Linked e-resources

Details

Introduction
Part 1: Cyber Crime, Cyber Terrorism and Cyber Security Cybercrime
Cyber Terrorism
Cyber Security
AI and Cyber
Part 2: Border Security
Border Security Technologies
Methodological approaches to border security
Integrated platforms for border security management
Part 3 Serious and Organized Crime (SOC)
Data Integration for combating SOC
Big Data Analytics in context of SOC
Data Visualisation and pattern matching
AI and SOC
Part 4: Protection of Critical Infrastructures (CI)
Cyber and System security for protection of CI
Physical security of CI
Role of UAVs in protection of CI
Case studies in protection of CI
Part 5: Disaster and Crisis management
First responders technology
Crisis management
Disaster management and Resilience strengthening technologies
Conclusion.

Browse Subjects

Show more subjects...

Statistics

from
to
Export