Showing 4,381 - 4,400 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 4381

    Law enforcement activities of the National Guard under martial law by I. V. Shmahailo

    Published 2024-12-01
    “…Its functioning is due to the threat to public security and order of the state, in particular from the Russian Federation. …”
    Get full text
    Article
  2. 4382

    User Needs of Online Tutoring Applications Using House of Quality by Qurrata Aini, Eko Ruddy Cahyadi, Faqih Udin

    Published 2025-01-01
    “…Conclusion: The top user priorities for online tutoring applications are security and privacy, performance, and information. …”
    Get full text
    Article
  3. 4383
  4. 4384

    Geopolitics of the European Rule of Law — Lessons from Ukraine and the Western Balkans by Elise Bernard

    Published 2022-08-01
    “…Abstract Several opportunities arise for rule of law promoters: to reclaim the security discourse; to explain EU enlargement through the commitment to the rule of law; and consequently, to develop a strategy to influence opponents of enlargement.…”
    Get full text
    Article
  5. 4385

    THE METHODOLOGY OF THE FINANCIAL PROVIDING OF ACTIVITY OF THE FEDERAL GOVERNMENT BUDGETARY INSTITUTIONS by R. Murav’Ev

    Published 2017-01-01
    “…In this article considered the key principles of financing federal state budgetary institutions, analyzed the main sources of financial support activities, and also the analysis of the structure of financial security of the federal government budgetary institutions.…”
    Get full text
    Article
  6. 4386
  7. 4387
  8. 4388

    The financial character of policing in Tunisia: collusions, extraversion and the criminalization of informality by Daniela Musina

    Published 2024-07-01
    “…This article attempts to shed light on the development of a financial/security assemblages in Tunisia, from an international political sociology perspective that looks at the development of practices of security and policing from a transnational and postcolonial vantage point. …”
    Get full text
    Article
  9. 4389

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “…To determine the level of security, a passive sniffing attack and an active Known Plaintext Attack (KPA) were tested. …”
    Get full text
    Article
  10. 4390
  11. 4391
  12. 4392
  13. 4393
  14. 4394

    Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics by Rana Alabdan, Bayan Alabduallah, Nuha Alruwais, Munya A. Arasi, Somia A. Asklany, Omar Alghushairy, Fouad Shoie Alallah, Abdulrhman Alshareef

    Published 2025-01-01
    “…An intrusion detection system (IDS) is paramount in IoT security, as it dynamically monitors device behaviours and network traffic to detect and mitigate any possible cyber threats. …”
    Get full text
    Article
  15. 4395
  16. 4396
  17. 4397
  18. 4398
  19. 4399

    TRANSPORT SECTOR AND ITS ROLE IN THE IMPORT SUBSTITUTION OF AGRICULTURAL PRODUCTS: FORESIGHT by V. Persianov, A. Kurbatova

    Published 2016-05-01
    “…It also proposes a project of factory-farm integration to ensure the economic security of our country.…”
    Get full text
    Article
  20. 4400

    REDUCING ELECTRICITY CONSUMPTION FOR IRON AND STEEL SMELTING by L. E. Rovin, S. L. Rovin

    Published 2013-09-01
    “…It is shown that the introduction of high-temperature heating installation charge fusion provides increased security, stability of operation arc, reduced noise to 75–85 dB, the elimination of fugitive emissions in the work zone…”
    Get full text
    Article