Results 61 to 70 of about 1,971,716 (147)
Targeted killing as a means of asymmetric warfare: a provocative view and invitation to debate [PDF]
The killing of Mahmoud al-Mabhou reportedly by agents of Israel‟s Mossad service in Dubai a year ago1 serves as a quick reminder that extrajudicial executions, assassinations and other targeted killing operations are taking place and are part of a modern
Bachmann, Sascha-Dominik, Haeussler, Ulf
core
C-FLAT: Control-FLow ATtestation for Embedded Systems Software
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a remote, and potentially malware-infected, device (prover).
Abera, Tigist +7 more
core
Legal Archetypes and Metadata Collection [PDF]
In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than ...
Rubel, Alan
core
Legislative Malpractice: Misdiagnosing Patients' Rights [PDF]
The recent debate in Congress over patients' rights and the regulation of managed care has been predicated largely on a misunderstanding of the Employee Retirement Income Security Act of 1974.
Greg Scandlen
core
Workplace arterial hypertension: potential of rilmenidine-based combination therapy
Aim. To assess effectiveness and tolerability of morning / evening-administered rilmenidine in patients with work-place arterial hypertension (WpAH), during combination therapy. Material and methods.
S. I. Drozdetsky +2 more
doaj
Corporate social responsibility in the first years of Caja de Pensiones para la Vejez y de Ahorros [PDF]
When Caja de Pensiones para la Vejez y de Ahorros, 'la Caixa', was created in 1905, it was not just a transient response to a serious social, political, and economic problem; it also provided a permanent solution by creating a long-lasting social welfare
Argandoña, Antonio +2 more
core
Orchestration under Security Constraints [PDF]
International audienceAutomatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services.
Chevalier, Yannick +2 more
core +1 more source
This paper investigates the deterioration of, and the abnormal temperature rise in, the GFRP core rod material of compact V-string composite insulators subjected to prolonged alternating flexural loading under wind-induced stresses.
Xiaoyu Yi +8 more
doaj +1 more source
The analysis of the legal basis of the activities of the bodies of the Federal Security Service of the Russian Federation (hereinafter – the FSB of Russia), in particular the security objects in their view, requires a clear understanding of each key
YUSUPOV Rakhimian Galimianovich +1 more
doaj +1 more source
Beginning of the State Security Operations against Exarch Stefan during the 40s of the 20th Century
Dilyan Nikoltshev, Beginning of the State Security Operations against Exarch Stefan during the 40s of the 20th Century. The life of the third Bulgarian Exarch, Stefan, has been the subject of numerous studies.
Dilyan Nikolchev
doaj +1 more source

