Results 21 to 30 of about 829,033 (289)
Contemporary indicators of security. An attempt to measure the level of security. [PDF]
Objectives: The subject of consideration in this article are contemporary indicators of security, which allow to determine its level in quantifiable values.
Radosław Bielawski
doaj +1 more source
Problems and Tools for the Detection of Threats to Personnel Security in the Region [PDF]
The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures.
Natalia Victorovna Kuznetsova +1 more
doaj +1 more source
Digital Age Security Threats: Challenges to IR Theories [PDF]
The significance of information and communication technology (ICT) has been widely felt not only within a state but also among and between the states in their multifarious day-to-day interactions.
Gaan, N. (Narottam)
core +1 more source
In any specific case of the use of armed violence, the question of its legitimation arises, that is, the need to justify the validity of an act of use of force in the language of the law.
S. V. Korostelev
doaj +1 more source
WLAN Security: Threats And Countermeasures
A wireless local area Network (WLAN) is being widely recognized as a viable cost effective general purpose solution in providing high speed real time access to information.
Suroto Suroto
doaj +1 more source
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi +2 more
core +3 more sources
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S. +6 more
core +2 more sources
National security transformation: Resilience within national security strategies of great powers in response to global threats [PDF]
Altered nature of security risks and threats created within globalization process new security environment, forcing creators of national security strategies to anticipate the sources of threats and to define appropriate mechanisms for response to ...
Keković Zoran Ć., Dinić Jelena M.
doaj +1 more source
Terrorism is most often understood as the term used to describe the method by which a political organization (organized group) seeks to achieve its definite goals, mainly by intimidating a large part of society by means of systematic extreme ...
S. V. Korostelev
doaj +1 more source
Dilemmas of security perception [PDF]
The concept of security has undergone transformations along with the development of civilization. The rapid changes in the international security environment that have occurred over the past few decades have had a particularly significant impact on its ...
Miroslaw Banasik
doaj +1 more source

