights (1)
fuzzy commitment scheme (1) fuzzy control (3) fuzzy controller (1)
Fuzzy Logic (4) Fuzzy operators (1) fuzzy routing. (1)
Fuzzy sets (1) Gaddafi (1) Gaming (1)
Gamma Methodology (2) Gap Diffie-Hellman Groups (1) GCA (1)
gender attitudes (1) gender inequality (1) gender-sensitive approach (1)
Generalised Security Research System (1) Generalized Chinese Remainder Theorem (1) generalized input estimation (1)
Genetic Algorithms (1) genetic code (1) Geomorphology (1)
Georgia (1) geotechnical zonation (1) Germany (1)
Germany migration (1) GIS (4) GIS. (1)
global actor (1) global technological development (1) global trends (1)
globalisation (1) globalization (1) GMDSS (1)
goals (1) Good governance (6) good practices (1)
governance (6) governance functions (1) GPKI (1)
GPS (1) gray zone (1) GRCA (1)
Grid Computing (1) grid map (1) GroupWare (1)
GSM (1) Guessing attack (1) Hague Conventions (1)
HAL (1) hardware-in-the-loop simulators (1) hazard assessment (1)
Heuristics. (1) High Level Architecture (1) high-resolution tactical simulations (1)
Historical earthquakes (1) history (1) HLA (1)
Hofstede (1) homeland defense (1) homeland security (4)
Hostage Rescue Operations (1) hot plug (1) Hough Transform (1)
house wives (1) HQ training (1) Huba Wass de Czege (1)
human dignity (1) Human dimension (1) human factor (1)
human mobility (1) human rights (4) Human Safety (1)
Human Security (2) Human System (2) human trafficking (1)
Humanitarian Assistance (1) humanitarian intervention (1) humanitarian operations (2)
humanitarian-assistance scenarios (1) Hungary (1) Hurricane Katrina (1)
hybrid cloud (1) hybrid estimation (1) hybrid operations (1)
hybrid system estimation (1) hybrid systems (1) hybrid threats; conflict; resilience; deterrence; strategy (1)
hybrid war (3) hybrid warfare (3) hyper-power set (1)
I&C (1) Identification (1) ideology (1)
IED (1) Illegal Behavior (1) illegal economy (1)
illegal formations (1) illegal migration (1) illegal trafficking (1)
image classification (1) Image statistical analysis (1) IMECA (1)
IMM estimator (1) IMM tracking filter design (1) immediate action (1)
impact (2) imperfect information (1) imperial role (1)
Improvised Explosive Devices (1) incident (1) incident command post (1)
incident commander (1) Incident Management (1) incident response (1)
India (1) indicator (1) industrial control system (1)
Industrial Internet (1) industry (2) influence (1)
Informal knowledge integration (1) Information (2) information and communications technologies (1)
information assurance (5) Information Fusion (3) information goods (1)
information infrastructure vulnerability (1) Information Management (1) information operations (1)
information quality (1) Information Security (14) information security policy (1)
information security programme (1) information security standards (1) information services (1)
information sharing (1) Information society (2) information support (1)
Information System (1) information systems (1) Information Systems Support (1)
Information systems vulnerability; hacking; hackers; IT-security; critical societal infrastructure. (1) information technology impact (1) information visualization (1)
Information warfare (2) information warfare. (1) informational warfare (1)
informers (1) INMARSAT-C (1) innovation (2)
innovative warfare (1) input estimation (1) institution building (1)
institutional (top-down) and bottom-up (individual) recruitment/mobilization (1) institutional Europe (1) institutional perspective (1)
institutions (1) insurgency (2) insurgent networks (1)
Integrated capability framework (1) Integrated planning system (1) Integrated Security Sector (1)
integrated security sector; project management (2) Integration of the European States (1) integration. (1)
integrity (13) integrity policy (1) intellectual interoperability (1)
Intellectual Property Right (1) intelligence (5) intelligence agencies (1)
Intelligence assessment (1) intelligence cooperation (1) Intelligence governance (2)
intelligence operations (1) intelligence oversight (1) intelligence oversight. (1)
intelligence studies (1) intelligent agent simulation model (1) Intelligent Agents (2)
Intelligent Procurement. (1) intelligent software agent (1) inter-organisational cooperation (1)
Interactive Electronic Technical Manuals (IETMs) (1) interactive simulation models (1) Interagency (1)
interagency cooperation (1) interdependency (1) Intermestic Domain (1)
internal and external stakeholders (1) international conventions (1) international cooperation (1)
international law (1) international relations (1) International Terrorism (2)
Internet (4) Internet and governance (1) Internet and state sovereignty/authority (1)
Internet exchanges (1) Internet in China; growth in Internet use by civilians; integration of the Internet into military operations (1) Internet in conflict situations; new conflict environment; proliferation of voices; information operations; information warfare; cyberspace (1)
Internet of Things (1) Internet online application (1) internet service (1)
Internet skirmishes. (1) Interoperability (7) Interoperability. (1)
intervention (1) inter­action. (1) Introduction (2)
intrusion (1) intrusion avoidance. (1) intrusion detection (1)
Intuition-based Decision-making (1) investment management (1) Iran (2)
Iraq (5) Iris Authentication (1) Iris Recognition (1)
ISAF (2) ISAR Images (1) ISDN (1)
ISIL (1) ISIS (2) Islam (1)
Islamic Movement of Uzbekistan (1) Islamic State (8) Islamic State Khorasan (1)
Islamist (1) ISR (1) Israel (1)
IT governance (1) IT management (1) IT management. (1)
IT security (3) IT specialist (1) IT-infrastructures (1)
IT4Sec reports (106) Italian Mafia (1) Jabhat al Nusra (1)
Jabhat Fath al Sham (1) jamming (1) Java (1)
jet length maximization (1) Jihadism (1) Jihadist (1)
JIM (1) Joint and Multinational (1) joint capabilities (1)
Joint National Training Capability (1) joint operation. (1) Joint theater level simulation (JTLS) (2)
Joint Training (1) just-in-time (1) Kalman Filtering (1)
Karachi (1) Kazakhstan (1) key enabling technology (1)
KGB (1) KINEROS (1) Knowledge Based Systems (1)
Knowledge Logistics (1) knowledge management (1) knowledge portal (1)
Kolontar (1) Kosovo (3) Kurdish question (1)
Kyrgyzstan (1) Land Forces (1) language learning (1)
Latvia (1) law (2) law enforcement (3)
law enforcement agencies (1) Law of Neutrality (1) law-enforcement (1)
Leadership (3) learning activities (1) Learning in Fuzzy Environment (1)
Learning Management System (2) learning management system (LMS) (1) learning objects (1)
learning technology standards (1) learning tool (1) learning tools and activities (1)
legacy architectures (1) legal base (1) legal basis (1)
legal framework (1) legislation measures (1) legislative base (2)
legislature (1) lessons learned (1) level of ambition (1)
levels of ambition (1) Libya (3) License Plate Recognition (1)
Liddell Hart (1) life cycle cost. (1) Life cycle management (2)
linear prediction. (2) liquidation of the consequences of emergency (1) Lithuania (1)
Live Teleconsultation (1) LMS (3) location (1)
long-term defence planning (2) Long-term defense planning (1) low-laying coastal territories (1)
LSB (1) M-learning (1) Macedonia (1)
machine communications (1) macrograph. (1) mafia (1)
mainstreaming (1) major security events (1) Malware Attacks (1)
Man-Made Disasters (1) management (3) management environment (1)
management of the organization (1) management policy (1) manager/agent paradigm (1)
mandate (1) maneuvering target tracking (1) manning (1)
MAP (1) Marconi NMS. (1) marine targets tracking (1)
marine tourism (1) maritime (1) Maritime Crisis Management System analysis and design; Maritime Security Negative Factors evolution; maritime security challenges (1)
Maritime critical infrastructure (1) maritime critical infrastructure protection (1) maritime sector transformation (1)
Maritime Security (4) Maritime Situational Awareness (1) maritime sovereignty (1)
Maritime terrorism (1) Maritime Transport System (1) market corruption (1)
Markov and semi-Markov chains (1) master program (1) master studies (1)
matrix (1) maximin optimization (1) Maximizing decision (1)
measure (1) Measures of Effectiveness and Measures of Performance (1) measuring results (1)
Medical Information Systems (1) medical terminology (1) megacities (1)
megastate (1) Membership Action Plan (1) membership function (1)
meta-model (1) Metadata Modeling (1) method (2)
methodology (1) methods (1) Metric (1)
metrics (1) migrants (1) military (1)
military assistance (1) military budgeting (1) Military command and control systems (1)
military cooperation (1) Military Doctrine (1) military education (2)
military education. (1) Military Logistics (1) Military organisation (1)
military training (1) military-industrial complex (1) Minister of Defence (1)
Ministry of Defence (1) Ministry of Interior (2) Ministry of the Interior (1)
missile (1) Missile Defence (1) mission command (1)
mitigation and avoidance of accidents. (1) MKD-CIRT (1) Mobile agents (1)
mobile combat radio network (1) Mobile Command Post (1) mobile commerce (1)
Mobile Communications (1) mobile devices (1) Mobile Internet threats (1)
mobile IP network (1) Mobile phone (1) Mobile robot (1)
Mobile Security (1) mobile security threats (1) modalities (1)
model (1) model identification (1) modeling (3)
Modeling and Simulation (1) Modeling and Simulation; Management; Strategy; Analysis; Business Plan; Irregular Warfare; Global War On Terror; GWOT (1) Modelling (4)
Modelling and Simulation (3) Models (2) modern security. (1)
modernization (1) moderniza­tion (1) MODSIM (1)
MOEACA (1) MOICA (1) Monetary Policy (1)
Money Laundering (2) Mongolia (1) monitoring network (1)
monitoring station (1) Monte-Carlo analysis (1) Montenegro (1)
moral imperative (1) morphological analysis (1) Mortgage Market (1)
motiva¬tion (1) MPFSEE. (1) MSDF (1)
multi detection (1) Multi-Agency Operations (1) multi-agent based distillation system (1)
Multi-agent system (1) Multi-Agent Systems (2) Multi-Agents Applications (1)
multi-attribute value theory (1) multi-criteria decision-making (1) multi-national peace support operations. (1)
multi-role fighter (1) multidimensional security (1) Multilateral Interoperability (1)
multimedia systems (1) multimedia technologies (1) multinational cooperation (3)
multinational exercise (1) multiple failures (1) multiple hypotheses tracking (1)
Multiple Hypothesis Tracking (1) multiple maneuvering targets (1) multiple model estimation and control (1)
Multipolar world (1) multirole fighters (2) Mutual Authentication (1)
Mutual Information (1) Nagorno-Karabakh (1) narcotic substances (1)
Nation-building (1) National Automated Radiation Monitoring System (1) National Civil Emergency Plan (1)
National Cybersecurity (1) national cybersecurity centre (1) National cybersecurity management (1)
national cybersecurity strategy (1) National Emergency Management System (1) National Firefighting and Rescue System (1)
national military command center (NMCC) (2) National security (3) national security system (1)
National Situation Center (1) Nationalisation of Security Research (1) NATO (20)
NATO Computer Incident Response Capability (1) NATO Cyber Defence Management Authority (1) NATO enlargement (3)
NATO enlargement. (1) NATO Industry Cyber Partnership (1) NATO integration (1)
NATO Response Force (NRF) (1) NATO response force. (1) NATO Standards. (1)
NATO training mission (1) NATO Transformation (1) NATO-EU Cooperation (4)
NATO-Russia cooperation (1) NATO’s Defence Planning Process (1) Natural Disasters (4)
naval capabilities (1) NC3A (2) NCIA (1)
NCIRC (2) NCIRP (1) neo-industrial economy (1)
network enabled capabilities (2) Network Enabled Capability (1) network evolution (1)
Network Management System (2) network resource management (1) Network Security (1)
Network-based Defence (1) Network-Centric Warfare (1) networking (2)
Networks (1) Neural Networks (1) neurobiology (1)
New Risks and Vulnerabilities (1) niche capabilities (1) NMCC (1)
non-proliferation (3) Non-state actors (1) non-transferable investments (1)
noopolitik. (1) North Africa (1) NPP (3)
NSA files (1) Nuclear (1) Nuclear emergency (1)
nuclear power plant (2) Nuclear Regulatory Agency (1) Obama Administration (1)
object management (1) Object Modeling (1) Object-oriented programming (1)
Objectivity (1) Oblivious Transfer (1) observer status (1)
officer corps (1) offset (1) On-board Instrumentation and Control System (1)
on-line estimation (1) One-Way Hash Function (2) One-Way Property (1)
ontological modelling (1) Ontology (1) Ontology Management (1)
Open Architecture (1) open source (1) Operation Allied Force (1)
operational (2) operational analysis (1) Operational planning (2)
Operational Research (1) operational view (1) Operational Wargaming (1)
operations (1) operations research (1) opera­tions analysis (1)
op­erational effectiveness (1) Oranised crime (1) Organization (4)
organizational change (1) organizational culture (2) organizational design (1)
Organizational Development (1) Organized crime (5) Osama bin Laden (1)
OTH-RADARs (1) OTS component assessment (1) outreach (1)
Outsourced Database Services (1) oversight (3) Pakistan (2)
pandemics (1) PAP-DIB (1) paradigmatic deficiency (1)
parameter uncertainty (1) parastate (1) parliamentarian oversight (1)
parliamentary oversight (2) participatory foresight (1) Partnership for Peace (6)
partnership goals (1) partnerships (1) Password Authentication (2)
Password Guessing Attacks. (1) Pattern Recognition (1) Payment System (1)
payment systems (1) PBX (2) PBX security (1)
PDA (1) Peace Shield 2000 (1) Peace-building (1)
Peacekeeping operations (1) Pedagogy (1) peer countries (1)
perceived quality of service (1) Perception of security (1) performance (1)
performance indicators. (1) personality modeling. (1) Petersberg (1)
Petersberg tasks (1) PfP (2) PfP Consortium (3)
PfP exercise (1) PhD studies (1) Phishing (1)
PIMS (1) Piracy (1) PKK (1)
plagiarism (1) Plan (1) Planning (2)
planning for disaster protection. (1) planning methodology (1) planning scenarios (2)
planning. (1) Plate Detection (1) plausible and paradoxical reasoning (1)
Poland (1) Poland; Lockheed Martin F-16; Saab/BAE Systems JAS-39 Gripen; Dassault Mirage 2000-5 Mk II; acquisition; technical comparison; financing; offset; U.S.-Polish relation-ship; fighter competition (1) police reform (1)
policy (5) Policy function (1) policy guidance (1)
policy-making (1) political actors (1) political in-stability (1)
political level (1) political perceptions (1) Political stability (1)
politics (1) pollution detection. (1) polycentric world (1)
pooling and sharing (1) Population (1) portfolio management (2)
positioning (1) post-communist transition (1) post-industrial economy (1)
potentially pandemic pathogens (1) Power grid safety (1) Powersim (2)
PPBS (2) PQoS (1) Practical courses on cybersecurity (1)
pre-crisis operations (1) preemption (1) preparedness (1)
prevention (3) Primary and Secondary Analysis (1) primitive capability (1)
privacy (4) private cloud (1) Private Information Retrieval/Storage (1)
proactive identification (1) Probability (1) probability of emission detection (1)
Processing centre (1) procurement (3) procure­ment (1)
professionalization. (1) profiling (1) program (1)
program structure (1) Programming (3) progressive framing (1)
Prohibition of War (1) project (1) project portfolio (1)
projectile or probabilistic hit resolution (1) propaganda (1) proposals (1)
protection in emergencies (1) protection of the population (1) prototyping (1)
proxy server (1) proxy signature (1) proxy war (1)
Pseudo-Random Number Generator. (1) PSTN (1) psychological warfare. (1)
psychology of violence (1) public cloud (1) public diplomacy (1)
public diplomacy; diplomacy; counterterrorism; battle of ideas; State Department; CIST (Countering Ideological Support for Terrorism). (1) Public Health Research (1) public private partnership (1)
public procurement (1) public tenders. (1) public-private collaboration (1)
public-private partnership (1) purchasing power parity. (1) Putin (1)
QPR (1) Qualitative belief (1) quality management (1)
Quantitative belief (1) quantity of intelligence information needed for understanding the information; “pulsation” of information at situation change. (1) questionnaire (1)
R&D (1) R&D management (1) radar data processing (1)
radar simulation and modeling (1) radar technology (1) Radiation emergency (1)
Radio Access Points (1) Radiological Safety (1) RAM (1)
Randomization (1) ranking (1) Rational-Analytic Decision Making Framework (1)
Real-Time Interactive Telemedical Services (1) realpolitik (1) rearmament (1)
Reconfiguration (1) recon­naissance (1) recruitment (1)
reference scenarios (1) Reflexive Control (1) regional cooperation (1)
regional response (1) regional security (3) Regional Strategies (1)
regionalization (1) reindustrialization (1) Reliability and safety of rocket-space systems (1)
Remote Authentication (3) Reorganizing C2 (1) Republic of Moldova (1)
Reputation (1) Reputation-based trust systems (1) requirements (1)
Research and Demonstration Center (1) research case (1) research policy (1)
research roadmap (1) resilience (4) resilient system (1)
resource allocation (1) resource framework (1) Resource Protection (1)
resources (3) response (1) Responsibility To Protect (1)
responsible science (1) Restructuring (1) revolution (1)
Risk (10) Risk Analysis (2) risk appetite (1)
Risk Assessment (3) risk assessment. (1) Risk engineering (1)
risk management (7) risk profile assessment (1) risks (2)
risks of orbital carrier rockets and spacecraft failures (1) robustness (1) Romania (1)
RS (1) RSS (1) rule of combination (1)
Russia (5) Russian Federation (4) Russian policy (1)
Russian Transnational Organized Crime (1) Russian-Ukrainian conflict (1) Russia’s Security Concepts. (1)
Russo-Ukrainian war (1) S1000D (1) safety (4)
safety analysis (1) safety block diagrams (1) Safety case core (1)
safety engineering (1) Safety Management. (1) Safety of Shipping (1)
safety-critical software (1) Sahel (1) SAR (1)
satellite (1) Satellite Communications (1) Satellite-Based Telecommunication Systems (1)
Saudi Arabia (1) Saudi Arabia. (1) SBU (1)
scale (2) scenario (1) scenario design (1)
scenario foresight (1) scenario method (1) scenario planning (2)
Scenario Space (1) Scenario-based capability-oriented planning (1) scenario-based planning (2)
Scenarios (2) science (1) scientific organizations (1)
scientific support (1) scope (1) SCORM (5)
SCORM-conformance (1) SDR (1) sea level rise (1)
Sea Surveillance (1) Search and Rescue (1) SeaSparrow (1)
SeaSparrow Program (1) secrecy (1) Secrets Exchange. (1)
sectarian conflict (1) sectarianism (1) Secure E-Mail (1)
secure protocol (1) secure transportation (1) security (23)
Security Access (1) security and defence reform (1) security assertion markup language (1)
Security Challenges (1) security cooperation (1) security discourse (2)
Security Economics (1) security engineering (1) security environment (1)
Security foresight (2) security guarantees (1) security implications of IoT (1)
security policy (8) Security Policy Making (1) Security research (1)
Security Research 2035 (1) Security Risks (1) security sector governance (1)
Security Sector Operations (1) security sector reform (10) Security Sector Transformation (2)
security strategy (2) security system (1) security threats (2)
SEDM (1) SEE security cooperation (1) SEECAP (1)
SEEDRMAP (1) seismic hazard (1) Seismic risk (1)
seismic risk management (1) Self Organizing Map (1) Semantic Mediation (1)
Sensitivity Analysis (1) sensor data processing (1) separatists. (1)
Serbia (1) SEREIN (1) Services. (1)
sex slaves (1) se¬curity solution (1) Shanghai Cooperation Organization (1)
Shannon-HartleyTheorem (1) shaped charge (1) sharable content objects (1)
signature (1) Siloviki (1) Simmelian backbone (1)
simulation (6) simulation of national power and national security. (1) simulation-based training (1)
simulations (1) simulators (1) Sinai Province (1)
Situation Assessment. (1) Situation Center (1) situation development operations (1)
Situational awareness (2) situational scenario. (1) skeleton units (1)
skills (1) slopes (1) Slovenia (1)
small state (1) small state theory (1) Smart Card (2)
Smart Cards (1) smart defence (3) smart defence. (1)
smart security (1) smart substation (1) smartphone (1)
smuggling (3) SOA (1) Sochi Olympics (1)
social instability (1) Social network analysis (1) social networks (3)
social security (1) social structure (1) Social Systems (1)
societal development (1) Societal Security (1) society (1)
socio-constructivism (1) Socio-Economic Systems (1) Soft Computing (1)
soft computing agents (1) Software agent (1) Software agents (1)
software architectures (1) software as a service (1) software development (1)
software development process (1) software faults. (1) Software technology (1)
software tools (1) Solidarity Clause (1) South East Europe (1)
South Eastern Europe (2) South Eastern Europe. (1) South Ossetia (1)
South-Eastern Europe (1) Southeast Europe (1) Sovereignty (2)
space (1) space surveillance network (1) space-based communications (1)
Spam Detection (1) Special Antiterrorist Unit (1) Special Operations Forces (1)
specialised emer­gency teams (1) specialization (2) spectral analysis (2)
speech recognition (1) Sphere of influence (1) spillover effects (1)
SSD (1) SSTR (1) Stability (2)
Stability Pact for South East Europe (1) Stability Pact for South Eastern Europe (1) standard (2)
Standing Operating Procedures (1) State Fire and Rescue Service (1) State information resource (1)
State register of potentially dangerous objects (1) State Security (1) statistical analysis (1)
Steganographic (1) Steganometric. (1) storm events (1)
Strategic Assessment (1) Strategic Costing Model. (1) strategic defense review (1)
strategic map (1) strategic planning (1) strategic plan­ning. (1)
strategic uncertainty (1) strategy (9) Strategy Pyramid (1)
structural constraints (1) Structural Equation Modelling (1) structural realism (1)
structural reform (1) structured argumentation (1) Stuxnet. (1)
Subject (1) subversion (1) Sun Tzu (1)
supply chain (1) supply chain crime (1) supply chain Petersberg tasks (1)
supply chain protection. (1) supply chain security (1) Surface Missile System (1)
surveillance (2) sustainable development (1) SWOT analysis (1)
synthesis (1) synthetic biology (1) Syria (4)
Syrian asylum seekers (1) system (1) system analysis (1)
system architectural frameworks; coalition C2 (1) System Architecture (1) system architectures (1)
System Design (1) System Dynamics (2) System Engineering (1)
systemic corruption (1) TaaS (1) TACS (1)
Tactical Communications Network (1) Tactical Forms (1) Tactical Nuclear Weapons (1)
Tactical Wargaming (1) Tajikistan (1) Taliban (1)
target tracking (1) task list (1) taxonomy (1)
technical (2) technical architecture (1) technical architecture framework (1)
technical expertise (1) technical manuals (1) techniques. (1)
technological risk (1) technology (1) Technology Insertion. (1)
technology-supported training (1) Telephony (1) template (1)
TEMPUS (1) Terrorism (12) Terrorism at Sea (1)
Terrorism. (1) Terrorist Actions (1) terrorist attack at Burgas airport (1)
Terrorist Financing (1) terrorist incident response (1) Terrorist Networking (1)
terrorist organizations (1) Terrorist Recruitment (1) terrorist threat (1)
terrorist threat. (1) Testing as a Service (1) testing tools. (1)
The Netherlands (1) the United Kingdom (1) threat (3)
threat assessment (1) Threat spectrum (1) threats (3)
three-pillar disaster management system (1) time stamp authority (1) Timestamp (1)
tool (1) tools (1) Topographical and Topological Data Estimation (1)
Tracking (1) tracking algorithms (1) tracking. (1)
Traffic Control. (1) trafficking in persons (1) training (6)
Training and Exercises (1) training effectiveness (1) training simulators (1)
Transaction (1) transactional distance (1) transactions control (1)
transborder conflict (1) Transformation (5) transformation challenges (1)
transfor¬mation (1) transition (1) Transition and Reconstruction (1)
transition detection (1) transnational crime (1) transnational organised crime (1)
Transparency (16) Tree-Based Index Structure (1) tribal networks (1)
TRL (1) Trojan life cycle (1) Trojans (1)
Trojans detection (1) trust (3) trusted routing (1)
Tunisia (1) Turkey (2) Turkish military (1)
Uighurs (1) Ukraine (5) Ukrainian crisis (1)
ultra-large database (1) Uncertainty (5) uncertainty. (1)
unconventional warfare (1) undefined (1) unified information system (1)
United Kingdom (2) United States (1) universal mind (1)
Unknown attack (1) UNSC Resolution 1325 (1) Untrusted Server (1)
US (1) US Global Strategy (1) US intervention (1)
US-Europe Security Issues (1) User Anonymity (1) User Impersonation. (1)
users response (1) Uzbekistan (1) validation (1)
valleys (1) values (1) variable parameter (1)
variational problem (1) vehicle theft (1) velocity control autopilot (1)
verification (1) Virtual diplomacy; foreign policy in information age; empowerment by networks; rise of non-state actors; realpolitik (1) virtual reality (1)
Virtualisation (1) Visibility function (1) vision (2)
vocabulary learning strategies (1) volunteer battalions (1) Vulnerabilities (3)
vulnerability (6) war (1) War on Terror (1)
Wardriving (1) Warfare (2) Wargaming (1)
warriors (1) Warsaw (1) Watermarking (1)
Watermarking. (1) way of life (1) Web 2.0 (3)
Web 2.0/Web 3.0 технологии (1) Web 3.0 (3) Web Agents (1)
web service (1) Web Services (1) web sources (1)
web-based learning (2) Web-service (1) welcoming address (1)
WEP (1) Western Balkan (1) Western New Independent States (1)
Wi-Fi technology (1) wiki. (1) Wired Equivalent Privacy (1)
Wireless mesh network (1) Wirless Local Area Network (1) WLAN (1)
women (1) X-ray (1) XML (1)
XML Encryption (2) XML Signature (1) Yager’s rule (1)
Yemen (1) Абу Бакр (1) Абхазия (1)
агент влияния (1) АК (1) АКАП (1)
активные мероприятия (1) Аль-Каида (4) Аль-Каида в Исламском Магрибе (1)
Аль-Каида на Аравийском полуострове (1) ан-Нусра (1) антиквариат (1)
апетит към риска (1) Арабская весна (2) атаки (1)
атрибутивна теория (1) аутрич (1) Афганистан (2)
Ахрар аль-Шам (1) баланс на последствията (1) балансирана система от показатели за оценка на ефективността (1)
Барак Обама (1) безопасность (1) биобезопасность (1)
Биологическое оружие (1) Боко Харам (1) България (3)
бюджет (1) бюджет за отбрана (2) Варшава (1)
взаимодействие (1) внешняя политика (1) военна реформа (1)
военная доктрина (1) военная помощь (1) военно сътрудничество (1)
военное образование (3) военные операции (1) воины (1)
война (1) война с терроризмом (1) всеобхватна сигурност (1)
Въоръжени сили (1) гарантии безопасности (1) гендерное неравенство (1)
гендерные отношения (1) гендерный подход (1) геополитическое влияние (1)
гибридная война (5) гибридные угрозы; конфликт; устойчивость; сдерживание; стратегия (1) ГИС (1)
глобализация (1) гражданска защита (3) гражданска сигурност (1)
гражданский аспект дипломатии (1) гражданско общество (1) гражданское общество; политика (1)
Грузия (1) двойное назначение (1) дедовщина (1)
дезинформация (1) демократичен контрол (1) демократия (1)
Джебхат ан-Нусра (1) Джебхат Фатах аш-Шам (1) джихадизм (1)
динамика на потребителските реакции (1) дипломатия (1) Дирекция за управление при извънредни ситуации (1)
добро управление (2) добровольческие батальоны (1) доверие (2)
доктрина (1) домохозяйки (1) доставки за отбраната (1)
думи: неопределеност (1) Европейска интеграция (1) европейская безопасность (3)
Европейский союз (2) Египет (2) експертни системи (1)
Естония (1) етичен кодекс (1) етнически конфликт (1)
ефективност (2) ефикасност (3) женщины (1)
Закон за защита при бедствия (1) законодателна рамка (2) заплаха (1)
защита (1) защита на критична инфраструктура (1) защита на населението (1)
значения (1) ИГИЛ (1) идеология (1)
изкуствен интелект (1) измерване (1) Израиль (1)
Източна Европа (1) индикатор (1) Индия (1)
Индустриальный Интернет (1) инновация (1) иностранные боевики (2)
институциональное (сверху-вниз) и индивидуальное (снизу-вверх) рекрутирование (1) интегриран сектор за сигурност (1) интегритет (6)
интелигентна отбрана (4) интервенция (1) интервенция США (1)
Интернет вещей (1) информационна сигурност (1) Информационна система за управление при извънредни ситуации (1)
информационная война (2) информационни системи (1) инцидент (1)
Ирак (4) Иран (2) искусство (1)
Исламское государство (8) Исламское государство Хорасан (1) Исламское движение Узбекистана (1)
исследования по вопросам разведывательной деятельности (1) история (1) Йемен (1)
Кавказ (1) Каддафи (1) Казахстан (1)
Карачи (1) каркасные единицы (1) КГБ (1)
кибер атака (1) кибер заплахи (3) кибер пространство (1)
кибер-война (1) кибер-физические системы (1) кибернетична сигурност (1)
Киберпространство (1) киберсигурност (3) Китай (1)
класификация (2) Клаузевиц (1) ключевая технология (1)
когнитивный (1) кодекс поведения (1) Колонтар (1)
командване в мисии (1) командование и управление (1) компетентности (1)
комплексность (1) компютърна графика (1) компютърно подпомагани учение (КПУ) (1)
конвергенция (1) контекст (1) контр-повстанческие действия (1)
контр-терроризм (1) контрабанда (1) контроль над вооружениями (1)
концепции (1) координация (3) коррупция (2)
корупция (1) корупция; пазарна корупция; мрежова корупция; фактори за корупцията; последици от корупцията; антикорупция (1) Косово (1)
криза (1) криминальный бизнес (1) критические инфраструктуры (1)
критична инфраструктура (1) кросс-культурная компетентность (1) Крым (1)
культура (1) Кыргызстан (1) Латвия (1)
летательный аппарат двойного назначения (1) Ливия (3) Лиддел Гарт (1)
Лидерство (1) лингвистические умения (1) Литва (1)
матрица (1) мафия (1) машинные коммуникации (1)
мащаб (2) мегаполисы (1) международные конвенции (1)
мейнстрим (1) менеджмент конфликтов (1) мениджмънт (2)
меры по укреплению доверия и безопасности (1) метод на сценариите (1) метод ПЯИО (1)
Метрика (1) мигранты (1) Министерство на вътрешните работи (2)
Министерство на отбраната (1) министър на отбраната (1) многонационално сътрудничество (1)
многонациональные формирования (1) многополярный мир (1) мобилизация (1)
моделиране (1) модернизация (1) Монголия (1)
моральный императив (1) Морское пиратство (1) мултимедийни системи (1)
мултимедийни технологии (1) наводнения (1) наркотические вещества (1)
НАТО (12) Национална противопожарна и спасителна служба (1) Национална система за противопожарна защита и спасяване (1)
Национална система за управление при извънредни ситуации (1) национальные интересы (1) Негосударственные акторы (1)
незаконная торговля (1) незаконная экономика (1) незаконные формирования (1)
нейробиология (1) неоиндустриална икономика (1) неопределенность (1)
нераспространение (1) нетрансферабельные инвестиции (1) нишови способности (1)
образ жизни (1) обучение на база на информираност (1) Обща политика за сигурност и отбрана (3)
общественная дипломатия (1) Олимпиада в Сочи (1) операции (1)
операционализация культуры (1) организационна култура (1) организация (1)
организация полиции (1) организованная преступность (4) основное течение (1)
отбранителна индустрия (1) Отбранителна политика (5) отбранителна реформа (1)
отбранителни способности (3) отбранително планиране (1) ответственная наука (1)
ответственность за защиту (1) отвлекающие действия (1) отговор при бедствия (8)
отмывание денег (1) отчетност (3) офицерский корпус (1)
охрана правопорядка (2) оценяване и управление на риска (1) очак- вана годишна загуба (1)
Пакистан (2) парламентарен контрол (1) парламентарен надзор (1)
партнерства (1) Партньорство за мир (1) пересечение границ (1)
Перестройка (1) ПИВСН (1) план действий (1)
План действий по обеспечению готовности (1) племенные сети (1) повстанческие сети (1)
повстанческое движение (1) пограничный забор с Россией (1) подготовка (9)
подготовка на войските (1) подрывная деятельность (1) пожари земетресения (1)
позициониране (1) политика (5) политика безопасности (2)
политика за интегритет (1) политика за сигурност (1) политика исследований (1)
политическое сознание (1) полицентрический мир (1) Полша (1)
портфолио от проекти (2) последствия ИВ для безопасности (1) постиндустриална икономика (1)
потенциально пандемические патогены (1) поуки от практиката (1) правоохранительные органы (1)
превенция (1) предшествовавшая дислокации (1) преступность (1)
природни бедствия (1) провинция Синай (1) прозрачност (4)
прокси-война (1) промышленность (1) противодействие (1)
психология насилия (1) публично-частное сотрудничество (1) Путин (1)
Пълно дисково криптиране (1) развитие на въоръжените сили (1) разоружение (1)
разрешение конфликтов (1) реальная политика (1) революция (1)
регионализация (1) Резолюция СБ ООН 1325 (1) реиндустриализация (1)
реорганизации C2 (1) ресурси (1) ресурсна рамка (1)
ресурсы (1) реформа на сектора за сигурност (1) реформа полиции (2)
реформиране на сектора за сигурност (1) риск (4) рисков профил (1)
российская политика (1) Российская Федерация (2) российско-грузинские отношения; внутренняя политика Грузии; Южная Осетия; Абхазия; международные отношения на Кавказе (1)
российско-украинская война (1) российско-украинский конфликт (1) Россия (3)
Румъния (1) самокриптиращ (1) Саудовская Аравия (1)
Сахель (1) САЩ (1) связь (1)
связь преступность-терроризм (1) сдерживание (2) Северная Африка (1)
сексуальные рабыни (1) сектантский конфликт (1) сектантство (1)
сектор за сигурност (1) серая зона (1) сигурност (1)
силовая политика (1) силовики. (1) симулации (1)
симулационни тренажори (1) синтетическая биология (1) Сирия (3)
систематическая коррупция (1) системи за подпомагане вземането на решения (1) Словения (1)
совместное создание (1) Соединенное Королевство (1) создание способностей (1)
сотрудничество НАТО-ЕС (1) сотрудничество Россия-НАТО (1) социални мрежи (1)
социальная структура (1) социальные сети (1) Спектър на заплахи (1)
специализация (3) сплоченность (1) среда за управление на КПУ (1)
стандарт (1) стандарти за защита (1) стандартни оперативни процедури (1)
статус наблюдателя (1) стратегический менеджмент (1) стратегический риск (1)
стратегия (3) структури за управление при кризи (1) структурна реформа (1)
Сун Цзы (1) сценарии за планиране (1) сценарий (1)
сътрудничество (1) Таджикистан (1) тактическое ядерное оружие (1)
Талибан (1) терроризм (4) техники (1)
технология (1) торговля людьми (1) трансгранично въздействие (1)
тристълбова система за управление при бедствия (1) Тунис (1) угон автомобилей (1)
Узбекистан (1) уйгуры (1) Украина (1)
украинский кризис (1) Украйна (2) укрепване на отбранителни институции (1)
умения (1) Унгария (1) управление (1)
управление на проекти/програми (1) условия (1) устойчивост (1)
учебная программа (1) уязвимост (1) фирма (1)
Франция (1) халифат (1) Хуба Васс де Чезе (1)
централизация (2) централизирана структура (1) Централна Азия (2)
Центральная Азия (1) человеческое измерение (1) Черна гора (1)
Чечня (1) Шанхайская организация сотрудничества (1) экосистема (1)
экспедиционные операции (1) энергетическая зависимость (1) Южная Осетия (1)
Южный Кавказ (1) языковое обучение (1) “Cost-Effec-tiveness” Analysis. (1)
„balance of consequences“ (1)