Scrutinising the secret state: parliamentary oversight of the intelligence and security agencies [PDF]
This article considers the growing parliamentary scrutiny of the intelligence and security agencies. It raises a number of questions about the role and effectiveness of the Intelligence and Security Committee, Parliament and ...
Bochel, Hugh +2 more
core +1 more source
Private military and security companies, territoriality and the transformation of western security governance [PDF]
The field of security governance holds a special place within the context of the debate over the diffusion of power from state to non-state actors, from national to international authorities and from governments to markets in Western democracies.
Krahmann, E
core +1 more source
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna +9 more
core +3 more sources
INVESTMENT SECURITY IN THE SYSTEM OF ECONOMIC SECURITY OF THE STATE
In modern conditions of functioning of the market economy, in the era of development of globalization and globalization processes, the prevalence of international relations, the spread of various forms of international capital movement, in particular foreign direct investment, an important place is occupied by investment activities and policies ...
Nataliia Sytnyk, Veronika Ishchenko
openaire +1 more source
Evaluation of Airport Security Training Programs: Perspectives and Issues [PDF]
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive ...
De Gramatica, Martina +4 more
core +1 more source
RETRACTED: Theoretical aspects of knowledge as the key to success and economic growth [PDF]
See the retraction notice E3S Web of Conferences 420, 00001 (2023), https://doi.org/10.1051/e3sconf ...
Tovma N.A. +5 more
doaj +1 more source
Source attack of decoy-state quantum key distribution using phase information [PDF]
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun +9 more
core +2 more sources
Some issues related to concept of the Constitution and security of Civilization
The state of affairs concerning religion in Mongolia has recently become a controversial subject due to the need to clarify the constitutional and state policy on religion, which was being interpreted in different ways by scholars.
Amarbayar Myagmarsuren
doaj +1 more source
Research on Long-term Reliability of Silver Sintered Press-Pack IGBT Modules
Owing to the advantages of short-circuit failure mode, double-sided heat dissipation, and low thermal resistance, press-pack insulated gate bipolar transistors (PP-IGBTs) are widely used in high-power-density applications, such as high-voltage direct ...
Renkuan Liu +8 more
doaj +1 more source
Generalized self-testing and the security of the 6-state protocol
Self-tested quantum information processing provides a means for doing useful information processing with untrusted quantum apparatus. Previous work was limited to performing computations and protocols in real Hilbert spaces, which is not a serious ...
C.H. Bennett +4 more
core +2 more sources

