Results 31 to 40 of about 1,017,053 (308)

Preparation of changes to the law of Ukraine „On security service of Ukraine” with the consideration of foreign experience of legal regulation of the activities of internal security services

open access: yesПроблеми Законності, 2018
The authors examine the peculiarities of the legal regulation of the tasks of the Internal Security Agency of the Republic of Poland. A comparative analysis was conducted with domestic legislation, which defines the tasks of the Security Service of ...
Іван Іванович Мусієнко   +1 more
doaj   +1 more source

Single-surgeon outcomes of open radical cystectomy for muscle-invasive bladder cancer: Experience from a tertiary center in Azerbaijan

open access: yesSurgery in Practice and Science
Summary: Objective: Radical cystectomy is the standard treatment for muscle-invasive bladder cancer (MIBC). This study presents the first analysis of open radical cystectomy (ORC) outcomes in Azerbaijan, where robotic surgery is unavailable. Methods: We
Rashad Sholan   +5 more
doaj   +1 more source

Economic foundation and importance of non-state security sector within the national security system [PDF]

open access: yesMegatrend Revija, 2016
The main purpose of this paper was to present the causes (for), role (played by) and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state ...
Anđelković Slobodan, Savković Marina
doaj   +1 more source

A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Internet of Things (IoT) is an innovative paradigm envisioned to provide massive applications that are now part of our daily lives. Millions of smart devices are deployed within complex networks to provide vibrant functionalities, including ...
Abdulmalik Alwarafy   +4 more
semanticscholar   +1 more source

Pavlovskyi P. F.: Strokes for the Portrait of a repressed Librarian (Based on the Materials from the Archive-investiogation Case)

open access: yesVìsnik - Kiïvsʹkij nacìonalʹnij unìversitet ìmenì Tarasa Ševčenka: Ìstorìâ, 2020
The purpose of the study is the presentation and introduction into scientific usage of archive-investigating case of the senior librarian, the head of the newspaper fund of the National Library of Ukraine, later the library of the Academy of Sciences of ...
R. Martseniuk
doaj   +1 more source

Proper selection of personnel for the Security Service of Ukraine as a prerequisite for the career growth of its employees

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2023
The current state of national legislation regarding the establishment of a list of requirements for candidates for service in bodies and units of the Security Service of Ukraine has been considered.
M. S. Yuzyshen
doaj   +1 more source

An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

open access: yesEntropy, 2019
In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for ...
A. Cetinkaya, H. Ishii, T. Hayakawa
semanticscholar   +1 more source

Intelligence and Security Services in Tito's Yugoslavia [PDF]

open access: yesIstorija 20. Veka, 2019
As with the other communist-governed states, socialist Yugoslavia had a broadly developed state and military security apparatus. The article describes the initial steps of the Department for the People’s Protection (locally known as the OZNA).
Bojan Dimitrijević
doaj   +1 more source

Evaluation of the idiopathic scoliosis of varying severity treatment effectiveness with transpedicular systems

open access: yesИнновационная медицина Кубани, 2021
Introduction Significant success has been achieved in the development of new methods of treatment and rehabilitation of patients with idiopathic scoliosis, however, in many aspects of this problem there is no unambiguous approach to the choice of a ...
Yu. L. Zeynalov
doaj   +1 more source

The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks

open access: yesWireless Communications and Mobile Computing, 2022
This paper provides an extensive and complete survey on the process of detecting and preventing various types of IoT-based security attacks. It is designed for software developers, researchers, and practitioners in the Internet of Things field who aim to
Muhammad Shafiq   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy