Secure Tactical Communications for Inter-Organizational Collaboration: The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield
暂无分享,去创建一个
[1] Victor Pomponiu,et al. Securing Wireless Ad Hoc Networks: State of the Art and Challenges , 2014 .
[2] A. Onwuegbuzie. Introduction: Putting the MIXED back into quantitative and qualitative research in educational research and beyond: Moving toward the radical middle , 2012 .
[3] Gert Roelofsen. TETRA Security , 2000, Inf. Secur. Tech. Rep..
[4] Helen Nissenbaum,et al. Where Computer Security Meets National Security1 , 2005, Ethics and Information Technology.
[5] Jan A.G.M. van Dijk,et al. The network society , 1997 .
[6] O. E. Dial,et al. The social impact of computers , 1970, AFIPS '70 (Spring).
[7] Johannes A.G.M.. The network society - second edition , 2006 .
[8] Jeannie A. Stamberger,et al. The Evolution of Hastily Formed Networks for Disaster Response: Technologies, Case Studies, and Future Trends , 2011, 2011 IEEE Global Humanitarian Technology Conference.
[9] P. W. Singer,et al. Wired for War: The Robotics Revolution and Conflict in the 21st Century , 2009 .
[10] A. Bryman,et al. The SAGE handbook of organizational research methods , 2009 .
[11] Don Smith. Life's certainties: death, taxes and APTs , 2013, Netw. Secur..
[12] Gurpreet Dhillon,et al. Principles of information systems security - text and cases , 2006 .
[13] Carrick T. Longley. Field Information Support Tool , 2010 .
[14] John H. Hitchcock,et al. An Inclusive Framework for Conceptualizing Mixed Methods Design Typologies: Moving Toward Fully Integrated Synergistic Research Models , 2010 .
[15] Elizabeth D. Mynatt,et al. Supporting communication and collaboration practices in safety-critical situations , 2000, CHI Extended Abstracts.
[16] T. J. Grant,et al. Vulnerability of C2 Networks to Attack: Measuring the Topology of Eleven Dutch Army C2 Systems , 2011 .
[17] Gautam Mukunda,et al. Caught in the Net: Lessons from the Financial Crisis for a Networked Future , 2009, The US Army War College Quarterly: Parameters.
[18] Keith L. Shimko. The Iraq Wars and America's Military Revolution: The Third Iraq War, 2003–? – A Revolution Denied? , 2010 .
[19] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[20] Tom DeMarco,et al. The Deadline: A Novel About Project Management , 1997 .
[21] Maria Stella Iacobucci,et al. Reconfigurable Radio Systems: Network Architectures and Standards , 2013 .
[22] Björn Persson,et al. Military utility : A proposed concept to support decision-making , 2015 .
[23] J M Morse,et al. Approaches to qualitative-quantitative methodological triangulation. , 1991, Nursing research.
[24] Richard J. Enbody,et al. Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.
[25] Ralph Morelli,et al. POSIT: Portable Search and Identification Tool Using the Google Phone for Disaster Management , 2009 .
[26] Christian Wenz,et al. DRM Under Attack: Weaknesses in Existing Systems , 2003, Digital Rights Management.
[27] Miguel P Caldas,et al. Research design: qualitative, quantitative, and mixed methods approaches , 2003 .
[28] Gurpreet Dhillon,et al. Interpreting Deep Structures of Information Systems Security , 2012, Comput. J..
[29] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[30] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[31] J. Palutikof,et al. Climate change 2007 : impacts, adaptation and vulnerability , 2001 .
[32] Mohammad Reza Meybodi,et al. Technological Advancements and Applications in Mobile Ad-Hoc Networks : Research Trends , 2012 .
[33] J. Alexander,et al. Images of Organization , 1988 .
[34] Colin Potts,et al. Design of Everyday Things , 1988 .
[35] Thomas G. Holzman. Computer-human interface solutions for emergency medical care , 1999, INTR.
[36] Marko Jahnke,et al. MITE – MANET Intrusion Detection for Tactical Environments , 2008 .
[37] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[38] Eugene Grayver. Implementing Software Defined Radio , 2013 .
[39] Christopher J. Novak,et al. 2009 Data Breach Investigations Report , 2009 .
[40] M. Denscombe. The Good Research Guide: for small-scale social research projects , 1998 .
[41] Peter J. Denning. Hastily formed networks , 2006, CACM.
[42] J. Shaoul. Human Error , 1973, Nature.
[43] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[44] M. Castells. The rise of the network society , 1996 .
[45] D. Jorgensen. Participant Observation: A Methodology for Human Studies , 1989 .
[46] Etienne Wenger,et al. Communities of Practice: Learning, Meaning, and Identity , 1998 .
[47] Simin Nadjm-Tehrani,et al. Wireless ad hoc dissemination for search and rescue , 2010, ISCRAM.
[48] Christos Xenakis,et al. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..
[49] Simon French,et al. Believe in the Model: Mishandle the Emergency , 2005 .
[50] Azriel Lorber. Misguided Weapons: Technological Failure and Surprise on the Battlefield , 2002 .
[51] Peter G. W. Keen,et al. Organizing for crisis response , 1996, J. Inf. Technol..
[52] A. Gillis,et al. Research for Nurses: Methods and Interpretation , 2001 .
[53] Susan W. Brenner,et al. Cyberterrorism , 2002 .
[54] Peter Stavroulakis. TErrestrial Trunked RAdio - TETRA: A Global Security Tool , 2007 .
[55] Robert Koch. Towards next-generation Intrusion Detection , 2011, 2011 3rd International Conference on Cyber Conflict.
[56] Myriam Dunn Cavelty. The militarisation of cyberspace: Why less may be better , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[57] Dong-You Choi,et al. A Novel Cross Layer Intrusion Detection System in MANET , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[58] Greg Guest,et al. Describing Mixed Methods Research , 2013 .
[59] Max Boot,et al. War Made New: Technology, Warfare, and the Course of History, 1500 to Today , 2006 .
[60] H. Tavani. Informational Privacy: Concepts, Theories, and Controversies , 2009 .
[61] Justin G. Holbrook. Communications Privacy in the Military , 2009 .
[62] Arthur K. Cebrowski,et al. Network Centric Warfare: Its Origins and Future , 1998 .
[63] Ronald J. Deibert,et al. Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.
[64] J. Rubenfeld. The Right of Privacy , 1989 .
[65] Eric Cole,et al. Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization , 2012 .
[66] Edward N. Rappaport,et al. THE DEADLIEST, COSTLIEST, AND MOST INTENSE UNITED STATES TROPICAL CYCLONES FROM 1851 TO 2004 (AND OTHER FREQUENTLY REQUESTED HURRICANE FACTS) , 2005 .
[67] Ashok Jhunjhunwala,et al. User scenarios 2020: a worldwide wireless future , 2009 .
[68] Johan Sigholm. Collection and Distribution of Disaster Field Data , 2010 .