NL ARMS Netherlands Annual Review of Military Studies 2018 Coastal Border Control: From Data and Tasks to Deployment and Law Enforcement /

This book provides a comprehensive study of border control: from data analysis and information warfare, frameworks for command and control, and game-theoretic risk management, up to the (optimal) deployment of law enforcement missions. Innovative about this book is that it approaches the subject fro...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Monsuur, H. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Jansen, J.M (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Marchal, F.J (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: The Hague : T.M.C. Asser Press : Imprint: T.M.C. Asser Press, 2018.
Έκδοση:1st ed. 2018.
Σειρά:NL ARMS, Netherlands Annual Review of Military Studies,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Part I. Law Enforcement and Border Security
  • Chapter 1. Flexibility in Border Security: A Case Study of the Dutch Border Security Team
  • Chapter 2. Legal Challenges Surrounding Maritime Operations in the Med: Focus on Migrant Flows
  • Chapter 3. Helping Migrants While Protecting Against Migration: The Border Security Team in Crisis
  • Chapter 4. Border Security, Boat Migration and Mediterranean Operations in the Frames of Securitisation and Law Enforcement: Causal Explanation and Process Training
  • Part II. Command and Control for Border Security Applications
  • Chapter 5. Resource Control for Task-Oriented Programming
  • Chapter 6. A Framework for C2 for Distributed Heterogeneous Collaboration
  • Chapter 7. Challenges of Cooperative Wireless Networks in Border Control Applications
  • Part III. Data Analysis and Deployment of Maritime Security Forces
  • Chapter 8. Optimizing Asset Deployment in Maritime Law Enforcement
  • Chapter 9. Security Games with Restricted Strategies: An Approximate Dynamic Programming Approach
  • Chapter 10. Data Analysis within the NL Coast Guard
  • Chapter 11. Maximal Covering Location Games: An Application for the Coast Guard
  • Part IV. Natural-Scientific Aspects of Border and Port Protection
  • Chapter 12. Vulnerability of Harbors and Near-Shore Infrastructure to Underwater Explosions
  • Chapter 13. Coastal Border Control Using Electromagnetic Field Signatures.