Ключевые слова (Keywords)

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C2 (1) C2 capabilities (1) C2 management (1)
C2 principles (1) C2IS (1) C3 (1)
C4 (1) C4 project management (1) C4I (3)
C4I systems (3) C4ISR (5) C4ISR Architecture (1)
C4ISR capabilities (1) C4ISR Structural Approach (1) C4ISR systems; operational (1)
caliphate (1) caliphate; internet; ISIS; radicalization; relational development; social media; terrorism; Twitter (1) CALL (2)
CAM (1) campaigns (1) CAOC (1)
capabilities (9) Capabilities Development (1) capabilities-based assessment (1)
capabilities-based defense planning (1) capabilities-based planning (3) capability (2)
Capability Assessment Methodology (1) Capability costing (1) capability delivery (1)
capability development (5) Capability Discussion Matrix (1) capability divelopment (1)
capability gaps (1) capability maturity models (1) capability portfolio (1)
capability prioritization (1) capability requirements review (1) capacity (1)
capacity building (2) capture the flag (1) case study (1)
CASoS (1) Catastrophe Loss Models (1) Caucasus (3)
cause-effect relation (1) CAX (9) CAX Management environment (1)
CBRN (1) CBRNE (1) CCIS (1)
CCNA Security curriculum (1) CDMA (1) cellular automata (1)
cellular automata model of conflict (1) cellular communications (1) Central Asia (5)
Central Europe (1) Central Ukrainian Uranium Province (1) centralisation (2)
centralised organisation (1) centralized management (1) Centre of Excellence (1)
centre of gravity. (1) CERT (3) certification (1)
certification authority (1) certification program (1) CFACC (1)
CFE (1) Chad (1) challenge-response (1)
challenges (2) change management (4) chaos (1)
Character Segmentation (1) characteristics (1) charge back (1)
Charter of the United Nations (1) Chechnya (1) checks and balances (1)
chemical elements migration (1) chemical weapons (1) Chief Information Officer (2)
child abuse material (1) China (8) China military leadership (1)
cholera (1) CIED (2) CIIP; security; cyber threats; conventional vs. IT-related security threats; infrastructure vulnerability; CIIP R&D; network society. (1)
CIMIC (1) CIO (2) CIO Responsibilities (1)
CIO Roles (1) CIP (3) CIRC (2)
Cisco Systems’ courses (1) citizen resilience (1) civ-mil coordination (3)
civil assistance (1) Civil Emergencies (1) Civil protection (7)
civil rights (1) Civil Security (3) civil society (4)
civil society organizations (1) civil society; policy (1) Civil to Military cooperation and integra­tion (1)
civil watchdogs (1) civil-military (1) Civil-Military Combination Strategies (1)
civil-military cooperation (4) Civil-military interaction (1) Civil-Military Interoperability (5)
Civil-military relations (5) civilian aspect of diplomacy (1) civilian control (3)
civilian oversight (1) CJTF (1) classification (3)
classroom (1) Clausewitz (1) client-server complexes (1)
client/server. (1) climate change (4) cloud (1)
Cloud computing (4) cloud environment (1) cloud technologies (1)
cloud testing (1) cluster (1) clustering (1)
Clustering algorithm (2) clustering method (1) clustering with outliers (1)
clusters (1) cluttered environment (1) CNO (1)
CNO; malicious computer-mediated activities; interdependencies created by network-based power; private sector - government cooperation; IT-related security regimes. (1) CNOs (1) co-creation (1)
co-reference resolution (1) coalition (2) coalition aerospace operations center (1)
coalition ATO (1) coalition command and control (1) coalition interoperability (1)
Coalition operations (2) coastal areas risks (1) coastal cellular coverage (1)
code of conduct (2) code of ethics (1) coding (1)
cognitive (2) Cognitive Approach (1) cognitive aspects (1)
Cognitive attack (1) cognitive bias (1) cognitive hacking (1)
Cognitive Modeling (1) cognitive visualization (1) coherence (1)
cohesion (1) cold boot (1) Cold War (1)
collaboration (3) collaboration-oriented architecture (1) collaborations (1)
collaborative decision-making (1) collaborative development (1) collaborative learning (1)
collaborative network organisation (2) Collaborative Network Organization (2) Collaborative Network Organizations (2)
collaborative networked organisation (1) Collaborative Networked Organisations (1) collaborative networks (1)
collaborative work (1) collective security (1) com-parative analysis (1)
Combat Potential (1) Combination rules (1) combined operation (1)
Combined Operations (1) ComBlackSeaNavMet (1) Command & Control (1)
command and control (12) Command and Control Information Systems (1) Command and control technologies (1)
Command Post Exercise (2) commissioned officer (1) common cause failures (2)
common challenges (1) common criteria. (1) Common Foreign and Security Policy (1)
common funding (2) Common Security and Defence Policy (2) common threat perception (1)
communication (3) communication technology (1) Communications (5)
Communications and Information Systems (1) community (1) company (1)
comparative analysis (1) comparative development (1) comparative legal analysis (1)
competence (1) competence development (1) competence framework (1)
competencies (2) competition (1) competition continuum (1)
complex adaptive systems (1) complex crisis situations (1) complex dynamic systems (1)
Complex man-machine systems (1) complex systems (1) Complex systems; object-modelling techniques; monitoring (1)
complexity (3) complexity studies (1) complexity theory (2)
compliance (2) compliant motion (1) composite cyber risk (1)
Comprehensive approach (14) Comprehensive Approach. (1) comprehensive ap­proach (1)
Comprehensive security (2) comprehen¬sive approach (1) Computation Node (1)
Computational Intelligence (1) computational propaganda (1) Computer Aided Dispatch (1)
computer aided exercises (CAX). (2) Computer Assisted eXercises (1) Computer Assisted Exercises (CAX) (2)
Computer generated forces (2) computer graphics (1) computer networks (2)
computer security (2) computer systems reliability (1) Computer Virology (1)
computer-assisted language learning (1) Computing Laboratory (1) concept (3)
Concept Development & Experimentation (1) Concept Development and Experimentation (1) conceptual (1)
Conceptual model (1) Conceptual Research Oriented Combat Agent Distillation Implemented in the Littoral Environment (1) Conference Key Distribution System (1)
confidence building (2) confidence- and security-building measures (1) confidence-building (1)
confidentiality (1) conflict (8) Conflict management (1)
conflict modeling (1) conflict modelling (1) conflict resilience (1)
conflict resolution (1) Conjunctive rule (1) CONOPS (1)
consolidation (1) Consortium. (1) conspiracy theories (1)
Constraint Satisfaction/Propagation (1) construction (2) constructive roles (1)
contact point (1) content analysis (1) content monitoring system (1)
context (2) context scenario (2) context scenarios (1)
context translation (1) contextual scenario (1) Continuous DSmT (1)
contract management (1) contribution (1) control (1)
control system (2) Convention on the Prevention of Terrorism (1) conventional conflict (1)
conventional forces (1) convergence (1) convex combination (1)
con¬trol (1) Cookies (1) cooperation (17)
Cooperative Defence Projects (1) Cooperative development team (1) cooperative procurement (2)
cooperative security (2) coordination (8) coping (1)
Copy attack (1) copyright (1) Copyright Protection Scheme (1)
corona virus (1) correlation infrastructure (1) corrupt government (1)
corruption (13) corruption effects (1) corruption factors (1)
corruption networks (1) cost effectiveness (1) Cost Module (1)
cost-effectiveness (1) costing (1) COTS (1)
COTS software (1) Council of Europe (1) counter-cyberterrorism (1)
counter-intelligence (1) Counter-terrorism (6) counterbalance (1)
countering hybrid threats (1) countering violent extremism (1) counterinsurgency (2)
counterintelligence (1) Counterterrorism (9) coupling factors (1)
coverage radius (1) Covid 19 (1) COVID-19 (28)
Covid-19 pandemic (2) COVID19 (1) creating profiles (1)
credit card. (1) Creeping Dissolution of the Monopoly of National Power (1) crew training (1)
crime (1) crime-terror nexus (1) Crimea (3)
criminal activity (1) criminal business (1) crises (2)
crisis (6) crisis generalized net (1) crisis management (22)
crisis management architecture (1) crisis management operations (1) crisis management strategy (1)
crisis management structures (1) crisis management. (1) crisis operations (1)
crisis plans (1) Crisis Response (1) crisis response operations (1)
criteria for non-flammability (1) critical energy infrastructure (1) critical energy infrastructure protection (2)
critical information infrastructure (2) Critical Information Infrastructure Protection (3) Critical Infrastructure (21)
Critical Infrastructure Protection (7) critical infrastructure; Critical Infrastructure Protection; comprehensive security; security policy; coordination; collaboration (1) Critical infrastructures (2)
critical infrastruc¬ture (1) critical junctures (1) Critical Success (1)
critique (1) CROCADILE (1) cross-border resiliency (1)
cross-cultural comparison (1) cross-domain coercion (2) cross-impact (1)
cross-sectoral approach (1) cryptanalysis (1) cryptocurrency (1)
cryptographic keys generation (1) cryptographic software (1) cryptography (12)
cryptography protocols (1) CSBMs (1) CSDM Views (15)
CSDP (3) CSOs (1) CSTO (1)
CTF (1) cultural environments (1) culture (6)
curriculum (3) Customer Relationship Management (1) cyber (4)
Cyber Aggregator (1) cyber arms race (1) cyber attack prevention (1)
cyber attacks (2) cyber confidence-building measures (1) cyber conflict (1)
Cyber defence (8) cyber defense (2) cyber digital skills (1)
cyber diversity (1) cyber domain (3) cyber education cybersecurity education cyber range serverless faas (1)
cyber hygiene (1) cyber maturity (1) cyber model (1)
cyber operations (8) cyber picture (1) cyber protection (1)
cyber range (6) cyber range platform (1) cyber research exercises (1)
cyber resilience (7) cyber risk (2) cyber risk assessment (1)
cyber risks (2) cyber security (20) Cyber security community (1)
cyber security culture (1) Cyber Situational Awareness (1) cyber skills (1)
cyber space (1) cyber systems (1) cyber technologies (1)
cyber threat (2) cyber threat information sharing (1) cyber threat intelligence (1)
cyber threats (12) cyber training (1) cyber war (3)
cyber warfare (3) cyber warfare; morphology; human mind as target; neocortical warfare; information attacks; international law. (1) cyber-energy nexus (1)
Cyber-physical system (1) cyber-physical systems (2) cyber-social vulnerabilities (1)
cyber-terrorism (1) CyberAggregator (1) cyberat-tack (1)
cyberattack (7) cyberattacks (2) cybercrime (12)
cybercrime roles (1) cyberpace (1) Cyberse-curity (1)
Cybersecurity (84) Cybersecurity Act (1) cybersecurity areas (1)
cybersecurity attitude (1) cybersecurity awareness (1) cybersecurity behaviour (1)
cybersecurity challenges (1) cybersecurity community (1) cybersecurity competence network (1)
cybersecurity controls (1) Cybersecurity culture (1) cybersecurity cyberattacks scenario space capability requirements (1)
cybersecurity ecosystems (1) cybersecurity ethics (1) cybersecurity governance (1)
Cybersecurity Innovation (1) cybersecurity knowledge (1) cybersecurity management practices (1)
cybersecurity maturity assessment (1) cybersecurity mesh (1) cybersecurity organisation (1)
cybersecurity platform (1) cybersecurity policy (1) cybersecurity policy private sector citizens’ contribution prevention (1)
cybersecurity program (1) cybersecurity questionnaire (1) cybersecurity resilience research management Bulgaria (1)
cybersecurity skills (1) cybersecurity standards (1) cybersecurity strategy (4)
cybersecurity system (1) cybersecurity taxonomy (1) cybersecurity threats (2)
cybersecurity training (1) cybersecurity training methodology (1) cybersecurity transcedents (1)
cyberspace (10) cyberterrorism (3) cyberwar (3)
Cyberwar; information society; risk perception; risk society; cyber risks: physical vs. virtual; US policy response; cyber attacks; critical information infrastructures; information warfare; public-private sector partnership. (1) cyberwarfare (1) Cynefin (1)
CyRADARS (1) Czech Republic (2) Czechoslovakia (2)