|
I&C (1) | ICT (1) | ICT competences (1) |
ICT infrastructure (1) | ICT Personnel development (1) | ICT security (1) |
ICT taxonomies (1) | ICT technologies (1) | Identification (1) |
identification/assessment techniques (1) | identity politics (1) | ideologeme (1) |
ideology (2) | IDS dataset (1) | IED (1) |
Illegal Behavior (1) | illegal economy (1) | illegal formations (1) |
illegal migration (2) | illegal trafficking (1) | image classification (1) |
image formation (1) | image reparation (1) | Image statistical analysis (1) |
IMECA (1) | IMM estimator (1) | IMM tracking filter design (1) |
immediate action (1) | impact (3) | impact assessment (1) |
imperfect information (1) | imperial role (1) | Implementations (1) |
importance (1) | Improvised Explosive Devices (1) | in-depth protection (1) |
incident (1) | incident command post (1) | incident commander (1) |
Incident Management (1) | incident response (2) | India (2) |
indicator (1) | indicators (1) | Indo-Pacific (4) |
Indonesia (1) | inductive approach (1) | industrial capacity (1) |
industrial catastrophes (1) | industrial control system (1) | industrial control systems (1) |
Industrial Internet (1) | Industrial IoT (1) | industrial pollutants (1) |
industrial relations (1) | industry (2) | industry 4.0 (3) |
inequalities (1) | inertial navigation sensor (1) | infantry (1) |
influence (2) | Infogate (1) | Informal knowledge integration (1) |
Information (4) | information and communication technologies (1) | information and communications technologies (1) |
information assurance (5) | information campaign (1) | information environment (1) |
information exchange gateways (1) | information flow (1) | Information Fusion (3) |
information goods (1) | information infrastructure vulnerability (1) | Information interoperability (1) |
information load (1) | Information Management (1) | information operation recognition (1) |
information operations (6) | information quality (1) | Information Security (21) |
information security management (2) | information security of the state (1) | information security policy (1) |
information security programme (1) | information security standards (1) | information services (1) |
information sharing (10) | information sharing models (1) | Information society (2) |
information summarization (1) | information support (1) | Information System (3) |
information system security (1) | information systems (1) | Information Systems Support (1) |
Information systems vulnerability; hacking; hackers; IT-security; critical societal infrastructure. (1) | information technologies (1) | information technology (2) |
information technology impact (1) | information threats (1) | information trauma (1) |
information visualization (1) | Information warfare (6) | information warfare. (1) |
information-psychological operations (1) | informational warfare (1) | informers (1) |
infrastructure (1) | infrastructure with significant reach (1) | inherent structural threats (1) |
INMARSAT-C (1) | innovation (7) | innovation management (2) |
innovative warfare (1) | input estimation (1) | Instant messaging malware attack (1) |
institution building (1) | institutional (top-down) and bottom-up (individual) recruitment/mobilization (1) | institutional capabilities (1) |
institutional capacity building (2) | institutional Europe (1) | institutional perspective (1) |
institutional resilience (1) | institutionalization (1) | institutions (4) |
insurgency (2) | insurgent networks (1) | Integrated capability framework (1) |
Integrated planning system (1) | integrated security management system (1) | Integrated Security Sector (2) |
integrated security sector; project management (1) | integrated security system (1) | integrated system (1) |
Integration of the European States (1) | integration. (1) | integrity (14) |
integrity policy (1) | intellectual interoperability (2) | Intellectual Property Right (1) |
intelligence (13) | intelligence agencies (1) | Intelligence assessment (1) |
intelligence cooperation (1) | Intelligence governance (2) | intelligence operations (1) |
intelligence oversight (2) | intelligence oversight. (1) | intelligence reform (2) |
intelligence reforms (1) | intelligence sector reforms (1) | intelligence studies (2) |
intelligent agent simulation model (1) | Intelligent Agents (2) | intelligent complex adaptive system (1) |
Intelligent Procurement. (1) | intelligent software agent (1) | inter-national cooperation (1) |
inter-organisational cooperation (1) | Inter-organizational (1) | Interactive Electronic Technical Manuals (IETMs) (1) |
interactive simulation models (1) | interactive verification (1) | Interagency (2) |
interagency cooperation (6) | interdependence (1) | interdependencies (1) |
interdependency (1) | interdisciplinary research (1) | interests (1) |
interface solutions (1) | intermediate force capabilities (6) | Intermestic Domain (1) |
internal and external stakeholders (1) | internal intelligence or counterintelligence (1) | international aid (1) |
international competition (1) | international conflict (1) | international conventions (1) |
international cooperation (2) | international crimes (1) | international experience (1) |
international intervention (1) | international law (2) | international military cooperation (1) |
international organisations (1) | international relations (1) | international security (3) |
international system (1) | International Terrorism (2) | international trade (1) |
international law (1) | Internet (4) | Internet and governance (1) |
Internet and state sovereignty/authority (1) | Internet exchanges (1) | Internet in China; growth in Internet use by civilians; integration of the Internet into military operations (1) |
Internet in conflict situations; new conflict environment; proliferation of voices; information operations; information warfare; cyberspace (1) | Internet of Things (5) | Internet online application (1) |
internet service (1) | Internet skirmishes. (1) | Interoperability (12) |
Interoperability. (1) | interoperable simulation (1) | interorganizational cooperation (2) |
intervention (2) | interaction. (1) | Introduction (2) |
intrusion (1) | intrusion avoidance. (1) | intrusion detection (5) |
Intuition-based Decision-making (1) | intuitionist fuzzy logic (1) | Intuitionistic fuzzy estimation (1) |
intuitionistic fuzzy logic (1) | investigation (1) | investment (1) |
investment management (1) | IoT (3) | IPTV (1) |
Iran (2) | Iraq (5) | Iris Authentication (1) |
Iris Recognition (1) | irregular warfare (3) | ISAF (2) |
ISAR Images (1) | ISDN (1) | ISIL (1) |
ISIS (2) | Islam (1) | Islamic Movement of Uzbekistan (1) |
Islamic State (8) | Islamic State Khorasan (1) | Islamism (1) |
Islamist (1) | ISR (1) | Israel (1) |
IT capabilities (2) | IT education (3) | IT governance (1) |
IT management (1) | IT management. (1) | IT organisations (1) |
IT personnel (1) | IT security (5) | IT services (2) |
IT specialist (1) | IT taxonomy (1) | IT-infrastructures (1) |
IT4Sec reports (106) | Italian Mafia (1) | |