CBIAC and homeland security information

被引:0
|
作者
King, JM [1 ]
机构
[1] Chem & Biol Def Informat Anal Ctr, Aberdeen Proving Ground, MD 21010 USA
关键词
D O I
暂无
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
77-CINF
引用
收藏
页码:U1032 / U1033
页数:2
相关论文
共 50 条
  • [1] Homeland security and information
    Relyea, HC
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2002, 19 (03) : 213 - 223
  • [2] Homeland security & infrastructure information
    Walker, DE
    [J]. ASHRAE JOURNAL, 2004, 46 (05) : 61 - 61
  • [3] Holistic security: The integration of information and physical security as an element of homeland security
    Hamilton, Caroline
    [J]. Computer Security Journal, 2003, 19 (01): : 35 - 40
  • [4] Proactive information gathering for homeland security teams
    Kogut, P
    Yen, J
    Leung, Y
    Sun, S
    Wang, R
    Mielczarek, T
    Hellar, B
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (03) : 48 - 50
  • [5] Intelligence and security informatics for homeland security: Information, communication, and transportation
    Chen, HC
    Wang, FY
    Zeng, D
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2004, 5 (04) : 329 - 341
  • [6] Special Issue on Information Technology and Homeland Security
    Reddick, Christopher G.
    [J]. INTERNATIONAL JOURNAL OF E-POLITICS, 2013, 4 (03) : IV - vi
  • [7] Homeland security and information control: A model of asymmetric information flows
    Maxwell, TA
    [J]. ASIST 2003: PROCEEDINGS OF THE 66TH ASIST ANNUAL MEETING, VOL 40, 2003: HUMANIZING INFORMATION TECHNOLOGY: FROM IDEAS TO BITS AND BACK, 2003, 40 : 128 - 134
  • [8] Homeland security: Sharing and managing critical incident information
    Ashley, WR
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT II, 2003, 5071 : 6 - 11
  • [9] Homeland security and information sharing: Federal policy considerations
    Relyea, HC
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2004, 21 (04) : 420 - 438
  • [10] Push and pull effects of homeland information security incentives
    Koong, Kai S.
    Merhi, Mohammad I.
    Sun, Jun
    [J]. Information Management and Computer Security, 2013, 21 (03): : 155 - 176