Showing 1,821 - 1,840 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 1821

    Sécurité aux frontières : Portée et limites de la stratégie algérienne by Abdennour Benantar

    Published 2016-06-01
    “…This article analyzes the Algerian State’s border security strategy. Their increasing instability forces it to be one of the most involved actors in the maintenance of regional security. …”
    Get full text
    Article
  2. 1822
  3. 1823

    Is Securitisation a Natural and Useful Response to Existential Threats? Introducing the Idea of Peacification by Timo Kivimäki

    Published 2025-01-01
    “…After all, security is a property of an agent, while security issues traditionally arise from threats posed by another agent. …”
    Get full text
    Article
  4. 1824
  5. 1825
  6. 1826
  7. 1827

    BORDER MANAGEMENT, ARMED BANDITRY AND TERRORISM MITIGATION IN NIGERIA by ODE AGI OKO

    Published 2024-08-01
    “…This paper is set to examine key security challenges and socio-economic effects of insurgency and Armed Banditry in Nigeria; seeing that the country as a nation state is under a severe internal socio-economic and security threat. …”
    Get full text
    Article
  8. 1828

    Prototype Of DPO Search Information System (People Search List) On CCTV Cameras Using Face Recognition by Tri Reski Anugraha, Dedy Atmajaya, Lilis Nur Hayati, Nurhajar Anugraha

    Published 2023-12-01
    “…The efficiency aspect of the housing security sector is the main consideration in creating information technology in a CCTV security development, because so far CCTV has not guaranteed maximum housing security, because CCTV can only record not analyze. …”
    Get full text
    Article
  9. 1829

    A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures by Qianxiang Zhu, Yuanqing Qin, Yue Zhao, Zhou Chunjie

    Published 2020-01-01
    “…Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. …”
    Get full text
    Article
  10. 1830

    New Work Forms: How to Integrate Them in Our Social Insurances by Saskia Montebovi, Alberto Barrio Fernandez, Paul Schoukens

    Published 2020-04-01
    “…Abstract The increase in the group of atypical workers means that their social security protection needs reviewing. How far should we go in approaching social security for self-employed workers, flex workers, crowd workers and all new employment relationships differently? …”
    Get full text
    Article
  11. 1831

    Dream of European Army: Is It a Feasible Objective or Not? by Sevil Şahin, Mustafa Ozan Şahin

    Published 2023-10-01
    “…We have witnessed new security and military efforts from the EU in the first two decades of the 2000s, such as the European Security Strategy, EU’s Global Strategy and Security Compass. 2013 marked a turning point when the USA deployed its new nuclear weapons in Europe. …”
    Get full text
    Article
  12. 1832
  13. 1833

    Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2018-12-01
    “…Generic object of a crime under the Art. 330 of the Criminal Code of Ukraine, has been defined as social relations existing with regard to the security of state secrets and official information gathered in the course of operative and search, counter-intelligence activities, in the field of the country defense, as well as the security of the state border of Ukraine and military security in terms of providing draft call and mobilization. …”
    Get full text
    Article
  14. 1834
  15. 1835

    SensoTrust: Trustworthy Domains in Wireless Sensor Networks by Pedro Castillejo, José-Fernán Martínez-Ortega, Lourdes López, José Antonio Sánchez Alcón

    Published 2015-07-01
    “…Security domains can be deployed as an add-on service to merge with any service already deployed, obtaining a new secured service.…”
    Get full text
    Article
  16. 1836

    Increasing the cyber resilience of SMEs through open-source solutions and international collaboration by Ionica ȘERBAN, Florentina-Mihaela CURCĂ, Robert-Ștefan ȘANDRU

    Published 2025-01-01
    “…Open-source solutions offer financial accessibility, flexibility, and increased security, supported by global communities that contribute to their continuous improvement. …”
    Get full text
    Article
  17. 1837

    An adaptive intrusion detection and prevention system for Internet of Things by Sheikh Tahir Bakhsh, Saleh Alghamdi, Rayan A Alsemmeari, Syed Raheel Hassan

    Published 2019-11-01
    “…Therefore, security has become a big challenge more than before. …”
    Get full text
    Article
  18. 1838
  19. 1839
  20. 1840