Showing 3,261 - 3,280 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 3261
  2. 3262

    Ukrayna Örneğinden Hareketle Nükleer Silahsızlanmanın Olası Sonuçlarına Dair Bir İnceleme by Eray ALIM

    Published 2020-06-01
    “…By way of conclusion, it is argued in the context of the 2014 crisis that, denuclearization constitutes a potential national security risk for states (Ukraine) that face formidable nuclear-armed rivals (Russia).…”
    Get full text
    Article
  3. 3263

    School of Energy Diplomacy by V. I. Saligin

    Published 2014-10-01
    “…Russia's cooperation with international community in finding ways of addressing global energy security, serves its national interests on international arena. …”
    Get full text
    Article
  4. 3264

    Why Aceh-Indonesia Conflict Resolution can’t be Copy-Paste in Bangsamoro-Philippines Issue? by Sidik Jatmika, Nanang Sumanang, Ajeng Puspa Marlinda, Chalilla Raihan Nabilazka, Muhammad Indrawan Jatmika

    Published 2022-06-01
    “…The main objective is to identify similarities rational choice (survival, security, economy/welfare, prestige, and influence) especially how political elites would still feel enjoy to conduct those agreements in both regions. …”
    Get full text
    Article
  5. 3265

    Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography by Lili Wang

    Published 2014-01-01
    “…Finally, we compare our enhancement with related works to illustrate that the improvement is more secure and robust, while maintaining low performance cost.…”
    Get full text
    Article
  6. 3266

    Desplazados de Haití: movilidad intrarregional sudamericana y las medidas compulsivas en Brasil y Chile by Joseane Mariéle Schuck Pinto, Rodrigo Ríos Álvarez

    Published 2020-01-01
    “…In relation to the procedure to be adopted, it is observed that through qualitative research it will be possible to account for the different representations on the subject under study, without neglecting the quantitative method, as it will contribute to the evaluation and categorization of contained data in government information databases, such as data from the Ministry of Justice and Public Security of Brazil, the National Institute of Statistics and the Judiciary of Chile, and the Institute of Public Policies and Human Rights of Mercosur, with the elaboration of a diagnosis of the displacement of Haitians in South American countries, with special emphasis on the migratory realities of Haitians in Brazil and Chile. …”
    Get full text
    Article
  7. 3267

    Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations by Erwin Alexander Leal Piedrahita

    Published 2019-11-01
    “…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
    Get full text
    Article
  8. 3268

    Analysis of attacks on device manager in software-defined Internet of Things by Tri-Hai Nguyen, Myungsik Yoo

    Published 2017-08-01
    “…Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. …”
    Get full text
    Article
  9. 3269

    Zvezda Shipyard Project: Global Implications and Its Influence on the Russian Economy by I. I. Sechin

    Published 2024-04-01
    “…This strategy addresses both socio-economic goals and defense and security challenges. Additionally, the paper provides quantitative analyses of the multiplicative effects generated by the Zvezda Shipyard project's realization.…”
    Get full text
    Article
  10. 3270
  11. 3271

    Mobile Music Distribution: A Multichannel Approach by Marco Furini

    Published 2011-01-01
    “…The architecture includes a license-based security mechanism that prevents unauthorized usage of digital music, and makes use of an incentive mechanism to stimulate and reward the music distribution among customers. …”
    Get full text
    Article
  12. 3272

    A privacy-preserving collaborative reputation system for mobile crowdsensing by Bayan Hashr Alamri, Muhammad Mostafa Monowar, Suhair Alshehri

    Published 2018-09-01
    “…We provide a detailed security analysis to prove the effectiveness of privacy-preserving collaborative reputation system against a number of attacks. …”
    Get full text
    Article
  13. 3273
  14. 3274

    Nature Capital. An ecological transition and open space transformation phenomena by Renzo Lecardane

    Published 2023-06-01
    “… As indicated by the UN 2030 Agenda and the new European goals for 2030, Ecological Transition is at the basis of the new development model to reduce polluting emissions, prevent and combat land disruption, minimise the impact of productive activities on the environment and improve the quality of life and environmental security for future generations: on the one hand, orienting an ecological transition towards equity and collective well-being means rethinking the system of relations between man and the natural and built environment and, on the other hand, referring to the construction of social and cultural communities starting from environmental issues and land resources. …”
    Get full text
    Article
  15. 3275

    Entre o lícito e o ilícito: a dinâmica do roubo de cargas e suas zonas cinzentas by Leonardo José Ostronoff, Fernando Salla

    Published 2020-01-01
    “…The Military Intervention in Public Security in Rio de Janeiro, in 2018, expresses this mobilization of economic corporations in government spheres in order to promote a wide-ranging action not only police, but also political. …”
    Get full text
    Article
  16. 3276

    COPING UP WITH CLIMATE CHANGE: A Case Study of a Banten Muslim Community by Al Chaidar Abdurrahman Puteh, Herdi Sahrasad, Satrio Dwicahyo Rahadi

    Published 2024-07-01
    “…The article argues that the farmers' resilience and agency are crucial for ensuring food security and livelihoods in the face of climate change. …”
    Get full text
    Article
  17. 3277

    PROBLEMS OF TRADE AND ECONOMIC RELATIONS OF WEST AFRICAN COUNTRIES WITH THE EUROPEAN UNION, PROSPECTS FOR THEIR DEVELOPMENT by N. B. Sekongo

    Published 2020-05-01
    “…The essence of relationships between West Africa and the European Union based on the papers, both foreign and domestic researchers in the field of security, regional economic development and integration etc. has been disclosed. …”
    Get full text
    Article
  18. 3278

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. …”
    Get full text
    Article
  19. 3279

    Design and realization of compressor data abnormality safety monitoring and inducement traceability expert system. by Yuan Wang, Shaolin Hu

    Published 2025-01-01
    “…To promptly monitor abnormal changes in compressor data and trace the causes leading to these data anomalies, this paper proposes a security monitoring and root cause tracing method for compressor data anomalies. …”
    Get full text
    Article
  20. 3280

    A Real-Time Optical Tracking and Measurement Processing System for Flying Targets by Pengyu Guo, Shaowen Ding, Hongliang Zhang, Xiaohu Zhang

    Published 2014-01-01
    “…The system can be used in the field of aerospace tests like target analysis including dynamic parameter, transient states, and optical physics characteristics, with security control.…”
    Get full text
    Article