Results 31 to 40 of about 1,971,716 (147)
STEVAN DEDIJER IN THE DOCUMENTS OF THE STATE SECURITY SERVICE FROM MID-1950s TO MID-1980s [PDF]
The paper deals with reasons, course, intensity and ways of surveillance of activities of physicist and intelligence agent Stevan Dedijer by the State Security Service authorities (SDS) of the Republic of Croatia between the mid-1950s and the mid-1980s ...
Dragomir Bondžić, Martin Previšić
doaj +1 more source
Comparison of Approximation Methods for the Estimation of Distributions in the Analysis of the G/G/1 Queue [PDF]
The analysis of Weibull and Pareto distribution functions in the approximation of the density of a sum of damping functions, PMRQ approximation and approximation of service distribution in the peak mode of the flow.
O. Karaulova +3 more
doaj +1 more source
SLIM : Scalable Linkage of Mobility Data [PDF]
We present a scalable solution to link entities across mobility datasets using their spatio-temporal information. This is a fundamental problem in many applications such as linking user identities for security, understanding privacy limitations of ...
Atluri Gowtham +7 more
core +3 more sources
Economic foundation and importance of non-state security sector within the national security system [PDF]
The main purpose of this paper was to present the causes (for), role (played by) and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state ...
Anđelković Slobodan, Savković Marina
doaj +1 more source
The purpose of the study is the presentation and introduction into scientific usage of archive-investigating case of the senior librarian, the head of the newspaper fund of the National Library of Ukraine, later the library of the Academy of Sciences of ...
R. Martseniuk
doaj +1 more source
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris +3 more
core +1 more source
Intelligence and Security Services in Tito's Yugoslavia [PDF]
As with the other communist-governed states, socialist Yugoslavia had a broadly developed state and military security apparatus. The article describes the initial steps of the Department for the People’s Protection (locally known as the OZNA).
Bojan Dimitrijević
doaj +1 more source
Security architectures in mobile integrated pay-TV [PDF]
This paper presents the design and describes the advantage of the state-of-the-art Mobile Integrated Conditional Access System (MICAS) concerning interoperability, personalisation, security and operational costs in Pay-TV systems.
Birch, N +4 more
core
State security service against Cardinal Karol Wojtyla [PDF]
On the example of the history of persecution of Cardinal Karol Wojtyla the auther discusses the forms and methods of the Polish security service’s struggle against the Catholic Church.
Filippov Boris
doaj
Entrepreneurial Policing? International Policing Challenges [PDF]
International police assistance is a global growth industry. Democratic police reform has become a cornerstone of security sector reform within peacebuilding and capacity building programmes. The UK provides police for a wide range of missions across the
Ellison, Graham, Sinclair, Georgina
core

