Search

Search Constraints

Begin New Search You searched for: Political Geography Global Focus Remove constraint Political Geography: Global Focus Content Type Journal Article Remove constraint Content Type: Journal Article Publishing Institution War Studies University Remove constraint Publishing Institution: War Studies University Publication Year within 10 Years Remove constraint Publication Year: within 10 Years Publication Year within 5 Years Remove constraint Publication Year: within 5 Years

Search Results

1. Managing the financial impact of cybersecurity incidents

2. Trojan spoofing: A threat to critical infrastructure

3. Leadership in police work applied to critical contexts: An integrative review and scientific mapping using VOSviewer and Google Trends tools

4. Logistics outsourcing for armed forces: The mobilisation of civilian transportation vehicles

5. Proposed method for building an anti-drone system for the protection of facilities important for state security

6. Intelligent terrorism as a security threat to critical infrastructure

7. Preparing critical infrastructure for the future: Lessons learnt from the Covid-19 pandemic

8. Abstraction-decomposition space for critical infrastructure systems: A framework for infrastructure planning and resilience policies

9. The role of citizens and geoinformation in providing alerts and crisis information to the public

10. High power wireless power transfer for the future of the battlefield challenges

11. Intrastate cultural and socio-political influences and the realisation of national security: A two-level correlational analysis

12. Modelling computer networks for further security research

13. Military-protester relations: Insights from nonviolence research

14. Disinformation as a threat to national security on the example of the COVID-19 pandemics

15. Effects of botnets – a human-organisational approach

16. High power microwave for knocking out programmable suicide drones

17. Possible applications of GIS tools in order to prepare for drinking water distribution network emergencies

18. Simulation framework for practical cybersecurity training in the public service sector

19. Thoughts on the evolution of national security in cyberspace

20. The New Institutionalism: A tool for analysing defence and security institutions

21. Assessment of the effectiveness of the security features of personal wireless networks

22. Fitness OSINT: Identifying and tracking military and security personnel with fitness applications for intelligence gathering purposes

23. Testing the efficiency of laser technology to destroy the rogue drones

24. Operational control over non-state proxies

25. Countering terrorism in the shadows: The role of private security and military companies

26. Towards a structural understanding of powerbrokers in weak states: From militias to alliances

27. Changing the character of proxy warfare and its consequences for geopolitical relationships

28. Compulsory military service as a social integrator

29. The roots of armed conflicts: Multilevel security perspective

30. Operations in subterranean systems: Terrain and weather variable

31. The future of energy security of states

32. Critical infrastructure in the shaping of national security

33. Components of defence strategies in society’s information environment: a case study based on the grounded theory

34. Near-Earth Objects (NEO) and other current space threats

35. The Influence of strategic culture on shaping security policy

36. Wars in the later 21st century: Forecast developments in the methods of warfare

37. The impact of crime on security in tourism

38. Modern aspects of the development of security in air transport under the conditions of air terrorism

39. Increasing the information superiority on the modern battlefield through the use of virtual reality systems

40. The basic health care system in a crisis situation after the use of weapons of mass destruction

41. Chemical weapons as potential tools in terrorist attacks – risks and preventive action

42. Combating destabilising forces in modern operations. Research report

43. Military higher education teaching and learning methodologies: An approach to the introduction of technologies in the classroom

44. Preparing for future security challenges with practitioner research

45. Vulnerability analysis in critical infrastructures: A methodology

46. Military capabilities and the strategic planning conundrum

47. Influence of global security environment on collective security and defence science

48. Coping with the “Nimby Syndrome”: Political issues related to the building of big infrastructures in liberal democracy countries

49. “Autonomisation” of security and defence systems