Results 1 to 10 of about 633,786 (191)

Candida auris surveillance in the Military Health System: a multidrug-resistant threat [PDF]

open access: yesAntimicrobial Stewardship & Healthcare Epidemiology
Objective: To evaluate the potential sources and current screening strategies for the multidrug-resistant fungal pathogen Candida auris in the US Military Health System (MHS).
J. Joseph Brough   +12 more
doaj   +2 more sources

Enhancing Cyber Situational Awareness Through Dynamic Adaptive Symbology: The DASS Framework [PDF]

open access: yesSensors
The static nature of traditional military symbology, such as MIL-STD-2525D, hinders effective real-time threat detection and response in modern cybersecurity operations.
Nicholas Macrino   +2 more
doaj   +2 more sources

Military-political Processes in the Caucasus Region and the Security of Russia

open access: yesVestnik MGIMO-Universiteta, 2015
The unipolar world breaking and the tightening of geopolitical struggle led to destructive military-political processes in different regions of the world.
A. V. Vilovatykh, A. V. Rogovaya
doaj   +5 more sources

The Impact of Cyberwarfare on the National Security [PDF]

open access: yesFuture Human Image, 2023
Cyberwarfare has emerged as a critical threat to national security, encompassing attacks on critical infrastructure, government operations, and military capabilities.
Temur Digmelashvili
doaj   +1 more source

The Impact of Threat Perception on Military Strategy: The Case of Türkiye during the Cold War Era

open access: yesGüvenlik Stratejileri Dergisi, 2023
Military Strategy is the process of matching the resources provided to military power according to the threat. Threat is about the future rather than the present and involves an assessment based on the predictions. In a sense, it is perception.
Osman Gazi Kandemir
doaj   +1 more source

Democracy, external threat, and military spending

open access: yesResearch & Politics, 2021
A number of studies find that democracies spend less on their military than non-democracies. Yet there are well known counter-examples, including but not limited to the United States and Israel. We contend that these counter-examples are part of a larger
Matthew Hauenstein   +2 more
doaj   +1 more source

Simulation of critical vulnerabilities in the logistics of supply arms and military equipment under conditions of military threat

open access: yesАвіаційно-космічна техніка та технологія, 2022
The systemic nature problem related to the simulation of the influence of military threats on the logistics chain of the supply of weapons and military equipment (spare parts for aircrafts, ammunition for rocket systems of volley fire, etc.) is being ...
Oleg Fedorovych   +3 more
doaj   +1 more source

Management of national security in analysis and threat assessment of Indonesian sovereignty

open access: yesJPPI (Jurnal Penelitian Pendidikan Indonesia), 2022
This study aims to determine the management of national security in the threat of Indonesian sovereignty. Analysis with qualitative methods is presented in the research process through several data collection methods, including in-depth interviews ...
Novky Asmoro   +4 more
doaj   +1 more source

Has the threat posed by China to international security been overstated?

open access: yesJournal of Global Faultlines, 2023
This article evaluates whether the threat posed to international security by a rising China has been overstated. The literature analyzed during the research reveals that China’s rise does most definitely pose a threat to international security, a threat ...
Owen Tench
doaj   +1 more source

HPV-Related Cancers: A Growing Threat to U.S. Military Health and Readiness [PDF]

open access: yesMilitary Medicine, 2021
ABSTRACT The incidence of human papillomavirus (HPV) related cancers is growing in the United States. Active duty service members (ADSM) have higher rates of HPV infection than civilians and are therefore at greater risk of developing HPV-related cancers.
Julia, Seay   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy