Works matching DE "MILITARY surveillance"
Results: 415
Seeing and Unmaking Civilians in Afghanistan: Visual Technologies and Contested Professional Visions.
- Published in:
- Science, Technology & Human Values, 2017, v. 42, n. 6, p. 1031, doi. 10.1177/0162243917703463
- By:
- Publication type:
- Article
Vision and Transterritory: The Borders of Europe.
- Published in:
- Science, Technology & Human Values, 2017, v. 42, n. 6, p. 1003, doi. 10.1177/0162243917715106
- By:
- Publication type:
- Article
NZ Still Supports US Strategy.
- Published in:
- Social Alternatives, 1985, v. 5, n. 1, p. 32
- By:
- Publication type:
- Article
Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 4, p. 1541, doi. 10.1007/s11277-018-5291-7
- By:
- Publication type:
- Article
MuGKeG: Secure Multi-channel Group Key Generation Algorithm for Wireless Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4799, doi. 10.1007/s11277-017-4423-9
- By:
- Publication type:
- Article
Spatial and temporal dynamics of the prevalence of resistance genes and gastrointestinal pathogens in stool samples of German deployment returnees.
- Published in:
- European Journal of Microbiology & Immunology, 2024, v. 14, n. 4, p. 309, doi. 10.1556/1886.2024.00093
- By:
- Publication type:
- Article
Blue Mission Tracking: Real-Time Location of UN Peacekeepers.
- Published in:
- International Peacekeeping (13533312), 2015, v. 22, n. 5, p. 545, doi. 10.1080/13533312.2015.1094192
- By:
- Publication type:
- Article
Properties and Use of the Shewhart Method and Its Followers.
- Published in:
- Sequential Analysis, 2007, v. 26, n. 2, p. 171, doi. 10.1080/07474940701247164
- By:
- Publication type:
- Article
АНАЛИЗ ДИАГРАММЫ НАПРАВЛЕННОСТИ ПРИЕМО-ПЕРЕДАЮЩЕЙ КОЛЬЦЕВОЙ АНТЕННОЙ РЕШЕТКИ С МАЛЫМ УРОВНЕМ БОКОВЫХ ЛЕПЕСТКОВ
- Published in:
- Radio Electronics, Computer Science, Control, 2018, n. 4, p. 23, doi. 10.15588/1607-3274-2018-4-2
- By:
- Publication type:
- Article
Russians in Germany: Founding the Post-war Missile Programme.
- Published in:
- Europe-Asia Studies, 2004, v. 56, n. 8, p. 1131, doi. 10.1080/1465342042000308893
- By:
- Publication type:
- Article
UNLIMITED POWER: WHY THE PRESIDENT'S (WARRANTLESS) SURVEILLANCE PROGRAM IS UNCONSTITUTIONAL.
- Published in:
- 2010
- By:
- Publication type:
- Essay
NATIONAL IDS IN A GLOBAL WORLD: SURVEILLANCE, SECURITY, AND CITIZENSHIP.
- Published in:
- Case Western Reserve Journal of International Law, 2010, v. 42, n. 3, p. 607
- By:
- Publication type:
- Article
THWARTING IDEOLOGICAL TERRORISM: ARE WE BRAVE ENOUGH TO MAINTAIN CIVIL LIBERTIES IN THE FACE OF TERRORIST INDUCED TRAUMA?
- Published in:
- Case Western Reserve Journal of International Law, 2003, v. 35, n. 1, p. 55
- By:
- Publication type:
- Article
Medication by Proxy: The Devolution of Psychiatric Power and Shared Accountability to Psychopharmaceutical Use Among Soldiers in America's Post-9/11 Wars.
- Published in:
- 2020
- By:
- Publication type:
- journal article
A Case against Relying Solely on Intelligence, Surveillance and Reconnaissance Technology to Identify Proposed Targets.
- Published in:
- Journal of Conflict & Security Law, 2015, v. 20, n. 3, p. 415, doi. 10.1093/jcsl/krv009
- By:
- Publication type:
- Article
Belgian Intelligence SIGINT Operations.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2019, v. 32, n. 1, p. 1, doi. 10.1080/08850607.2018.1488501
- By:
- Publication type:
- Article
Brazil's SIVAM: Surveillance Against Crime and Terrorism.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2003, v. 16, n. 4, p. 543, doi. 10.1080/716100473
- By:
- Publication type:
- Article
Constitutional Law.
- Published in:
- European Review of Public Law, 2017, v. 29, n. 3, p. 933
- By:
- Publication type:
- Article
La globalisation de la surveillance. Aux origines de l'ordre sécuritaire.
- Published in:
- 2009
- By:
- Publication type:
- Book Review
Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats.
- Published in:
- Canadian Journal of Sociology, 2005, v. 30, n. 2, p. 169, doi. 10.2307/4146129
- By:
- Publication type:
- Article
A NOVEL APPROACH FOR CLUSTER HEAD SELECTION USING TRUST FUNCTION IN WSN.
- Published in:
- Scalable Computing: Practice & Experience, 2021, v. 22, n. 1, p. 1, doi. 10.12694/scpe.v22i1.1808
- By:
- Publication type:
- Article
Tunisia's democratization at risk.
- Published in:
- 2020
- By:
- Publication type:
- Report
Vertical interference: video, drone witnessing, and the myth of precision targeting.
- Published in:
- Media, War & Conflict, 2024, v. 17, n. 3, p. 275, doi. 10.1177/17506352231201742
- By:
- Publication type:
- Article
Visual power: The scopic regime of military drone operations.
- Published in:
- Media, War & Conflict, 2017, v. 10, n. 2, p. 141, doi. 10.1177/1750635216636137
- By:
- Publication type:
- Article
Attention feature fusion awareness network for vehicle target detection in SAR images.
- Published in:
- International Journal of Remote Sensing, 2023, v. 44, n. 17, p. 5228, doi. 10.1080/01431161.2023.2244642
- By:
- Publication type:
- Article
Design of Fully Automatic Drone Parachute System with Temperature Compensation Mechanism for Civilian and Military Applications.
- Published in:
- Journal of Advanced Transportation, 2018, p. 1, doi. 10.1155/2018/2964583
- By:
- Publication type:
- Article
The German ‘ultra’: signals intelligence in Yugoslavia 1943-1944.
- Published in:
- Journal of Intelligence History, 2018, v. 17, n. 2, p. 104, doi. 10.1080/16161262.2018.1425033
- By:
- Publication type:
- Article
Not above the law: Shin Bet’s (Israel Security Agency) democratization and legalization process.
- Published in:
- Journal of Intelligence History, 2015, v. 14, n. 1, p. 54, doi. 10.1080/16161262.2015.972717
- By:
- Publication type:
- Article
The surveillance of friends: MI5 and friendly aliens during the Second World War.
- Published in:
- Journal of Intelligence History, 2014, v. 13, n. 2, p. 131, doi. 10.1080/16161262.2014.896110
- By:
- Publication type:
- Article
Tibet under absolute Olympic security clampdown.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2008, v. 43, n. 9, p. 4
- Publication type:
- Article
Tibet imprisoned as China celebrates Olympics.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2008, v. 43, n. 9, p. 4
- Publication type:
- Article
"Big Brother's Bigger Brother": The Visual Politics of (Counter) Surveillance in Baltimore.
- Published in:
- Sociological Forum, 2020, v. 35, n. 4, p. 1315, doi. 10.1111/socf.12649
- By:
- Publication type:
- Article
From Satellite Tracking to Space Situational Awareness The USAF and Space Surveillance, 1957-2007.
- Published in:
- Air Power History, 2008, v. 55, n. 4, p. 4
- By:
- Publication type:
- Article
"Smart Borders?" High-Tech 'Virtual' Walls Are Even More Invasive Than Iron Walls.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Make Movies, Not War.
- Published in:
- 2013
- By:
- Publication type:
- Creative Nonfiction
3D Path Optimisation of Unmanned Aerial Vehicles Using Q Learning-Controlled GWO-AOA.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 45, n. 3, p. 2483, doi. 10.32604/csse.2023.032737
- By:
- Publication type:
- Article
From the Editors.
- Published in:
- Journal of Palestine Studies, 2020, v. 49, n. 4, p. 5, doi. 10.1525/jps.2020.49.4.5
- By:
- Publication type:
- Article
A Feasibility Analysis of the Use of ISAR Training Data in Machine Learning-Based SAR ATR.
- Published in:
- International Journal of Engineering Research & Development (IJERAD), 2023, v. 15, n. 3, p. 302, doi. 10.29137/umagd.1402020
- By:
- Publication type:
- Article
PRIVACY PROTESTS: SURVEILLANCE EVASION AND FOURTH AMENDMENT SUSPICION.
- Published in:
- Arizona Law Review, 2013, v. 55, n. 4, p. 997
- By:
- Publication type:
- Article
Efficient Resource Allocation Design for Mitigating Multi-Jammer in Underwater Wireless Sensor Network.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2020, v. 6, n. 24, p. 1, doi. 10.4108/eai.8-2-2021.168688
- By:
- Publication type:
- Article
Short Study on Performance of Air Surveillance Augmented by Twin Radars.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2014, v. 13, n. 1, p. 1, doi. 10.32565/aarms.2014.1.1
- By:
- Publication type:
- Article
In the focus: NATO Alliance Ground Surveillance System.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2013, v. 12, n. 2, p. 165, doi. 10.32565/aarms.2013.2.1
- By:
- Publication type:
- Article
The view from above: how the Royal Air Force provided a strategic vision for operational intelligence during the Malayan Emergency.
- Published in:
- Small Wars & Insurgencies, 2015, v. 26, n. 5, p. 764, doi. 10.1080/09592318.2015.1081466
- By:
- Publication type:
- Article
Anti-satellite warfare, proliferated satellites, and the future of space-based military surveillance.
- Published in:
- Journal of Strategic Studies, 2024, v. 47, n. 6/7, p. 916, doi. 10.1080/01402390.2024.2379398
- By:
- Publication type:
- Article
The Sino-US ‘Cat-and-Mouse’ Game Concerning Freedom of Navigation and Flights: An Analysis of Chinese Perspectives.
- Published in:
- Journal of Strategic Studies, 2016, v. 39, n. 5/6, p. 637, doi. 10.1080/01402390.2016.1238359
- By:
- Publication type:
- Article
Tinker, Mapper, Soldier, Spy – Captain Henry Elsdale's Pioneering 1882–83 Experiment with Small Balloons and Vertical Aerial Photography in Halifax, Canada.
- Published in:
- Canadian Journal of Remote Sensing, 2019, v. 45, n. 5, p. 603, doi. 10.1080/07038992.2019.1652577
- By:
- Publication type:
- Article
Optimal and heuristic algorithms for the multi-objective vehicle routing problem with drones for military surveillance operations.
- Published in:
- Journal of Industrial & Management Optimization, 2022, v. 18, n. 3, p. 1651, doi. 10.3934/jimo.2021037
- By:
- Publication type:
- Article
The Incidence of Aural Incursions in Elizabeth Bowen's The Last September and Iris Murdoch's The Red and the Green.
- Published in:
- 2022
- By:
- Publication type:
- Literary Criticism
Routing protocols classification for underwater wireless sensor networks based on localization and mobility.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 2, p. 797, doi. 10.1007/s11276-021-02880-z
- By:
- Publication type:
- Article
Surveillance, information gathering - changing environment.
- Published in:
- Military Science Review / Hadtudományi Szemle, 2017, v. 10, n. 3, p. 495
- By:
- Publication type:
- Article