Results 11 to 20 of about 3,109,144 (196)

Scrutinising the secret state: parliamentary oversight of the intelligence and security agencies [PDF]

open access: yes, 2010
This article considers the growing parliamentary scrutiny of the intelligence and security agencies. It raises a number of questions about the role and effectiveness of the Intelligence and Security Committee, Parliament and ...
Bochel, Hugh   +2 more
core   +1 more source

Private military and security companies, territoriality and the transformation of western security governance [PDF]

open access: yes, 2012
The field of security governance holds a special place within the context of the debate over the diffusion of power from state to non-state actors, from national to international authorities and from governments to markets in Western democracies.
Krahmann, E
core   +1 more source

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

INVESTMENT SECURITY IN THE SYSTEM OF ECONOMIC SECURITY OF THE STATE

open access: yesBusiness Navigator, 2021
In modern conditions of functioning of the market economy, in the era of development of globalization and globalization processes, the prevalence of international relations, the spread of various forms of international capital movement, in particular foreign direct investment, an important place is occupied by investment activities and policies ...
Nataliia Sytnyk, Veronika Ishchenko
openaire   +1 more source

Evaluation of Airport Security Training Programs: Perspectives and Issues [PDF]

open access: yes, 2013
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive ...
De Gramatica, Martina   +4 more
core   +1 more source

RETRACTED: Theoretical aspects of knowledge as the key to success and economic growth [PDF]

open access: yesE3S Web of Conferences, 2023
See the retraction notice E3S Web of Conferences 420, 00001 (2023), https://doi.org/10.1051/e3sconf ...
Tovma N.A.   +5 more
doaj   +1 more source

Source attack of decoy-state quantum key distribution using phase information [PDF]

open access: yes, 2013
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun   +9 more
core   +2 more sources

Some issues related to concept of the Constitution and security of Civilization

open access: yesОлон улс судлал, 2020
The state of affairs concerning religion in Mongolia has recently become a controversial subject due to the need to clarify the constitutional and state policy on religion, which was being interpreted in different ways by scholars.
Amarbayar Myagmarsuren
doaj   +1 more source

Research on Long-term Reliability of Silver Sintered Press-Pack IGBT Modules

open access: yesPower Electronic Devices and Components, 2022
Owing to the advantages of short-circuit failure mode, double-sided heat dissipation, and low thermal resistance, press-pack insulated gate bipolar transistors (PP-IGBTs) are widely used in high-power-density applications, such as high-voltage direct ...
Renkuan Liu   +8 more
doaj   +1 more source

Generalized self-testing and the security of the 6-state protocol

open access: yes, 2010
Self-tested quantum information processing provides a means for doing useful information processing with untrusted quantum apparatus. Previous work was limited to performing computations and protocols in real Hilbert spaces, which is not a serious ...
C.H. Bennett   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy