Showing 1,081 - 1,100 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 1081
  2. 1082
  3. 1083

    Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism by A. Yu. Helzhynskyi

    Published 2019-09-01
    “…The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. …”
    Get full text
    Article
  4. 1084

    THE SECURITY ASPECT OF TURKEY-UNITED STATES RELATIONS: IN SEARCH FOR A NEW MODEL by I. A. Svistunova

    Published 2016-04-01
    “…Security cooperation has always been an important aspect of the relations between Turkey and the USA. …”
    Get full text
    Article
  5. 1085
  6. 1086

    Aukus (Australia-united kingdom-united states) threat to Indo-pacific security by Ismiyatun Ismiyatun, Ita Puji Lestari

    Published 2024-11-01
    “…Countries can change their defense budgets based on their assessment of security threats in the region and changes in the balance of power. …”
    Get full text
    Article
  7. 1087
  8. 1088
  9. 1089

    Secure-Network-Coding-Based File Sharing via Device-to-Device Communication by Lei Wang, Qing Wang

    Published 2017-01-01
    “…In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. …”
    Get full text
    Article
  10. 1090

    Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics by Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu

    Published 2010-01-01
    “…However, assessing the security level which can be achieved with them is an important issue, as it is directly related to the suitability to use commercial FPGA instead of proprietary custom FPGA for this kind of protection. …”
    Get full text
    Article
  11. 1091
  12. 1092

    Successive relaying secure transmission scheme based on inter-relay interference cancellation by Yi ZOU, Kai-zhi HUANG, Xiao-lei KANG

    Published 2017-09-01
    “…A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition,then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this,a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency,a promotion of at least 2 bit·s<sup>-1</sup>·Hz<sup>-1</sup>in secrecy rate can be observed.…”
    Get full text
    Article
  13. 1093
  14. 1094
  15. 1095
  16. 1096

    Research on Situation Awareness Model of Information Content Security Incidents in Telecommunication Network by Lin Ge, Xinsheng Ji, Tao Jiang

    Published 2014-02-01
    “…Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive integration,the status of security situation of the whole telecommunication network was analyzed.According to the structure of model,hierarchical information fusion proximate calculation based on evidence theory was used to resolve the problem of how to use the initial information to determine the probability in high level information fusion.The simulation results show that the model can compute fast in real time in high accuracy,and it can perceive and determine the incidents effectively.…”
    Get full text
    Article
  17. 1097
  18. 1098
  19. 1099
  20. 1100