Technology Empowerment: Security Challenges.
暂无分享,去创建一个
[1] John C. Becking. The Future of Violence: Robots and Germs, Hackers and Drones-Confronting a New Age of Threat , 2016 .
[2] Martin Reeves,et al. Adaptability: The New Competitive Advantage , 2015 .
[3] Eric D. Vugrin,et al. Critical Infrastructure System Security and Resiliency , 2013 .
[4] Geoffrey W. Sutton,et al. The Better Angels of Our Nature: Why Violence Has Declined , 2012 .
[5] R. Baumeister. The Better Angels of Our Nature: Why Violence Has Declined , 2012 .
[6] Jonathan E. Newell. DEMOCRACY'S ARSENAL: Creating a Twenty-First-Century Defense Industry , 2012 .
[7] Cary B Russell,et al. Counter-Improvised Explosive Devices: Multiple DOD Organizations are Developing Numerous Initiatives , 2012 .
[8] Peter Marsh,et al. The New Industrial Revolution: Consumers, Globalization and the End of Mass Production , 2012 .
[9] Nicholas G. Hatsopoulos,et al. Brain-machine interface: Instant neural control of a movement signal , 2002, Nature.
[10] John Doyle,et al. Complexity and robustness , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[11] N. Augustine,et al. Defense Conversion: Bulldozing the Management , 1992 .
[12] B. Turner. Center for a New American Security , 2014 .
[13] Dave Grossman,et al. Weaponry, Evolution of* , 2008 .
[14] Norman R. Augustine,et al. Augustine's Laws : and major system development programs , 1982 .
[15] Andrew F. Cavalry. Cavalry to computer ; the pattern of military revolutions , 2022 .