|
I&C (1) | ICT (1) | ICT competences (1) |
ICT infrastructure (1) | ICT Personnel development (1) | ICT security (1) |
ICT taxonomies (1) | ICT technologies (1) | Identification (1) |
identification/assessment techniques (1) | identity politics (1) | ideologeme (1) |
ideology (2) | IDS dataset (1) | IED (1) |
Illegal Behavior (1) | illegal economy (1) | illegal formations (1) |
illegal migration (2) | illegal trafficking (1) | image classification (1) |
image formation (1) | image reparation (1) | Image statistical analysis (1) |
IMECA (1) | IMM estimator (1) | IMM tracking filter design (1) |
immediate action (1) | impact (3) | impact assessment (1) |
imperfect information (1) | imperial role (1) | Implementations (1) |
importance (1) | Improvised Explosive Devices (1) | in-depth protection (1) |
incident (1) | incident command post (1) | incident commander (1) |
Incident Management (1) | incident response (2) | India (2) |
indicator (1) | indicators (1) | Indo-Pacific (4) |
Indonesia (1) | inductive approach (1) | industrial capacity (1) |
industrial catastrophes (1) | industrial control system (1) | industrial control systems (1) |
Industrial Internet (1) | Industrial IoT (1) | industrial pollutants (1) |
industrial relations (1) | industry (2) | industry 4.0 (3) |
inequalities (1) | inertial navigation sensor (1) | infantry (1) |
influence (2) | Infogate (1) | Informal knowledge integration (1) |
Information (4) | information and communication technologies (1) | information and communications technologies (1) |
information assurance (5) | information campaign (1) | information environment (1) |
information exchange gateways (1) | information flow (1) | Information Fusion (3) |
information goods (1) | information infrastructure vulnerability (1) | Information interoperability (1) |
information load (1) | Information Management (1) | information operation recognition (1) |
information operations (6) | information quality (1) | Information Security (21) |
information security management (2) | information security of the state (1) | information security policy (1) |
information security programme (1) | information security standards (1) | information services (1) |
information sharing (10) | information sharing models (1) | Information society (2) |
information summarization (1) | information support (1) | Information System (3) |
information system security (1) | information systems (1) | Information Systems Support (1) |
Information systems vulnerability; hacking; hackers; IT-security; critical societal infrastructure. (1) | information technologies (1) | information technology (2) |
information technology impact (1) | information threats (1) | information trauma (1) |
information visualization (1) | Information warfare (6) | information warfare. (1) |
informational warfare (1) | informers (1) | infrastructure (1) |
infrastructure with significant reach (1) | inherent structural threats (1) | INMARSAT-C (1) |
innovation (7) | innovation management (2) | innovative warfare (1) |
input estimation (1) | Instant messaging malware attack (1) | institution building (1) |
institutional (top-down) and bottom-up (individual) recruitment/mobilization (1) | institutional capabilities (1) | institutional capacity building (2) |
institutional Europe (1) | institutional perspective (1) | institutional resilience (1) |
institutionalization (1) | institutions (4) | insurgency (2) |
insurgent networks (1) | Integrated capability framework (1) | Integrated planning system (1) |
integrated security management system (1) | Integrated Security Sector (2) | integrated security sector; project management (1) |
integrated security system (1) | integrated system (1) | Integration of the European States (1) |
integration. (1) | integrity (14) | integrity policy (1) |
intellectual interoperability (2) | Intellectual Property Right (1) | intelligence (13) |
intelligence agencies (1) | Intelligence assessment (1) | intelligence cooperation (1) |
Intelligence governance (2) | intelligence operations (1) | intelligence oversight (2) |
intelligence oversight. (1) | intelligence reform (2) | intelligence reforms (1) |
intelligence sector reforms (1) | intelligence studies (2) | intelligent agent simulation model (1) |
Intelligent Agents (2) | intelligent complex adaptive system (1) | Intelligent Procurement. (1) |
intelligent software agent (1) | inter-national cooperation (1) | inter-organisational cooperation (1) |
Inter-organizational (1) | Interactive Electronic Technical Manuals (IETMs) (1) | interactive simulation models (1) |
interactive verification (1) | Interagency (2) | interagency cooperation (6) |
interdependence (1) | interdependencies (1) | interdependency (1) |
interdisciplinary research (1) | interests (1) | interface solutions (1) |
intermediate force capabilities (6) | Intermestic Domain (1) | internal and external stakeholders (1) |
internal intelligence or counterintelligence (1) | international aid (1) | international competition (1) |
international conflict (1) | international conventions (1) | international cooperation (2) |
international crimes (1) | international experience (1) | international intervention (1) |
international law (2) | international military cooperation (1) | international organisations (1) |
international relations (1) | international security (3) | international system (1) |
International Terrorism (2) | international trade (1) | international law (1) |
Internet (4) | Internet and governance (1) | Internet and state sovereignty/authority (1) |
Internet exchanges (1) | Internet in China; growth in Internet use by civilians; integration of the Internet into military operations (1) | Internet in conflict situations; new conflict environment; proliferation of voices; information operations; information warfare; cyberspace (1) |
Internet of Things (5) | Internet online application (1) | internet service (1) |
Internet skirmishes. (1) | Interoperability (12) | Interoperability. (1) |
interoperable simulation (1) | interorganizational cooperation (2) | intervention (2) |
interaction. (1) | Introduction (2) | intrusion (1) |
intrusion avoidance. (1) | intrusion detection (5) | Intuition-based Decision-making (1) |
intuitionist fuzzy logic (1) | Intuitionistic fuzzy estimation (1) | intuitionistic fuzzy logic (1) |
investigation (1) | investment (1) | investment management (1) |
IoT (3) | IPTV (1) | Iran (2) |
Iraq (5) | Iris Authentication (1) | Iris Recognition (1) |
irregular warfare (3) | ISAF (2) | ISAR Images (1) |
ISDN (1) | ISIL (1) | ISIS (2) |
Islam (1) | Islamic Movement of Uzbekistan (1) | Islamic State (8) |
Islamic State Khorasan (1) | Islamism (1) | Islamist (1) |
ISR (1) | Israel (1) | IT capabilities (2) |
IT education (3) | IT governance (1) | IT management (1) |
IT management. (1) | IT organisations (1) | IT personnel (1) |
IT security (5) | IT services (2) | IT specialist (1) |
IT taxonomy (1) | IT-infrastructures (1) | IT4Sec reports (106) |
Italian Mafia (1) | | |