Results 11 to 20 of about 189,829 (257)
On Security Policy Migrations [PDF]
There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices
Lobo, Jorge +2 more
openaire +1 more source
Prevention of an Arms Race in Outer Space: Multilateral Negotiations’ Effects on International Law
INTRODUCTION. Outer space is an increasingly competitive environment. This raises incentives for states to place conventional weapons in outer space.
T Vestner
doaj +1 more source
A recently published nuclear forensics methodology for source discrimination of separated weapons-grade plutonium utilizes intra-element isotope ratios and a maximum likelihood formulation to identify the most likely source reactor-type, fuel burnup and ...
Evans D. Kitcher +2 more
doaj +1 more source
Can a Soldier Say No to an Enhancing Intervention?
Technological advancements have provided militaries with the possibility to enhance human performance and to provide soldiers with better warfighting capabilities. Though these technologies hold significant potential, their use is not without cost to the
Sahar Latheef, Adam Henschke
doaj +1 more source
Games for groundwater governance: field experiments in Andhra Pradesh, India
Groundwater is a common-pool resource that is subject to depletion in many places around the world as a result of increased use of irrigation and water-demanding cash crops. Where state capacity to control groundwater use is limited, collective action is
Ruth Meinzen-Dick +6 more
doaj +1 more source
How Can the TPNW Regime Be Sustained?
Experience in implementing both other WMD treaties and other humanitarian disarmament treaties suggests that the TPNW regime can be effective in building and sustaining a global norm against nuclear weapons, even if no nuclear-armed state joins the ...
Richard Lennane, Richard Moyes
doaj +1 more source
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities.
Mohammad A. Hawila, Sunil S. Chirayath
doaj +1 more source
Distributed security policy conformance [PDF]
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of ...
Montanari, Mirko +4 more
openaire +3 more sources
Raw materials policy as security policy [PDF]
Today the global shortage refers primarily to raw materials. High energy prices, unstable agricultural markets and problematic rare ores are only some of striking indicators of the new race for raw materials. This is just the beginning: with the progress
Schneider Henrique, Bigler Hans-Ulrich
doaj +1 more source
This study reviews the Artificial Intelligence and Machine Learning approaches developed thus far for driver profile and driving pattern recognition, representing a set of macroscopic and microscopic behaviors respectively, to enhance the understanding ...
Dimitrios I. Tselentis +1 more
doaj +1 more source

