X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Government Document (11) 11
Journal Article (11) 11
Conference Proceeding (5) 5
Book / eBook (4) 4
Book Chapter (3) 3
Newspaper Article (1) 1
Paper (1) 1
Report (1) 1
Web Resource (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
national security (9) 9
united states (6) 6
automation (4) 4
information warfare (4) 4
infrastructure (4) 4
command and control systems (3) 3
computer networks (3) 3
decision making (3) 3
military art and science (3) 3
military planning (3) 3
operational art (3) 3
armed forces (2) 2
art des opérations (2) 2
art et science militaires (2) 2
automatisation (2) 2
biological & chemical warfare (2) 2
commandement militaire (2) 2
computer viruses (2) 2
costs (2) 2
cybersecurity (2) 2
cyberspace (2) 2
decision support systems (2) 2
department of defense (2) 2
global positioning systems (2) 2
group decision making (2) 2
guerre de l'information (2) 2
history (2) 2
information systems (2) 2
international relations (2) 2
international security (2) 2
internet (2) 2
military (2) 2
military art and science automation (2) 2
networks (2) 2
pentagon (2) 2
réseaux d'ordinateurs (2) 2
security measures (2) 2
strategic planning (2) 2
terrorism (2) 2
threats (2) 2
accumulators (1) 1
adaptation (1) 1
armed forcesautomation (1) 1
armies (1) 1
art et science militaires automatisation (1) 1
artificial satellites (1) 1
artificial satellites in navigation (1) 1
aviation (1) 1
battle management (1) 1
botnets (1) 1
business enterprises (1) 1
capabilities-based planning (1) 1
capital, social (1) 1
centrifugation (1) 1
collaborative techniques (1) 1
collective decision making (1) 1
command and control systems -- united states (1) 1
command and control systems united states (1) 1
commandement et conduite des opérations, systèmes de (1) 1
communication systems, computer (1) 1
companies (1) 1
computer communication systems (1) 1
computer crimes (1) 1
computer networks -- united states (1) 1
computer networks united states (1) 1
computer security (1) 1
computer software (1) 1
computer systems (1) 1
computers (1) 1
containerized shipping (1) 1
control (1) 1
control and command systems (1) 1
corporations (1) 1
countries (1) 1
crime prevention (1) 1
critical infrastructures (1) 1
cruise missiles (1) 1
data networks, computer (1) 1
decision making reform (1) 1
decision support cells (1) 1
decision-making, group (1) 1
defense contracts (1) 1
defense systems (1) 1
design and construction (1) 1
detectors (1) 1
deterrence (1) 1
distributed collaborative systems (1) 1
domestic issues (1) 1
drones (1) 1
ecns (1) 1
economic aspects (1) 1
economic infrastructure (1) 1
economic issues (1) 1
effectiveness (1) 1
electronic books (1) 1
electronic communication networks (1) 1
electronic government publication (1) 1
espionage (1) 1
extremists (1) 1
failure (1) 1
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Bulletin of the Atomic Scientists, ISSN 0096-3402, 03/2017, Volume 73, Issue 2, pp. 96 - 101
The US and Chinese militaries are starting to test swarming drones - distributed collaborative systems made up of many small, cheap, unmanned aircraft. This... 
swarming drones | unmanned aircraft systems | LAWS | Distributed collaborative systems | drones | UAS | lethal autonomous weapon systems | Swarming drones | Lethal autonomous weapon systems | Unmanned aircraft systems | Drones | INTERNATIONAL RELATIONS | SOCIAL ISSUES
Journal Article
Georgetown Journal of International Affairs, ISSN 1526-0054, 10/2011, p. 118
  In Jul 2010 an incapacitating computer virus wiped out 60 percent of Iran's computer network, effectively crippling the country's uranium enrichment... 
Crime prevention | Computer viruses | Network security | Islamic countries | Internet crime
Journal Article
Georgetown Journal of International Affairs, ISSN 1526-0054, 1/2011, pp. 118 - 126
Journal Article
Georgetown Journal of International Affairs, ISSN 1526-0054, 1/2012, pp. 5 - 14
Effective cyber security requires that national governments, private companies, and non-governmental organizations work together to understand threats in... 
Countries | Cyberspace | Botnets | Military alliances | Cybersecurity | Internet service providers | Internet | Multilateralism | Private sector | International security | Threats | Effectiveness | Private companies | Globalization | Companies | Nongovernmental organizations | Computer security | National security
Journal Article
2005, AD-a430 102.
From fighting terrorists to stabilizing a war-torn country to waging all-out combat, military campaigns are increasingly shaped by networks that enable... 
military operations | precision | terrorists | united states | resources | battle management | detectors | networks | accumulators | military doctrine | warfare | information systems | power | mechanization | weapons | defense systems
Government Document
2006, AD-a455 054.
The capacity and means by which the American Armed Forces defend their nation are entering a paradigm-breaking transition period. Previous transitions have... 
military critical technology | information processing | military psychology | military training | military modernization | military tactics | time critical information | decision support systems | networked warfare
Government Document
International Security, ISSN 0162-2889, 07/1995, Volume 20, Issue 1, pp. 126 - 126
Journal Article
International Security, ISSN 0162-2889, 07/1995, Volume 20, Issue 1, p. 126
  Lachow examines the potential benefits and risks associated with the growing use of global positioning systems (GPS) through the world. Lachow recommends as... 
Global positioning systems | GPS | National security
Journal Article
International Security, ISSN 0162-2889, 07/1995, Volume 20, Issue 1, p. 126
Journal Article
International Security, ISSN 0162-2889, 07/1995, Volume 20, pp. 126 - 148
Development of the US global positioning system (GPS) satellite system, benefits of civilian use, risks of hostile military use, and policy options. Focus on... 
Journal Article
International security, ISSN 0162-2889, 07/1995, Volume 20, Issue 1, pp. 126 - 148
Journal Article
01/2011, ISBN 1597979333
Book Chapter
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.