|
A review of strategies to monitor water and sediment quality for a sustainability assessment of marine environment |
Technical Solutions |
Water |
2013 |
|
Making change last: applying the NHS institute for innovation and improvement sustainability model to healthcare improvement |
Technical Solutions |
Population |
2013 |
|
Localization of health systems in low- and middle-income countries in response to long-term increases in energy prices |
Problems, Technical Solutions |
Consumption, Urbanization |
2013 |
|
Integration of utilities infrastructures in a future internet enabled smart city framework. |
Technical Solutions |
Governance, Urbanization |
2013 |
|
A New, Energy-Efficient Chemical Pathway for Extracting Ti Metal from Ti Minerals |
Technical Solutions |
Energy |
2013 |
|
A simulation model to explore the relative value of stock enhancement versus harvest regulations for fishery sustainability |
Technical Solutions |
Agriculture, Population |
2013 |
|
Effects of damming on population sustainability of Chinese sturgeon, Acipenser sinensis: evaluation of optimal conservation measures |
Technical Solutions |
Energy, Population, Water |
2009 |
|
EEAS (European External Action Service) |
Technical Solutions, Social Solutions, International Responses |
Governance |
2013 |
|
INTERPOL Cybercrime |
Technical Solutions, Social Solutions, International Responses |
Governance |
2013 |
|
EUROPOL Threat Assessment (Abridged) Internet Facilitated Organised Crime (iOCTA) |
Technical Solutions, Social Solutions, International Responses |
Governance |
2011 |
|
National Strategy to Secure Cyberspace |
Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
|
National Military Strategy for Cyberspace Operations |
Technical Solutions |
Conflicts, Governance, Industry |
2006 |
|
Information Operations |
Technical Solutions |
Governance |
2012 |
|
National Security Strategy |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
Cyber Operations: Air Force Doctrine Document 3-12 |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
|
Dominant Factors in National Information Security Policies |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
|
Informational trends for organizations in information society |
Activities, Technical Solutions |
Governance, Industry |
2007 |
|
Secure web application development and global regulation |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2007 |
|
Privacy and Data Protection in Cyberspace in Indian Environment |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
|
A Generic Framework for Network Forensics |
Technical Solutions, Social Solutions |
Governance, Industry |
2010 |
|
Tracing the Origins of Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
New Strategy for Detecting Intrusion by Using c4.5 Algorithm |
Technical Solutions |
Governance, Industry |
2012 |
|
Comprehensive Security Framework for Global Threats Analysis |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2009 |
|
Security in Cyberspace: Combatting Distributed Denial of Service Attacks |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2003 |
|
A functional Method for Assessing Protocol Implementation Security |
Technical Solutions |
Industry |
2001 |
|
Systematic Digital Forensic Investigation Model |
Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
A Wide Scale Survey on Botnet |
Activities, Technical Solutions |
Conflicts, Governance, Industry |
2011 |
|
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
|
Data Security: An Analysis |
Activities, Technical Solutions |
Industry |
2010 |
|
Modeling Human Behavior to Anticipate Insider Attacks |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
An investigation into Chinese cybercrime and the underground economy in comparison with the West |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2010 |
|
Non-Security – Premise of Cybercrime |
Activities, Technical Solutions |
Industry |
2012 |
|
Global tendencies and local implications: cyber exclusion of and within Western Balkan countries |
Activities, Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2006 |
|
Data Access in a Cyber World: Making Use of Cyberinfrastructure |
Technical Solutions, Social Solutions |
Industry |
2008 |
|
Improved Support Vector Machine for Cyber Attack Detection |
Technical Solutions |
Industry |
2011 |
|
Specification, Analyzing Challenges and Approaches for Cyber-Physical Systems (CPS) |
Technical Solutions |
Governance, Industry |
2010 |
|
Cyber trust and crime prevention: a synthesis of the state-of-the-art science reviews |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
|
XXI An Odyssey in Cyberspace: A Preliminary Look at Cyber-Feminism |
Activities, Technical Solutions, Social Solutions |
Industry |
2008 |
|
Cyber Security in Internet-Based Multiplayer Gaming |
Activities, Technical Solutions |
Industry |
2010 |
|
Cyber-Physical-Social Based Security Architecture for Future Internet of Things |
Technical Solutions, Social Solutions |
Industry |
2012 |
|
Cyber Cheating in an Information Technology Age |
Activities, Technical Solutions |
Industry |
2008 |
|
Towards Co-Engineering Communicating Autonomous Cyber-physical Systems |
Technical Solutions |
Industry |
2009 |
|
e-Government Ethics: a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics |
Activities, Problems, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2011 |
|
Hacktivism: A Theoretical and Empirical Exploration of China’s Cyber Warriors |
Activities, Technical Solutions, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
|
Study of Indian Banks Websites for Cyber Crime Safety Mechanism |
Activities, Technical Solutions |
Governance, Industry |
2011 |
|
Cyber socializing and victimization of women |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2009 |
|
Evaluation of Vulnerability Assessment in System From Hackers in Cyber Security |
Activities, Technical Solutions |
Governance, Industry |
2010 |
|
China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence |
Activities, Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2011 |
|
Cyber Security Within The Globalization Process |
Activities, Technical Solutions, International Responses |
Conflicts, Industry |
2012 |