-
1
Application of human-in-the-loop hybrid augmented intelligence approach in security inspection system
Published 2025-01-01Get full text
Article -
2
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01Get full text
Article -
3
-
4
‘Bottom-up securitization’: A visual turn in security studies
Published 2024-03-01Get full text
Article -
5
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks
Published 2013-06-01Get full text
Article -
6
Artificial Intelligence Bias and the Amplification of Inequalities in the Labor Market
Published 2024-06-01Get full text
Article -
7
-
8
-
9
-
10
-
11
-
12
EUROPEAN EXPERIENCE OF FINANCIAL MARKETS REGULATION AND OPPORTUNITIES FOR ITS APPLICATION IN RUSSIA
Published 2013-08-01Get full text
Article -
13
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Published 2025-01-01Get full text
Article -
14
Mass Fragmentation Characteristics of t-Boc Substituted Drug Precursors
Published 2025-01-01Get full text
Article -
15
Special Features of the Crime’s Subject Under the Article 330 of the Criminal Code of Ukraine
Published 2019-03-01“…As a result, the author has come to the conclusion that a special subject of the crime under the Art. 330 of the Criminal Code of Ukraine may be officers of the departments of the National Police of Ukraine, the State Investigation Bureau, the Security Service of Ukraine, the Foreign Intelligence Service of Ukraine, the State Border Guard Service of Ukraine, the Office of State Security, the State Fiscal Service of Ukraine, the State Penal Service of Ukraine, the Ministry of Defense of Ukraine, the President of Ukraine, officials of the President’s Administration of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, National Security and Defense Council of Ukraine, Supreme High Command General Headquarters of Ukraine, the Ministry of Defense of Ukraine, the General Staff of Armed Forces of Ukraine, the unions, military units and units of the Armed Forces of Ukraine, the State Special Transport Service, the State Service for Special Communications and Information Protection of Ukraine, the National Guard of Ukraine, the Council of Ministers of the Autonomous Republic of Crimea, regional, district, city and district in the cities, state administrations and local self-government agencies, as well as officials of enterprises, institutions and organizations that carry out state defense orders, conduct research and perform development in the defense area, etc.…”
Get full text
Article -
16
Optimalisasi Strategi Intelijen dalam Menghadapi Ancaman TPPO Jaringan Kamboja dan Implikasinya bagi Keamanan Nasional
Published 2024-12-01“…The intelligence strategy to combat the Cambodian network's human trafficking threats involves cross-sectoral cooperation through early detection and early warning as preventive measures against threats, conducted through investigations and security efforts in collaboration with Ministries, Agencies, and international cooperation with Cambodian authorities to produce memorandums of understanding for prevention, enforcement, protection, and policy harmonization. …”
Get full text
Article -
17
Multiple-Model Cardinality Balanced Multitarget Multi-Bernoulli Filter for Tracking Maneuvering Targets
Published 2013-01-01Get full text
Article -
18
-
19
The financial character of policing in Tunisia: collusions, extraversion and the criminalization of informality
Published 2024-07-01“…This article attempts to shed light on the development of a financial/security assemblages in Tunisia, from an international political sociology perspective that looks at the development of practices of security and policing from a transnational and postcolonial vantage point. …”
Get full text
Article -
20
Semantic Tokenization-Based Mamba for Hyperspectral Image Classification
Published 2025-01-01Get full text
Article