Journal articles on the topic 'Collective Security. eng'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Collective Security. eng.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Türsan, Huri. "La sécurité collective : chimère, éphémère ou mutante ?" Res Publica 36, no. 1 (1994): 67–84. http://dx.doi.org/10.21825/rp.v36i1.18754.
Full textSnyman, Dirk, and Hennie Kruger. "The application of behavioural thresholds to analyse collective behaviour in information security." Information & Computer Security 25, no. 2 (2017): 152–64. http://dx.doi.org/10.1108/ics-03-2017-0015.
Full textCîrdei, Ionuţ Alin. "The End of Oil and Its Impact on National and Collective Security." Land Forces Academy Review 25, no. 1 (2020): 1–7. http://dx.doi.org/10.2478/raft-2020-0001.
Full textBrigden, Cathy. "Unions and Collective Bargaining in 2009." Journal of Industrial Relations 52, no. 3 (2010): 321–34. http://dx.doi.org/10.1177/0022185610365634.
Full textFroelicher, David, Patricia Egger, João Sá Sousa, et al. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.
Full textCanca, Hakan Selim. "Defeating terrorism, piracy and armed robbery against ships in a collective maritime security system." International Journal of Human Sciences./ Uluslararası İnsan Bilimleri Dergisi 11, no. 1 (2014): 1282–300. http://dx.doi.org/10.14687/ijhs.v11i1.2951.
Full textBraeken, An, Pardeep Kumar, and Andrew Martin. "Efficient and Privacy-Preserving Data Aggregation and Dynamic Billing in Smart Grid Metering Networks." Energies 11, no. 8 (2018): 2085. http://dx.doi.org/10.3390/en11082085.
Full textMitchener-Nissen, Timothy. "Failure to collectively assess security surveillance technologies will inevitably lead to an absolute surveillance society." Surveillance & Society 12, no. 1 (2013): 73–88. http://dx.doi.org/10.24908/ss.v12i1.4364.
Full textMoner, Ramon Alos. "Employment regulation in collective bargaining in Spain." Transfer: European Review of Labour and Research 7, no. 4 (2001): 674–81. http://dx.doi.org/10.1177/102425890100700410.
Full textFlynn, Gregory, and Henry Farrell. "Piecing Together the Democratic Peace: The CSCE, Norms, and the “Construction” of Security in Post–Cold War Europe." International Organization 53, no. 3 (1999): 505–35. http://dx.doi.org/10.1162/002081899550977.
Full textKoloveas, Paris, Thanasis Chantzios, Sofia Alevizopoulou, Spiros Skiadopoulos , and Christos Tryfonopoulos . "inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence." Electronics 10, no. 7 (2021): 818. http://dx.doi.org/10.3390/electronics10070818.
Full textPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (2021): 1396. http://dx.doi.org/10.3390/app11041396.
Full textChen, Zihao. "The Failure of Collective Security in the Far East——Take the Japanese Invasion of Northeast as an Example." Lifelong Education 9, no. 4 (2020): 133. http://dx.doi.org/10.18282/le.v9i4.938.
Full textMuthusenthil, Balaubramanian, and Hyunsung Kim. "SHRP - Secure Hybrid Routing Protocol over Hierarchical Wireless Sensor Networks." International Journal of Computers Communications & Control 12, no. 6 (2017): 854. http://dx.doi.org/10.15837/ijccc.2017.6.2909.
Full textSchlesinger, Arthur M. "America and the World: Isolationism Resurgent?" Ethics & International Affairs 10 (March 1996): 149–63. http://dx.doi.org/10.1111/j.1747-7093.1996.tb00008.x.
Full textBerzan, Aleksander Aleksandrovich, and Svetlana Anatolievna Miklava. "Creation of an end-to-end customs control system as an economic security tool." SHS Web of Conferences 118 (2021): 03008. http://dx.doi.org/10.1051/shsconf/202111803008.
Full textKAJETANOWICZ, Jerzy. "POLISH SECURITY STRATEGIES IN THE LATTER HALF OF THE TWENTIETH CENTURY." Scientific Journal of the Military University of Land Forces 161, no. 3 (2011): 238–48. http://dx.doi.org/10.5604/01.3001.0002.3078.
Full textHarshadeep, Nagaraja Rao, and William Young. "Disruptive Technologies for Improving Water Security in Large River Basins." Water 12, no. 10 (2020): 2783. http://dx.doi.org/10.3390/w12102783.
Full textFreymond, Jean. "Neutrality and Security Policy as Components of the Swiss Model." Government and Opposition 23, no. 1 (1988): 51–68. http://dx.doi.org/10.1017/s0017257x00017000.
Full textSingh, Arun Kumar. "Human Security in Nepali Perspective." Journal of APF Command and Staff College 2, no. 1 (2019): 60–66. http://dx.doi.org/10.3126/japfcsc.v2i1.26732.
Full textLi, Yunfa, Yifei Tu, and Jiawa Lu. "Multi-Point Collaborative Authentication Method Based on User Image Intelligent Collection in the Internet of Things." Electronics 8, no. 9 (2019): 978. http://dx.doi.org/10.3390/electronics8090978.
Full textHristov, Jasmin. "Pro-Capitalist Violence and the Great Wave of Dispossession." Sociology of Development 7, no. 2 (2021): 129–58. http://dx.doi.org/10.1525/sod.2021.7.2.129.
Full textYi, Sohoon, and Jennifer Jihye Chun. "Building worker power for day laborers in South Korea’s construction industry." International Journal of Comparative Sociology 61, no. 2-3 (2019): 122–40. http://dx.doi.org/10.1177/0020715219889383.
Full textHinrichs, Karl. "Elephants on the move. Patterns of public pension reform in OECD countries." European Review 8, no. 3 (2000): 353–78. http://dx.doi.org/10.1017/s1062798700004956.
Full textHossain, Kamrul, Gerald Zojer, Wilfrid Greaves, J. Miguel Roncero, and Michael Sheehan. "Constructing Arctic security: an inter-disciplinary approach to understanding security in the Barents region." Polar Record 53, no. 1 (2016): 52–66. http://dx.doi.org/10.1017/s0032247416000693.
Full textHECZKO, Martina, and Josef SMOLÍK. "JAPANESE STRATEGIC DOCUMENTS: CONTENT ANALYSIS OF THE NATIONAL DEFENSE PROGRAM GUIDELINES." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 30, no. 30 (2018): 102–24. http://dx.doi.org/10.5604/01.3001.0012.5886.
Full textRathbone, Meredith, and Pete Jeydel. "United Nations Security Council Resolutions 2321, 2371, & 2375." International Legal Materials 56, no. 6 (2017): 1176–208. http://dx.doi.org/10.1017/ilm.2017.40.
Full textMaffly-Kipp, Joseph, Patricia Flanagan, Jinhyung Kim, Rebecca J. Schlegel, Matthew Vess, and Joshua A. Hicks. "The Role of Perceived Authenticity in Psychological Recovery from Collective Trauma." Journal of Social and Clinical Psychology 39, no. 5 (2020): 419–48. http://dx.doi.org/10.1521/jscp.2020.39.5.419.
Full textGupta, Akash Kumar, Chinmay Chakraborty, and Bharat Gupta. "Secure Transmission of EEG Data Using Watermarking Algorithm for the Detection of Epileptical Seizures." Traitement du Signal 38, no. 2 (2021): 473–79. http://dx.doi.org/10.18280/ts.380227.
Full textBlix, Hans. "un Security Council vs. Weapons of Mass Destruction." Nordic Journal of International Law 85, no. 2 (2016): 147–61. http://dx.doi.org/10.1163/15718107-08502003.
Full textWhyte, Christopher. "Crossing the Digital Divide: Monism, Dualism and the Reason Collective Action is Critical for Cyber Theory Production." Politics and Governance 6, no. 2 (2018): 73–82. http://dx.doi.org/10.17645/pag.v6i2.1338.
Full textDubnov, Arie M. "On Vertical Alliances, ‘Perfidious Albion’ and the Security Paradigm." European Judaism 52, no. 1 (2019): 67–110. http://dx.doi.org/10.3167/ej.2019.520112.
Full textLYNCH, ALLEN. "Woodrow Wilson and the principle of ‘national self-determination’: a reconsideration." Review of International Studies 28, no. 2 (2002): 419–36. http://dx.doi.org/10.1017/s0260210502004199.
