Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
Hawkeye covert surveillance system (Noble Security Systems)
PDF
Background investigators questions for interviews, 1991-06-06
PDF
In-car camera recording system specifications (Noble Security Systems)
PDF
Memorable, secure, and usable authentication secrets
PDF
General questions covering other areas of the Commissions investigation, [1991]
Ray, memo, 1991-06-03, re Security
PDF
The effects of required security on software development effort
PDF
Modeling the relative strength of security protocols
PDF
Water security, national security and MCIWest: a grounded theory for operationalizing risk management
PDF
Modeling human bounded rationality in opportunistic security games
PDF
Cryptographic currency and economic security: threats, opportunities, and regulatory challenges
PDF
Ray, fax, 1991-06-03, re Security procedures
PDF
Getting a new blanket: China’s conceptualization of “security” in the post-Deng Xiaoping era
PDF
Organizational structuring for homeland security: a U.S. state-by-state comparative analysis
PDF
Ray, memo, 1991-06-03, re Security procedures
Public diplomacy and the American fortress embassy: balancing mission and security, 2018
PDF
Not a Lone Ranger: unleashing defender teamwork in security games
PDF
Pdf
Computational model of human behavior in security games with varying number of targets
Pdf
Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach
Power, profits, and politics: energy security and cooperation in Eurasia
PDF
Combating adversaries under uncertainties in real-world security problems: advanced game-theoretic behavioral models and robust algorithms
PDF
Status, security, and socialization: explaining change in China's compliance in international institutions
PDF
Discounted robust stochastic games with applications to homeland security and flow control
PDF
Leveraging programmability and machine learning for distributed network management to improve security and performance
PDF
Dillen, memo, 1990-06-05, to Building managers & security directors
of 231