Results 81 to 90 of about 4,943 (194)

Determinants of Manufacturing Concentration Patterns in Mercosur [PDF]

open access: yes
Over the last fifteen years, Argentina, Brazil, Paraguay and Uruguay have implemented major economic reforms including unilateral trade liberalization programs and the constitution of a regional trade bloc, Mercosur. This trade policy change has led to a
Christian Volpe Martincus   +1 more
core  

Alat OSINT Berbasis Web untuk Deteksi URL Phishing Menggunakan Integrasi API

open access: yesTechno.Com
Phishing merupakan teknik kejahatan siber yang memanfaatkan rekayasa sosial untuk mencuri data sensitif, seperti kredensial login dan informasi keuangan.
Alfian Syahli   +2 more
doaj   +1 more source

Mexican Cartel Tactical Note #20: RPG-29 Anti-Armor Munitions [PDF]

open access: yes, 2013
Note—Up until recently, weapons that provide for armor and bunker defeat capability at the levels that the RPG-29 is capable of, have not been seen in the hands of the Mexican cartels.
Bunker, Robert J.   +2 more
core   +2 more sources

Economic Integration And Manufacturing Concentration Patterns: Evidence From Mercosur [PDF]

open access: yes
Trade policy changes are likely to result in a reallocation of resources across sectors and space. Over the past two decades, Argentina, Brazil, Paraguay, and Uruguay have implemented unilateral trade liberalization programs and formed a regional bloc ...
Christian Volpe Martincus   +1 more
core   +3 more sources

Воєнна розвідка і медіа: межа таємного і публічного під час війни

open access: yesSocial Development & Security
Мета роботи. Дослідження має на меті проаналізувати взаємозв’язок між воєнною розвідкою, інформаційними стратегіями та діяльністю медіа як інструментів впливу у сучасних безпекових комунікаціях.
Oleksandra Markiv, Ivan Markiv
doaj   +1 more source

Ontology Population for Open-Source Intelligence [PDF]

open access: yes, 2018
We present an approach based on GATE (General Architecture for Text Engineering) for the automatic population of ontologies from text documents. We describe some experimental results, which are encouraging in terms of extracted correct instances of the ...
Ganino, G.   +3 more
core  

The Role of Open-Source Intelligence in Protecting Cultural Heritage During Armed Conflict: The Case of Ukraine

open access: yesSantander Art & Culture Law Review
Russia’s ongoing war of aggression against Ukraine, along with the resulting destruction and threats to cultural heritage, poses a major challenge to documenting the scale of the damage and ...
Żaneta Gwardzińska-Chowaniec
doaj   +1 more source

EU Opt in and out under the Framework of Lisbon Treaty [PDF]

open access: yes
100學年度研究獎補助論文[[abstract]]According to Article 50 TEU (Treaty of European Union) amended by Lisbon Treaty, member states of European Union are granted right to leave this international organisation, and the moment and change is being watching.
Cheng, Chin-mo
core   +1 more source

OSINT у забезпеченні національної безпеки

open access: yesНауковий вісник Ужгородського національного університету. Серія Право
В статті доведено, що OSINT є передовою методикою збирання та аналізу інформації з відкритих джерел, що активно використовується органами безпекового спрямування.
D. Rybka
doaj   +1 more source

Empowering LLMs with Toolkits: An Open-Source Intelligence Acquisition Method

open access: yesFuture Internet
The acquisition of cybersecurity threat intelligence is a critical task in the implementation of effective security defense strategies. Recently, advancements in large language model (LLM) technology have led to remarkable capabilities in natural ...
Xinyang Yuan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy