Results 21 to 30 of about 1,730,729 (295)
An Analysis on Changing Security Policies of Turkey after the July 15th Coup Attempt
Turkey's security policies have been largely a result of its historical and political experiences. The July 15th (2016) coup attempt indicates a turning point in Turkey's security policies as it has been strategically important in shaping the political ...
Niyazi Karabulut, Önder Kutlu
doaj +1 more source
Economic security through criminal policies
The article aims to identify the factors that have the greatest impact on economic security. Based on the study of legislative acts of the countries of the European Union, the United States, and relevant scientific literature, an analysis is made of the
Olena S. Oliinyk +4 more
doaj +1 more source
Distributed security policy conformance [PDF]
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of ...
Montanari, Mirko +4 more
openaire +3 more sources
REGULATORY FRAMEWORK APPLICABLE TO NATO AND THE EU THROUGH CODEPENDENCE [PDF]
This paper is the result of an analysis of the international literature aimed at highlighting the interdependence between NATO and the EU in terms of monitoring, optimizing and adopting the regulatory framework that applies at the level of international ...
Major Adrian MALDEȘ, Ph.D Candidate
doaj
American hegemony or global governance? Competing visions of international security [PDF]
An overview is given of two competing visions of contemporary international security: United States hegemony and security governance. According to these perspectives, the current generation is either witnessing the return to classical balance-of-power ...
Krahmann, E
core +1 more source
Hybrid Security Policies [PDF]
Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected
Radu CONSTANTINESCU
doaj
FOOD SECURITY IN CHINA AND UNITED STATES STRATEGIC POLICIES: INSIGHTS TO BRAZIL
The modern concept of State security comprises a transversal and multidisciplinary approach, including, among others, energy, cyber and food securities.
Andrea Curiacos Bertolini +2 more
doaj +1 more source
Data-Driven Security for Smart City Systems: Carving a Trail
Smart cities rely heavily on collecting and using data. Smart systems are implemented and deployed to provide intelligent features that help improve efficiency and quality of life. This creates a huge repository of data representing many aspects of smart
Nader Mohamed +3 more
doaj +1 more source
The Anatomy and Facets of Dynamic Policies
Information flow policies are often dynamic; the security concerns of a program will typically change during execution to reflect security-relevant events. A key challenge is how to best specify, and give proper meaning to, such dynamic policies. A large
Broberg, Niklas +2 more
core +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources

