Search for dissertations about: "Systems science for defence and security"
Showing result 1 - 5 of 8 swedish dissertations containing the words Systems science for defence and security.
-
1. A Framework for Securing e-Government Services : The Case of Tanzania
Abstract : e-Government services are becoming one of the most important and efficient means by which governments (G) interact with businesses (B) and citizens (C). This has brought not only tremendous opportunities but also serious security challenges. Critical information assets are exposed to current and emerging security risks and threats. READ MORE
-
2. Secure Tactical Communications for Inter-Organizational Collaboration : The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield
Abstract : The development within the area of information and communications technology (ICT) has been rapid during the last couple of decades. Advancements in mobile technology, such as smartphones and other portable devices with embedded sensors, rapid expansion of communications infrastructure, and increased spectrum utilization, has had a major impact on civilian society, but increasingly also on professional organizations such as the Swedish Armed Forces. READ MORE
-
3. Anomaly Detection and its Adaptation : Studies on Cyber-Physical Systems
Abstract : Cyber-Physical Systems (CPS) are complex systems where physical operations are supported and coordinated by Information and Communication Technology (ICT).From the point of view of security, ICT technology offers new opportunities to increase vigilance and real-time responsiveness to physical security faults. READ MORE
-
4. On the Virtual Borderline: Cyber Operations and their Impact on the Paradigms for Peace and War : Aspects of International and Swedish Domestic Law
Abstract : Contemporary disputes between states contain elements of psychological and information operations, intelligence operations and cyber operations as well as methods for physical use of force. Cyber operations may use, or contribute to, all of these different techniques and methods combined and can be focused on intelligence gathering, preparation of networks for future attacks, sabotage or on preventing access to information. READ MORE
-
5. Safety, Security, and Semantic Aspects of Equation-Based Object-Oriented Languages and Environments
Abstract : During the last two decades, the interest for computer aided modeling and simulation of complex physical systems has witnessed a significant growth. The recent possibility to create acausal models, using components from different domains (e.g., electrical, mechanical, and hydraulic) enables new opportunities. READ MORE