Results 11 to 20 of about 2,405,806 (209)

Information security economic systems in national security country [PDF]

open access: yes, 2015
In today's world, information security becomes vital for ensuring the interests of man, society and the state and the most important, part of the whole system of national security. Doctrine considers all the work in the field of information based on the Concept of National Security of Ukraine.
Krapyvnyi, Ivan Vasylovych   +2 more
openaire   +2 more sources

Constitutional and legal basis for ensuring the national security of the Republic of Kazakhstan

open access: yesХабаршы. Заң сериясы, 2021
This article reveals the current issues of constitutional and legal support of the individual, society and the state. From a legal point of view, security is considered as a set of legal norms, the purpose of which is to protect national interests from ...
A.S. Baykenzheev
doaj   +1 more source

An Anti-Disturbance Resilience Enhanced Algorithm for UAV 3D Route Planning

open access: yesSensors, 2022
Considering that the actual operating environment of UAV is complex and easily disturbed by the space environment of urban buildings, the RoutE Planning Algorithm of Resilience Enhancement (REPARE) for UAV 3D route planning based on the A* algorithm and ...
Zhining Xu   +5 more
doaj   +1 more source

The impact of the national security system on the prevention of security threats in the Republic of Serbia: Attitudes of secondary school students [PDF]

open access: yesSociološki Pregled, 2022
The paper presents the results of research regarding the attitudes of secondary school students in the Republic of Serbia to the impact of the national security system on the prevention of security threats.
Kesić Dušan B.   +2 more
doaj   +1 more source

National Security Council [PDF]

open access: yesВојно дело, 2015
Security challenges intensify 'security' activities too, thus expanding also the range of state institutions that are assigned specific tasks in national security.
Dulović Ljubomir
doaj   +1 more source

A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster

open access: yesDrones, 2023
The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks.
Lianxiao Meng   +3 more
doaj   +1 more source

A Survey of GNSS Spoofing and Anti-Spoofing Technology

open access: yesRemote Sensing, 2022
With the development of satellite navigation technology, the research focus of GNSS has shifted from improving positioning accuracy to expanding system application and improving system performance.
Lianxiao Meng   +3 more
doaj   +1 more source

Survey of Image Adversarial Example Defense Techniques [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
The rapid and extensive growth of artificial intelligence introduces new security challenges. The generation and defense of adversarial examples for deep neural networks is one of the hot spots.
LIU Ruiqi, LI Hu, WANG Dongxia, ZHAO Chongyang, LI Boyu
doaj   +1 more source

The Formation of an Integrated System of Economic Security at the National Level [PDF]

open access: yesProblemi Ekonomiki, 2023
The article forms an integrated system of economic security at the national level. It is noted that new threats to Ukraine’s national security today are caused by hostilities on its own territory and certain problems in the country’s economy.
Kondratenko Nataliia O.   +1 more
doaj   +1 more source

Electronic Employment Eligibility Verification: Franz Kafka's Solution to Illegal Immigration [PDF]

open access: yes, 2008
In last summer's debate over immigration reform, Congress treated a national electronic employment eligibility verification (EEV) system as a matter of near consensus. Intended to strengthen internal enforcement of the immigration laws, electronic EEV is
Jim Harper
core   +1 more source

Home - About - Disclaimer - Privacy