|
I&C (1) | ICT (1) | ICT competences (1) |
ICT infrastructure (1) | ICT Personnel development (1) | ICT security (1) |
ICT taxonomies (1) | ICT technologies (1) | Identification (1) |
identification/assessment techniques (1) | ideology (2) | IDS dataset (1) |
IED (1) | Illegal Behavior (1) | illegal economy (1) |
illegal formations (1) | illegal migration (2) | illegal trafficking (1) |
image classification (1) | image formation (1) | image reparation (1) |
Image statistical analysis (1) | IMECA (1) | IMM estimator (1) |
IMM tracking filter design (1) | immediate action (1) | impact (3) |
impact assessment (1) | imperfect information (1) | imperial role (1) |
Implementations (1) | importance (1) | Improvised Explosive Devices (1) |
in-depth protection (1) | incident (1) | incident command post (1) |
incident commander (1) | Incident Management (1) | incident response (2) |
India (1) | indicator (1) | indicators (1) |
Indo-Pacific (2) | Indonesia (1) | inductive approach (1) |
industrial capacity (1) | industrial catastrophes (1) | industrial control system (1) |
industrial control systems (1) | Industrial Internet (1) | Industrial IoT (1) |
industrial pollutants (1) | industrial relations (1) | industry (2) |
industry 4.0 (3) | inequalities (1) | inertial navigation sensor (1) |
infantry (1) | influence (2) | Infogate (1) |
Informal knowledge integration (1) | Information (4) | information and communication technologies (1) |
information and communications technologies (1) | information assurance (5) | information campaign (1) |
information environment (1) | information exchange gateways (1) | information flow (1) |
Information Fusion (3) | information goods (1) | information infrastructure vulnerability (1) |
Information interoperability (1) | information load (1) | Information Management (1) |
information operation recognition (1) | information operations (6) | information quality (1) |
Information Security (21) | information security management (2) | information security of the state (1) |
information security policy (1) | information security programme (1) | information security standards (1) |
information services (1) | information sharing (10) | information sharing models (1) |
Information society (2) | information summarization (1) | information support (1) |
Information System (3) | information system security (1) | information systems (1) |
Information Systems Support (1) | Information systems vulnerability; hacking; hackers; IT-security; critical societal infrastructure. (1) | information technologies (1) |
information technology (2) | information technology impact (1) | information trauma (1) |
information visualization (1) | Information warfare (5) | information warfare. (1) |
informational warfare (1) | informers (1) | infrastructure (1) |
infrastructure with significant reach (1) | inherent structural threats (1) | INMARSAT-C (1) |
innovation (7) | innovation management (2) | innovative warfare (1) |
input estimation (1) | Instant messaging malware attack (1) | institution building (1) |
institutional (top-down) and bottom-up (individual) recruitment/mobilization (1) | institutional capabilities (1) | institutional capacity building (1) |
institutional Europe (1) | institutional perspective (1) | institutional resilience (1) |
institutions (4) | insurgency (2) | insurgent networks (1) |
Integrated capability framework (1) | Integrated planning system (1) | integrated security management system (1) |
Integrated Security Sector (2) | integrated security sector; project management (1) | integrated security system (1) |
integrated system (1) | Integration of the European States (1) | integration. (1) |
integrity (13) | integrity policy (1) | intellectual interoperability (1) |
Intellectual Property Right (1) | intelligence (13) | intelligence agencies (1) |
Intelligence assessment (1) | intelligence cooperation (1) | Intelligence governance (2) |
intelligence operations (1) | intelligence oversight (2) | intelligence oversight. (1) |
intelligence reform (2) | intelligence reforms (1) | intelligence sector reforms (1) |
intelligence studies (1) | intelligent agent simulation model (1) | Intelligent Agents (2) |
intelligent complex adaptive system (1) | Intelligent Procurement. (1) | intelligent software agent (1) |
inter-national cooperation (1) | inter-organisational cooperation (1) | Inter-organizational (1) |
Interactive Electronic Technical Manuals (IETMs) (1) | interactive simulation models (1) | interactive verification (1) |
Interagency (2) | interagency cooperation (6) | interdependence (1) |
interdependencies (1) | interdependency (1) | interdisciplinary research (1) |
interests (1) | interface solutions (1) | intermediate force capabilities (6) |
Intermestic Domain (1) | internal and external stakeholders (1) | internal intelligence or counterintelligence (1) |
international aid (1) | international competition (1) | international conflict (1) |
international conventions (1) | international cooperation (2) | international law (1) |
international military cooperation (1) | international organisations (1) | international relations (1) |
international security (3) | International Terrorism (2) | international law (1) |
Internet (4) | Internet and governance (1) | Internet and state sovereignty/authority (1) |
Internet exchanges (1) | Internet in China; growth in Internet use by civilians; integration of the Internet into military operations (1) | Internet in conflict situations; new conflict environment; proliferation of voices; information operations; information warfare; cyberspace (1) |
Internet of Things (5) | Internet online application (1) | internet service (1) |
Internet skirmishes. (1) | Interoperability (12) | Interoperability. (1) |
interoperable simulation (1) | interorganizational cooperation (2) | intervention (2) |
interaction. (1) | Introduction (2) | intrusion (1) |
intrusion avoidance. (1) | intrusion detection (5) | Intuition-based Decision-making (1) |
intuitionist fuzzy logic (1) | Intuitionistic fuzzy estimation (1) | intuitionistic fuzzy logic (1) |
investigation (1) | investment (1) | investment management (1) |
IoT (3) | IPTV (1) | Iran (2) |
Iraq (5) | Iris Authentication (1) | Iris Recognition (1) |
irregular warfare (1) | ISAF (2) | ISAR Images (1) |
ISDN (1) | ISIL (1) | ISIS (2) |
Islam (1) | Islamic Movement of Uzbekistan (1) | Islamic State (8) |
Islamic State Khorasan (1) | Islamism (1) | Islamist (1) |
ISR (1) | Israel (1) | IT capabilities (2) |
IT education (3) | IT governance (1) | IT management (1) |
IT management. (1) | IT organisations (1) | IT personnel (1) |
IT security (5) | IT services (2) | IT specialist (1) |
IT taxonomy (1) | IT-infrastructures (1) | IT4Sec reports (106) |
Italian Mafia (1) | | |