Results 31 to 40 of about 1,017,053 (308)
The authors examine the peculiarities of the legal regulation of the tasks of the Internal Security Agency of the Republic of Poland. A comparative analysis was conducted with domestic legislation, which defines the tasks of the Security Service of ...
Іван Іванович Мусієнко +1 more
doaj +1 more source
Summary: Objective: Radical cystectomy is the standard treatment for muscle-invasive bladder cancer (MIBC). This study presents the first analysis of open radical cystectomy (ORC) outcomes in Azerbaijan, where robotic surgery is unavailable. Methods: We
Rashad Sholan +5 more
doaj +1 more source
Economic foundation and importance of non-state security sector within the national security system [PDF]
The main purpose of this paper was to present the causes (for), role (played by) and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state ...
Anđelković Slobodan, Savković Marina
doaj +1 more source
A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [PDF]
Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities, including ...
Abdulmalik Alwarafy +4 more
semanticscholar +1 more source
The purpose of the study is the presentation and introduction into scientific usage of archive-investigating case of the senior librarian, the head of the newspaper fund of the National Library of Ukraine, later the library of the Academy of Sciences of ...
R. Martseniuk
doaj +1 more source
The current state of national legislation regarding the establishment of a list of requirements for candidates for service in bodies and units of the Security Service of Ukraine has been considered.
M. S. Yuzyshen
doaj +1 more source
An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for ...
A. Cetinkaya, H. Ishii, T. Hayakawa
semanticscholar +1 more source
Intelligence and Security Services in Tito's Yugoslavia [PDF]
As with the other communist-governed states, socialist Yugoslavia had a broadly developed state and military security apparatus. The article describes the initial steps of the Department for the People’s Protection (locally known as the OZNA).
Bojan Dimitrijević
doaj +1 more source
Introduction Significant success has been achieved in the development of new methods of treatment and rehabilitation of patients with idiopathic scoliosis, however, in many aspects of this problem there is no unambiguous approach to the choice of a ...
Yu. L. Zeynalov
doaj +1 more source
This paper provides an extensive and complete survey on the process of detecting and preventing various types of IoT-based security attacks. It is designed for software developers, researchers, and practitioners in the Internet of Things field who aim to
Muhammad Shafiq +4 more
semanticscholar +1 more source

