Showing 101 - 120 results of 158 for search '"terrorist"', query time: 0.04s Refine Results
  1. 101

    Dé-finir le langage dans The Names de Don DeLillo by Karim Daanoune

    Published 2018-07-01
    “…Hiding in the hills and gathered around an unusual pseudo-spiritual belief, a terrorist cult tracks and kills anyone “whose initials matched the first letter of each word in a particular place-name » (168). …”
    Get full text
    Article
  2. 102

    RUSSIAN-SAUDIAN POLITICAL INTERACTION by G. G. Kosach, E. S. Melkumyan, A. O. Filonik

    Published 2017-11-01
    “…The authors state there are both periods of “crises” and detente in the development of Russian-Saudi political interaction that were marked by events in Chechnya and former Yugoslavia in 1994-2000, “Arab Spring” 2011, the post-September 2015 era, the Russian anti-terrorist campaign in Syria. The alternation of these periods is the constant of Russian-Saudi political contacts, despite the similarity in the approaches of both sides to the ways and methods of solving crisis situations in the Middle East region, as well as the Saudi’s pro-Russian position regarding the change in the status of the Crimea and the situation in the east of Ukraine. …”
    Get full text
    Article
  3. 103

    Sécurité aux frontières : Portée et limites de la stratégie algérienne by Abdennour Benantar

    Published 2016-06-01
    “…Despite its contribution to securing the border strip, however, this strategy is still limited for several reasons: the State-centric orientation found whenever dealing with specific issues; the inoperativeness of some cardinal principles in an evolving context characterized by the affirmation of non-state actors; the mutations of the terrorist phenomenon; a highly unstable regional context; a lack of strategic convergence in the region.…”
    Get full text
    Article
  4. 104

    Research on M-Paul Dynamic Constitutive Relation of Q235B Steel by Li Lin, Bo Huang, Xinke Xiao, Minyuan Huang, Zhiying Liu

    Published 2019-01-01
    “…In recent years, terrorist attacks and regional conflicts have increased and research on the resistance of building structures has been more highlighted. …”
    Get full text
    Article
  5. 105

    The Phenomenon of «Islamic State» by A. V. Fedorchenko, A. V. Krylov

    Published 2015-04-01
    “…International coordination of anti-terrorist activities of Russia with the West and the East should bring positive results.…”
    Get full text
    Article
  6. 106

    Examination of Disaster and Emergency Assembly Areas and Recommendation of Potential Areas: The Case of Akçaabat Trabzon by Gülten Kara, Kadir Kaan Yavruoğlu

    Published 2025-01-01
    “…Assembly areas for disaster and emergency situations are designated places where people can safely gather and meet their basic needs during critical times, such as natural disasters like earthquakes, fires, and terrorist attacks. These areas are mostly open and green spaces, easily accessible to the people. …”
    Get full text
    Article
  7. 107

    The role of the accountant in preventing money laundering by Cvetković Dragan, Vujičić Slađana, Stanković Sunčica

    Published 2024-01-01
    “…One of the state's responses to this negative phenomenon is an effective system for combating money laundering and terrorist financing. A system characterized by partnership between the private and public sectors, coordination and cooperation between competent state authorities and all its participants/obligors. …”
    Get full text
    Article
  8. 108

    Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya) by Morad Kaviani Rad, Hadi Aazami, Majid Rasouli, Ahmad Bakhshi

    Published 2018-03-01
    “…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of  fundamentalist terrorist groups has attracted a large part of the world's security literature.  …”
    Get full text
    Article
  9. 109

    Sensing and Degradation of Organophosphorus Compounds by Exploitation of Heat-Loving Enzymes by Giuseppe Manco, Eros A. Lampitella, Nagendra S. K. Achanta, Giuliana Catara, Maria Marone, Elena Porzio

    Published 2025-01-01
    “…The increasing incidence of organophosphate (OP) pesticide poisoning and the use of OP chemical warfare agents (CWA) in conflicts and terrorist acts need sustainable methods for sensing, decontamination, and detoxification of OP compounds. …”
    Get full text
    Article
  10. 110

    Europol’s Counter-Terrorism Role: over 25 Years of Partnership by Antonio Ortiz

    Published 2024-10-01
    “…Findings: Over the past two decades, significant terrorist attacks have profoundly influenced the European Union’s counter-terrorism policies and institutions. …”
    Get full text
    Article
  11. 111

    Organophosphorus Nerve Agents: Types, Toxicity, and Treatments by Sudisha Mukherjee, Rinkoo Devi Gupta

    Published 2020-01-01
    “…Nerve agents, a subcategory of the organophosphorus compounds, have been produced and used during wars, and they have also been used in terrorist activities. These compounds possess physiological threats by interacting and inhibiting acetylcholinesterase enzyme which leads to the cholinergic crisis. …”
    Get full text
    Article
  12. 112

    Implementation and optimisation of intelligent police systems based on artificial intelligence by D. O. Zhadan, M. V. Mordvyntsev, D. V. Pashniev, O. V. Khlestkov