Full textBarros, Alex, Paulo Resque, João Almeida, et al. "Data Improvement Model Based on ECG Biometric for User Authentication and Identification." Sensors 20, no. 10 (2020): 2920. http://dx.doi.org/10.3390/s20102920.
Full textKaryadi, Lalu Wiresapta. "The Existence and Role of Indigenous Food Institution on Strengthening Foods Security of Rural Community." International Journal Papier Public Review 2, no. 1 (2021): 54–66. http://dx.doi.org/10.47667/ijppr.v2i1.73.
Full textEstrada-Galiñanes, Vero, and Katarzyna Wac. "Collecting, exploring and sharing personal data: Why, how and where." Data Science 3, no. 2 (2020): 79–106. http://dx.doi.org/10.3233/ds-190025.
Full textGuzmán Fernández, Karla, Ana I. Moreno-Calles, Alejandro Casas, and José Blancas. "Contributions of Urban Collective Gardens to Local Sustainability in Mexico City." Sustainability 12, no. 18 (2020): 7562. http://dx.doi.org/10.3390/su12187562.
Full textMendoza, Florina, Lucía Alonso, Andrés López, and Daniel and Patricia Arias Cabarcos. "Assessment of Fitness Tracker Security: A Case of Study." Proceedings 2, no. 19 (2018): 1235. http://dx.doi.org/10.3390/proceedings2191235.
Full textFigueroa Lorenzo, Santiago, Javier Añorga Benito, Pablo García Cardarelli, Jon Alberdi Garaia, and Saioa Arrizabalaga Juaristi. "A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis." Technologies 7, no. 1 (2019): 15. http://dx.doi.org/10.3390/technologies7010015.
Full textPapadopoulos, Pavlos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, and Sokratis Katsikas. "Privacy-Preserving Passive DNS." Computers 9, no. 3 (2020): 64. http://dx.doi.org/10.3390/computers9030064.
Full textRecchia, Stefano. "Overcoming Opposition at the UNSC: Regional Multilateralism as a Form of Collective Pressure." Journal of Global Security Studies 5, no. 2 (2020): 265–81. http://dx.doi.org/10.1093/jogss/ogaa013.
Full textHAFTARCZYK, Karolina. "SECRET SERVICE AS PART OF NATIONAL SECURITY." Scientific Journal of the Military University of Land Forces 161, no. 3 (2011): 194–203. http://dx.doi.org/10.5604/01.3001.0002.3063.
Full textDewani, Amirita, Pirah Memon, Veena Kumari, Anum Arain, Ayaz Jiskani, and Sania Bhatti. "Keyless Smart Home: An application of Home Security and Automation." Oriental journal of computer science and technology 11, no. 2 (2018): 107–14. http://dx.doi.org/10.13005/ojcst11.02.06.
Full textCameron, James E., Lucie Kocum, and John W. Berry. "Security and attitudes toward globalization: A multilevel analysis." Journal of Social and Political Psychology 8, no. 2 (2020): 805–22. http://dx.doi.org/10.5964/jspp.v8i2.418.
Full textANTONOPOULOS, CONSTANTINE. "Some Thoughts on the NATO Position in Relation to the Iraqi Crisis." Leiden Journal of International Law 17, no. 1 (2004): 171–83. http://dx.doi.org/10.1017/s0922156504001669.
Full textMare, Shrirang, Franziska Roesner, and Tadayoshi Kohno. "Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 436–58. http://dx.doi.org/10.2478/popets-2020-0035.
Full textRENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, no. 01 (2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.
Full textThompson, Sue. "The Evolution of Southeast Asian Regionalism: Security, Economic Development and Foreign Power Support for Regional Initiatives, 1947-77." JAS (Journal of ASEAN Studies) 5, no. 1 (2017): 1. http://dx.doi.org/10.21512/jas.v5i1.4160.
Full textSchachter, Oscar. "United Nations Law in the Gulf Conflict." American Journal of International Law 85, no. 3 (1991): 452–73. http://dx.doi.org/10.2307/2203107.
Full textAlvarellos, Alberto, Marcos Gestal, Julián Dorado, and Juan Ramón Rabuñal. "Developing a Secure Low-Cost Radon Monitoring System." Sensors 20, no. 3 (2020): 752. http://dx.doi.org/10.3390/s20030752.
Full text