Showing 161 - 180 results of 351 for search '"national security"', query time: 0.08s Refine Results
  1. 161

    Legal bases for counteracting financial terrorism by I. V. Kyrieieva, А. І. Denysov

    Published 2021-09-01
    “…Financial terrorism is primarily a threat to the economic interests of the state, and therefore threatens national security in general. The fight against financial terrorism is directly linked to financial security. …”
    Get full text
    Article
  2. 162

    Analysis and enlightenment on the cybersecurity strategy of various countries in the world by Yu-xiao LI, Yong-jiang XIE

    Published 2016-01-01
    “…National cybersecurity strategy is the top-level design and strategic framework of the country, which in-cludes the national security, risk management and the personal protection. …”
    Get full text
    Article
  3. 163

    Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college by Tongge XU, Lianzhong LIU, Jianwei LIU, Jian MAO

    Published 2019-06-01
    “…Cyberspace security is a matter of national security,and the talent cultivation is of top priority.Based on the experience of developing the first-class cyber security college of Beihang University,this paper analyzes some common issues,and discusses the ideas,mechanisms and patterns of cyberspace security talents cultivation from the aspects of the talents selection,curriculum system,comprehensive training platform,practical training and academic competitions.It may provide a reference for the training of cyber security professionals.…”
    Get full text
    Article
  4. 164

    Digitalization of national economy by L. P. Goncharenko, S. A. Sybachin

    Published 2019-09-01
    “…The gradual transition to a digital model of development will increase the competitiveness of Russian products on international markets and it will also contribute to the improvement of national security. Analysis of the implementation of information and communication technologies in the national economy shows significant lag behind the leaders. …”
    Get full text
    Article
  5. 165

    Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2018-12-01
    “…The link element through which the system of objects of this crime is formed is defined as the general sphere of social activity, where the mentioned social relations arise, develop and operate, namely, the national security of Ukraine. Thus, all social relations, which are put under the protection of Section XIV of the Special Part of the Criminal Code of Ukraine, arise and function in general in order to safeguard the interests of Ukraine’s national security. …”
    Get full text
    Article
  6. 166
  7. 167

    Research and applications of intelligent public security information system based on big data by Dong-ke LI

    Published 2016-12-01
    “…The rapid development of big data push the big changes to every industries and government agencies.The concept of big data and security intelligent system framework was cleared.Then,the serious problems of the devel-opment of intelligent public security were analyzed,the novel work model of public security was also studied,and the new paths and method were pointed ont.Next,the intelligent information system for public security was built up,and the effectiveness of this system were evaluated.The system can efficiently meet the requirements of the current public security,and serve the national security with great significance.…”
    Get full text
    Article
  8. 168

    Ballot initiatives and the national debate on immigration by Mario Menéndez

    Published 2012-01-01
    “…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
    Get full text
    Article
  9. 169

    Research on cyberspace security situation awareness by Gan-sen ZHAO, Jie-chao WU, Zi-hao CHEN, Xue-qi REN, Hao-xiang TAN, Zhao-hui MA

    Published 2016-10-01
    “…Cyberspace is the fifth sovereignty space after the sea,land,sky and space.The security of cyberspace is closely relative to national security.How to discover threat in time,how to defense network attack,how to trace attackers were the problems to be selved.Facing the polyphyletic,isomeric,disconnected properties in the cyberspace,bases on a credible IaaS,a cyberspace security situation awareness was constructed by ontology,semantic Web and linked data theory.While guarantee the access security of integrating data,the model could make a comprehensive analysis on the properties in the cyberspace,which contributes to cyberspace governance.…”
    Get full text
    Article
  10. 170

    L’appel à l’ennemi : l’anticommunisme à l’École supérieure de guerre au Brésil (1954-1964) by Rodrigo Nabuco de Araujo

    Published 2021-03-01
    “…The focus is on the conferences given by judges, academics and psychiatrists who saw Communism as a political doctrine and a threat to national security. Opposing Communism helped pull these elites together and shaped the central axis of the new doctrine that both civilians and military officers were elaborating at the Superior War College. …”
    Get full text
    Article
  11. 171

    THE EUROPEAN UNION (EU) AND THE CLIMATE-SECURITY NEXUS: CSDP MISSIONS AND OPERATIONS by Ayfer Genç Yılmaz

    Published 2022-12-01
    “…For some scholars, the linkages between climate change and security should be analyzed from the national security perspective, whereas others from a human security perspective. …”
    Get full text
    Article
  12. 172

    Stratégies de partage et diffusion de données publiques environnementales by Sandra Nicolle, Maya Leroy

    Published 2013-09-01
    “…On the contrary, in French Guiana, there is a reduction of information distribution concerning gold mining impacts, linked to an increased involvement of national security state services in the monitoring process.…”
    Get full text
    Article
  13. 173

    Research status and development trends of security assurance for space-ground integration information network by Feng-hua LI, Li-hua YIN, Wei WU, Lin-jie ZHANG, Guo-zhen SHI

    Published 2016-11-01
    “…Space-ground integration information network consists of space-based backbone network, space-based access network, the node net of foundation, Internet, mobile communication network, which has important significance for the realization of the target of national security strategy. Firstly, the characteristics of space-ground integration network, such as exposed channel, heterogeneous network integration, etc, were analyzed. …”
    Get full text
    Article
  14. 174

    Donald Trump et les services de renseignement : une relation sous tension by Gildas Le Voguer

    Published 2018-09-01
    “…The foreign policy decision-making process has been influenced by the intelligence community since at least 1947 when the passage of the National Security Act led to the creation of the Central Intelligence Agency. …”
    Get full text
    Article
  15. 175

    Research and practice of network security threat intelligence management system for power enterprise by Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG

    Published 2022-07-01
    “…Network security is an important part of the national security, and network security threat intelligence work has become an important part of the network security protection.Aiming at the problems of power enterprise carrying out network security threat intelligence, such as many sources, many types, wide range, many vulnerability risks, many subordinate departments and personnel, the network security threat intelligence work plan of power enterprise was put forward.The scheme includes five aspects: information source, information research and judgment, information disposal, information platform and information performance.The evaluation method of network security vulnerabilities, information emergency disposal process and information performance evaluation method were puts forward.The preliminary application results show that the proposed scheme has important reference value for power enterprise to improve the emergency response ability of network security information and the level of network security protection ability.…”
    Get full text
    Article
  16. 176

    Evolution of approaches to defense policy in Japan in the post-war period by Plaksin A.D.

    Published 2024-12-01
    “…The study examines the key steps of the Japanese leadership towards strengthening of national security policy against the backdrop of a tendency to gradual transition from the implementation of defensive measures to the formation of a base for offensive operations. …”
    Get full text
    Article
  17. 177

    A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures by Qianxiang Zhu, Yuanqing Qin, Yue Zhao, Zhou Chunjie

    Published 2020-01-01
    “…Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. …”
    Get full text
    Article
  18. 178

    Combating Cybercrime and Cyberterrorism in Indonesia by Cynthia Shafira Hartati, Ali Muhammad

    Published 2023-02-01
    “…Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures. …”
    Get full text
    Article
  19. 179

    Satellite-Earth Integration Intelligent Resource Management and Control Architecture of Giant Sensing Constellation by Yingte CHAI, Gang WANG, Chao ZHANG, Guangxi ZHU, Wei FU, Zhengqiang GUO

    Published 2022-09-01
    “…The giant sensing constellation will have the capabilities of on-board automatic processing, on-board independent planning, multisensors and multi-mode automatic switching.The traditional control mode of relying solely on the ground system can no longer meet the requirements of the giant sensing constellation.According to the requirements of intelligent and networked control, an integrated intelligent resource management and control architecture was proposed.It was based on the integration of satellite and earth.The work contents of satellite and earth were specifically designed.The interaction mechanism between satellite and earth was designed.The architecture it proposed could be well applied to the independent resource management and controlled of giant sensing constellation.The architecture realized the "networking, autonomy and intelligence" of the giant sensing constellation and it could played an important role in major national security emergency response and other tasks.…”
    Get full text
    Article
  20. 180

    The Risks of the would be Modernization of the Country: Sociologists-Riskologists are Required by S. A. Kravchenko

    Published 2009-12-01
    “…The problem of innovative approaches to the national security is analyzed in connection with new possibilities of risk management. …”
    Get full text
    Article