    Published 2024-06-01
    “…Modern video surveillance systems can help counter terrorist attacks by tracking and identifying people and suspicious objects. …”
    Get full text
    Article
  13. 113

    Evolution of U.S. Policy Approaches to Ensuring Cybersecurity and Defense of Critical Information Infrastructure by M. V. Smekalova

    Published 2020-11-01
    “…The United States were among the first to elaborate legal framework for cyberpolicy aiming at providing national security after terrorist attacks of 2001. As time passed, dozens of legislation acts were adopted, and a number of agencies and committees responsible for ensuring information security emerged. …”
    Get full text
    Article
  14. 114

    Victim Verification with the Use of Deep Metric Learning in DVI System Supported by Mobile Application by Zbigniew Piotrowski, Marta Bistroń, Gabriel Jekateryńczuk, Paweł Kaczmarek, Dymitr Pietrow

    Published 2025-01-01
    “…This paper presents the design of a system to support the identification of victims of disasters and terrorist attacks. The system, called ID Victim (IDV), is a web application using a mobile app and data server. …”
    Get full text
    Article
  15. 115

    Geopolitical Risk and Stock Market Volatility in Emerging Economies: Evidence from GARCH-MIDAS Model by Menglong Yang, Qiang Zhang, Adan Yi, Peng Peng

    Published 2021-01-01
    “…Previous studies have found that geopolitical risk (GPR) caused by geopolitical events such as terrorist attacks can affect the movements of asset prices. …”
    Get full text
    Article
  16. 116

    Enhancing concealed object detection in active THz security images with adaptation-YOLO by Aiguo Cheng, Shiyou Wu, Xiaodong Liu, Hangyu Lu

    Published 2025-01-01
    “…Abstract The terahertz (THz) security scanner offers advantages such as non-contact inspection and the ability to detect various types of dangerous goods, playing an important role in preventing terrorist attacks. We aim to accurately and quickly detect concealed objects in THz security images. …”
    Get full text
    Article
  17. 117

    Formation and development of special police units: a retrospective analysis by K. O. Chyshko, R. S. Pinchuk

    Published 2024-03-01
    “…Stage I (1709–1917) – formation of the land militia, which can be considered the first example of the existence of modern special police units; Stage II (1917–1941) – characterised by the creation of Ukrainian voluntary militia and military formations; Stage III (1941–1978) – a period of stagnation in the history of the formation of special police units due to the events of the First and Second World Wars; Stage IV (1978–1991) – creation of the first special unit in the system of the Ministry of Internal Affairs of the USSR at the official level – a special police detachment; Stage V (1991–2014) – associated with Ukraine’s independence and the creation of Berkut special police unit, Titan special police unit, Sokil rapid response unit; Stage VI (2014 – present) – formation of special police units that actively participate in armed conflicts; this stage was influenced by three key events: 1) the anti-terrorist operation in eastern Ukraine, which was later called the “Joint Forces Operation”, which led to the creation of a number of volunteer special units of the Ministry of Internal Affairs of Ukraine; 2) the creation of the National Police of Ukraine and the formation of special units within its structure (the Rapid Action Corps, the Special Police Patrol Service and the Tactical Response Unit); 3) Russia’s full-scale invasion of Ukraine, which led to the creation of a militarised special police unit, the “Luty” Joint Assault Brigade of the National Police of Ukraine and the “Safari” assault regiment of the National Police.…”
    Get full text
    Article
  18. 118

    Stabilisation measures on the de-occupied territories: conceptual interpretation, classification, and application features by K. L. Buhaichuk

    Published 2024-03-01
    “…Special stabilisation measures are carried out to prevent sabotage and reconnaissance groups and illegal armed groups from entering the de-occupied territory and committing terrorist acts on infrastructure and communications facilities, ensuring public safety and order, preventing and suppressing crimes and other offences, eliminating the consequences of emergencies, and searching for persons who have committed crimes against the foundations of national security, war crimes and other offences during the occupation of the territory. …”
    Get full text
    Article
  19. 119

    The Cooperation Council for the Arab States of the Gulf: History, Key Achievements and Development Prospects by E. S. Melkumyan

    Published 2020-11-01
    “…Finally, the paper dwells on the events of the so called Qatar crisis, resulting from the discontent among the majority of GCC states with Qatar, which they accuse of supporting terrorist organizations. The author concludes that the Qatar crisis has demonstrated that national interests and the desire to maintain national sovereignty tend to have preference in the policy of the Gulf States over the common goals of the GCC. …”
    Get full text
    Article
  20. 120

    Pengaturan cyber terrorism ditinjau dari perspektif organizational transnational crime by Putu Sekarwangi Saraswati, I Nengah Susrama

    Published 2024-06-01
    “…Dalam situasi kekosongan hukum ini, ASEAN Convention on Counter Terrorism dan International Convention for the Suppression of Terrorist Bombings mulai dipergunakan sebagai dasar hukum untuk mempidanakan pelaku cyber terrorism. …”
    Get full text
    Article