Abstract is missing.
- Arguing About Uncertain Heterogeneous Information for Threat AssessmentGalina Rogova, James Llinas. 3-17 [doi]
- Intelligence Analysis: Needs and SolutionsElisa Shahbazian. 18-31 [doi]
- Building Agile Human/Machine Teams with Controlled Natural LanguageDave Braines. 32-43 [doi]
- Military Usages of Speech and Language Technologies: A ReviewDavid Griol, Jesús García Herrero, José Manuel Molina. 44-68 [doi]
- Comparative Studies on Using Semantic Filtering for Open Relation IdentificationValentina Dragos. 69-77 [doi]
- Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex SystemsÉloi Bossé, Basel Solaiman. 78-85 [doi]
- Data Fusion and Response ManagementAlan N. Steinberg. 86-98 [doi]
- Selective Sensitivity Sensor for Explosive Detection and IdentificationSurik Khudaverdyan, Stepan Tsaturyan, Ashok Vaseashta. 99-107 [doi]
- Protection and Recovery of Tampered Images Using Self-Embedding ProceduresDavid Asatryan, Naira Asatryan. 108-113 [doi]
- Terrorism as a Threat to TourismJolanta Rodzos. 114-122 [doi]
- Sustainable Development as a Tool Against Environmental VulnerabilityLiviu-Daniel Galatchi. 123-129 [doi]
- Toward a Better Future Through Maritime SecurityAndrea Mucedola. 133-142 [doi]
- What Matters Most Is Not the Size of the "Storm" but the Scale of the ImpactDominique Cant. 143-146 [doi]
- Reasoning with Relational Models for Maritime Domain SecurityLauro Snidaro, Ingrid Visentini. 147-155 [doi]
- PASSAGES - A System for Improved Safety and Security of Maritime Operations in Arctic AreasJoachim Biermann. 156-167 [doi]
- Modeling Maritime Contraband Trafficking Activities with the Agent-Based ApproachOndrej Vanek, Stepán Kopriva, Jakub Ondrácek, Ondrej Hrstka, Michal Pechoucek. 168-183 [doi]
- ARETHUS - A Decision Support Platform for Reasoning About SecurityOndrej Vanek, Stepán Kopriva, Ondrej Hrstka, Michal Pechoucek. 184-202 [doi]
- Main Aspects of Border Crossing Control Security ProvisionSamvel Muradyan, Robert Hakobyan, Artashes Hakobyan, Vahan Tovmasyan, Artashes Tovmasyan. 203-206 [doi]
- Comparing Information Structures Used in the Maritime Defence and Security DomainAnthony W. Isenor, Yannick Allard, Michel Mayrand. 207-218 [doi]
- Border Surveillance Using UAVs with Thermal CameraNarek Hayrapetyan, Robert Hakobyan, Aghasy Poghosyan, Vazgen Gabrielyan. 219-225 [doi]
- Human Identification Using Virtual 3D Imaging to Control Border CrossingHayk Hakobyan, Robert Hakobyan, Koryun Aslanyan. 226-230 [doi]
- Naval Ship Classification with Generalized Belief Functions Using a New Approximation AlgorithmPascal Djiknavorian, Dominic Grenier. 231-239 [doi]
- Hide and Seek in the Information AgeGayane Markarova. 243-247 [doi]
- Real Time Streaming AlgorithmGevorg Margarov, Mher Markosyan, Yeghisabet Alaverdyan. 248-255 [doi]
- Efficiency of Generating Highly Nonlinear Boolean Functions over QuasigroupsYeghisabet Alaverdyan. 256-263 [doi]
- Secure Data Hiding in PDF Files Using an Encrypted Secret MessageAnahit Arshakyan. 264-270 [doi]
- Secure Real-Time Data Transfer in the CloudVladimir Hovsepyan. 271-275 [doi]
- Two-Party Oblivious DFA Evaluation ProtocolGurgen Khachatryan, Mihran Hovsepyan, Aram Jivanyan. 276-286 [doi]
- Distributed Data Storage in Cloud Systems Based on Error Correcting CodesArtak Khemchyan. 287-292 [doi]
- A Security Assessment Framework for e-Health: A Croatian PerspectiveHrvoje Belani, Igor Ljubi, Bruno Blaskovic. 293-300 [doi]
- Security Issues of the e-Infrastructure for Environmental ResearchHrachya Astsatryan. 301-307 [doi]
- Critical Aviation Information Systems CybersecuritySergiy Gnatyuk. 308-316 [doi]
- Information Security - Basis of the Education System for Digital Generation ZGevorg Margarov. 317-325 [doi]
- Are We Ready to Educate Security Professionals?Ján Genci. 326-330 [doi]
- A Study of Security Threats in the Private CloudYelena Satimowa, Assel Bytleuowa. 331-335 [doi]