Results 81 to 90 of about 4,943 (194)
Determinants of Manufacturing Concentration Patterns in Mercosur [PDF]
Over the last fifteen years, Argentina, Brazil, Paraguay and Uruguay have implemented major economic reforms including unilateral trade liberalization programs and the constitution of a regional trade bloc, Mercosur. This trade policy change has led to a
Christian Volpe Martincus +1 more
core
Alat OSINT Berbasis Web untuk Deteksi URL Phishing Menggunakan Integrasi API
Phishing merupakan teknik kejahatan siber yang memanfaatkan rekayasa sosial untuk mencuri data sensitif, seperti kredensial login dan informasi keuangan.
Alfian Syahli +2 more
doaj +1 more source
Mexican Cartel Tactical Note #20: RPG-29 Anti-Armor Munitions [PDF]
Note—Up until recently, weapons that provide for armor and bunker defeat capability at the levels that the RPG-29 is capable of, have not been seen in the hands of the Mexican cartels.
Bunker, Robert J. +2 more
core +2 more sources
Economic Integration And Manufacturing Concentration Patterns: Evidence From Mercosur [PDF]
Trade policy changes are likely to result in a reallocation of resources across sectors and space. Over the past two decades, Argentina, Brazil, Paraguay, and Uruguay have implemented unilateral trade liberalization programs and formed a regional bloc ...
Christian Volpe Martincus +1 more
core +3 more sources
Воєнна розвідка і медіа: межа таємного і публічного під час війни
Мета роботи. Дослідження має на меті проаналізувати взаємозв’язок між воєнною розвідкою, інформаційними стратегіями та діяльністю медіа як інструментів впливу у сучасних безпекових комунікаціях.
Oleksandra Markiv, Ivan Markiv
doaj +1 more source
Ontology Population for Open-Source Intelligence [PDF]
We present an approach based on GATE (General Architecture for Text Engineering) for the automatic population of ontologies from text documents. We describe some experimental results, which are encouraging in terms of extracted correct instances of the ...
Ganino, G. +3 more
core
Russia’s ongoing war of aggression against Ukraine, along with the resulting destruction and threats to cultural heritage, poses a major challenge to documenting the scale of the damage and ...
Żaneta Gwardzińska-Chowaniec
doaj +1 more source
EU Opt in and out under the Framework of Lisbon Treaty [PDF]
100學年度研究獎補助論文[[abstract]]According to Article 50 TEU (Treaty of European Union) amended by Lisbon Treaty, member states of European Union are granted right to leave this international organisation, and the moment and change is being watching.
Cheng, Chin-mo
core +1 more source
OSINT у забезпеченні національної безпеки
В статті доведено, що OSINT є передовою методикою збирання та аналізу інформації з відкритих джерел, що активно використовується органами безпекового спрямування.
D. Rybka
doaj +1 more source
Empowering LLMs with Toolkits: An Open-Source Intelligence Acquisition Method
The acquisition of cybersecurity threat intelligence is a critical task in the implementation of effective security defense strategies. Recently, advancements in large language model (LLM) technology have led to remarkable capabilities in natural ...
Xinyang Yuan +4 more
doaj +1 more source

