Search

Your search keyword '"*SECURITY classification (Government documents)"' showing total 151 results

Search Constraints

Start Over You searched for: Descriptor "*SECURITY classification (Government documents)" Remove constraint Descriptor: "*SECURITY classification (Government documents)" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
151 results on '"*SECURITY classification (Government documents)"'

Search Results

1. The Historical Presidency: Rethinking the origins of national security classification.

2. Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy.

3. Web-based diagnostic platform for microorganism-induced deterioration on paper-based cultural relics with iterative training from human feedback.

4. Comparison of Two Different Approaches to Measuring Economic Vulnerability to Food Insecurity: An Application to Mexico Using Official Data.

5. Food Insecurity Classification in Rural Areas of Mozambique: An Integrated Analysis of Survey-Based Indicators.

6. Covert Radio Agents, 1939–1945: Signal From Behind Enemy Lines—David Hebditch (Barnsley, U.K.: Pen and Sword Military, 2021, 311 pp.).

7. The United Fruit Lobby: Revisiting Truman's Guatemala Policy.

8. Presidential Cold War Doctrines: What Are They Good For?

9. The declassification engine: what history reveals about America's top secrets: Matthew Connelly, New York, Pantheon Books, 2023, xvii, 540 pp., US$32.50, C$42.50 (hardcover), ISBN: 9781101871577.

10. DroidChamber: Multilevel Security for Mobile Devices to Support Telemedicine on the Battlefield.

11. Dreams of Declassification: The Early Cold War Quest for Nuclear Knowledge in The Netherlands and Norway.

12. Framing populism in the pandemic: representations of Jair Bolsonaro in the journalistic coverage of Fantástico and Domingo Espetacular.

13. HATDO: hybrid Archimedes Tasmanian devil optimization CNN for classifying offensive comments and non-offensive comments.

14. TASARRUF MEVDUATI SİGORTA FONU MUHASEBE UYGULAMALARI VE BUNLARIN TÜRKİYE MUHASEBE/FİNANSAL RAPORLAMA STANDARTLARI AÇISINDAN DEĞERLENDİRİLMESİ.

15. УЛОГА ОРГАНА УПРАВЕ И НАРОДНЕ СКУПШТИНЕ У ЗАШТИТИ ТАЈНИХ ПОДАТАКА.

16. Drop Weight Testing of Samples Made of Different Building Materials Designed for the Protection of Classified Information.

17. Demonstration of object location, classification, and characterization by developed deep learning dust ablation trail analysis code package using plasma jets.

18. Arte e cultura, hegemonia e resistência: uma leitura comparada de diferentes territórios de Lisboa.

19. ASATM: Automated security assistant of threat models in intelligent transportation systems.

20. Food security in low developed countries - the case of the D.R. Congo.

21. A new hybrid deep learning-based phishing detection system using MCS-DNN classifier.

22. Prediction of lameness using automatically recorded activity, behavior and production data in post-parturient Irish dairy cows.

23. SEARCHING FOR OPPORTUNITIES FOR MORE ACTIVE CIVIL PARTICIPATION IN DECISION-MAKING PROCESSES.

24. Artificial Intelligence and Metaheuristic-Based Location-Based Advertising.

25. Strengthening parliamentary oversight of defence procurement: lessons from Belgium.

26. Susceptible data classification and security reassurance in cloud-IoT based computing environment.

27. Paterns and Interactions in Network Security.

28. A comprehensive study on security bug characteristics.

29. A survey and classification of the security anomaly detection mechanisms in software defined networks.

30. Total load energy supply capability and security level classification of integrated power and natural gas systems considering N‐1 contingency of power system.

31. Security and Privacy Implications on Database Systems in Big Data Era: A Survey.

32. Hollywood, American Politics, and Terrorism: When Art Turns into a Political Tool.

33. INFORMATION-SHARING CHALLENGES AND ISSUES IN MULTINATIONAL OPERATIONS, PART 2.

34. Research on information classification and storage in cloud computing data center based on group collaboration intelligent clustering.

35. Time integration and reject options for probabilistic output of pairwise LVQ.

36. Editor's Corner.

37. Security Assessment Methodology for Isolated Systems of a Certain Class.

38. ARTICLE III COURTS V. MILITARY COMMISSIONS: A COMPARISON OF PROTECTION OF CLASSIFIED INFORMATION AND ADMISSIBILITY OF EVIDENCE IN TERRORISM PROSECUTIONS.

39. Jointly Minimizing the Expected Costs of Review for Responsiveness and Privilege in E-Discovery.

40. PRACTICES FOR ENSURING RELIGIOUS SECURITY: PSYCHOLOGICAL AND LEGAL ASPECTS.

41. Using the household hunger scale to improve analysis and classification of severe food insecurity in famine-risk conditions: Evidence from three countries.

42. Lambertian-based adversarial attacks on deep-learning-based underwater side-scan sonar image classification.

43. Leveraging mayfly optimization with deep learning for secure remote sensing scene image classification.

44. Innovating in a secret world: the future of national security and global leadership: by Tina Srivastava, Lincoln, Potomac Books, 2019, 186 pp., $29.95 (hardback), ISBN: 978-1-64012-086-0.

45. PRACTICES FOR ENSURING RELIGIOUS SECURITY: PSYCHOLOGICAL AND LEGAL ASPECTS.

46. FIRST AMENDMENT — RIGHT OF ACCESS — D.C. CIRCUIT HOLDS PRESS CANNOT UNSEAL CLASSIFIED VIDEOS OF GUANTANAMO BAY DETAINEE.

47. The President's Daily Brief: Managing the Relationship between Intelligence and the Policymaker.

48. Security of classified information: one standard or many?

49. THE MOTIVATION OF BETRAYAL BY LEAKING OF CLASSIFIED INFORMATION.

50. Covert Communication: The Intelligibility and Credibility of Signaling in Secret.

Catalog

Books, media, physical & digital resources