Academic literature on the topic 'Cooperative security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cooperative security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cooperative security"

1

Cohen, Richard. "European Defense: Spreading Cooperative Security." Connections: The Quarterly Journal 1, no. 1 (2002): 14–21. http://dx.doi.org/10.11610/connections.01.1.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mihalka, Michael. "Cooperative Security in the 21st Century." Connections: The Quarterly Journal 04, no. 4 (2005): 113–22. http://dx.doi.org/10.11610/connections.04.4.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

KHAFIZOV, D. F. "PROBLEMS OF AGRICULTURAL COOPERATION IN RUSSIA." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4, no. 12 (2020): 63–67. http://dx.doi.org/10.36871/ek.up.p.r.2020.12.04.009.

Full text
Abstract:
The article discusses the theoretical and practical aspects of the development of agricultural cooperation in Russia, based on the analysis of the activities of cooperatives, the role of the cooperative structure in ensuring the food security of the country is substantiated, recommendations are given for improving the formation and organization of the activities of agricultural cooperatives, measures for state support of the cooperative movement in the countryside.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Li, Mei Song, Jacob Xin Ma, and Lie-Liang Yang. "Security-oriented cooperation scheme in wireless cooperative networks." IET Communications 8, no. 8 (May 22, 2014): 1265–73. http://dx.doi.org/10.1049/iet-com.2013.0365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tang, Zhipeng, Anfeng Liu, Zhetao Li, Young-june Choi, Hiroo Sekiya, and Jie Li. "A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing." Mobile Information Systems 2016 (2016): 1–22. http://dx.doi.org/10.1155/2016/9083608.

Full text
Abstract:
VCC is a computing paradigm which consists of vehicles cooperating with each other to realize a lot of practical applications, such as delivering packages. Security cooperation is a fundamental research topic in Vehicular Cloud Computing (VCC). Because of the existence of malicious vehicles, the security cooperation has become a challenging issue in VCC. In this paper, a trust-based model for security cooperating, named DBTEC, is proposed to promote vehicles’ security cooperation in VCC. DBTEC combines the indirect trust estimation in Public board and the direct trust estimation in Private board to compute the trust value of vehicles when choosing cooperative partners; a trustworthy cooperation path generating scheme is proposed to ensure the safety of cooperation and increase the cooperation completion rates in VCC. Extensive experiments show that our scheme improves the overall cooperation completion rates by 6~7%.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaurova, O. V., A. N. Maloletko, and A. V. Tkach. "Consumer Cooperation in the Formation of Regional Food Resources." Economy of agricultural and processing enterprises, no. 1 (January 2021): 54–59. http://dx.doi.org/10.31442/0235-2494-2021-0-1-54-59.

Full text
Abstract:
The main area of activity of consumer cooperatives is rural areas, where, in cooperation with regional authorities, it solves the problems of forming food resources. Providing the population with food is one of the main tasks of consumer cooperation in the sphere of national security of the state. Consumer societies participate in the formation of the regional market of agri-food products, acting as an integral part of the infrastructure of the regional economy. The volume of purchases of agri-food products by the consumer cooperative is a reliable indicator of the relationship with agricultural producers. In the system of purchasing agricultural products, an important place is occupied by the cooperative store, acting as an Outpost of consumer cooperation. Procurement points of consumer cooperation play a significant role in the development of the regional economy and the formation of food resources. In the regions of Russia, the Centrosoyuz consumer cooperative has its own material and technical resources, a system for harvesting agricultural products, and a network of wholesale and retail trade. Consumer cooperation is a reliable channel for selling agricultural products of small businesses through distribution points and cooperative stores. The activity of consumer cooperatives in the food supply system of the regions fully fits into the solution of the tasks formulated in the Russian food security Doctrine. Consumer cooperation is of particular importance for the development of private subsidiary and peasant (farm) farms. Consumer cooperatives buy agricultural products and raw materials; sell compound feed, fertilizers, varietal seeds of agricultural crops, etc. to the rural population. Procurement organizations of consumer cooperatives (receiving points and cooperative stores) they have extensive experience in purchasing agricultural products from agricultural producers, thus ensuring that small agricultural businesses sell their products, including through retail regional markets, through which 48% of the volume of potatoes, 44% of fruit and vegetable products, almost 40% of meat and poultry, and 20% of eggs are sold.
APA, Harvard, Vancouver, ISO, and other styles
7

Shin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality." Journal of International Politics 15, no. 1 (March 31, 2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Lu, Jianli Luo, and Yuxia Liu. "Agricultural cooperatives participating in vegetable supply chain integration: A case study of a trinity cooperative in China." PLOS ONE 16, no. 6 (June 24, 2021): e0253668. http://dx.doi.org/10.1371/journal.pone.0253668.

Full text
Abstract:
Supply chain integration plays an important role in the development of the vegetable industry in terms of vegetable quality, vegetable safety, and vegetable security in rural China. This paper explores how agricultural cooperatives integrate the vegetable supply chain by taking a trinity cooperative as an example in China. It explains the translation concatenation of supply chain integration for this cooperative by constructing actor networks in four development stages, including the seed stage, start-up stage, development stage, and mature stage. The findings show that supply chain integration in production cooperation, supply & sales cooperation, and credit cooperation is a useful trinity cooperative model of supply chain integration for investigating vegetable supply chain integration through internal integration and external integration. This paper suggests that cooperatives in the vegetable supply chain should facilitate close coordination among different shareholders and further improve the efficiency of supply chain integration. The government should provide training opportunities and funding to encourage cooperatives to participate in supply chain integration within the vegetable industry.
APA, Harvard, Vancouver, ISO, and other styles
9

Ezrokh, Yurij. "Credit Cooperation in Russia: Accumulated Problems and Their Solutions." Moscow University Economics Bulletin 2018, no. 1 (February 28, 2018): 82–104. http://dx.doi.org/10.38050/01300105201815.

Full text
Abstract:
The subject of the study is the financial and economic activities of the subjects of domestic credit cooperation at the present stage. The purpose of the work is to determine the contradictions in the functioning of credit consumer cooperatives (at the micro and macro levels) and to develop practical measures to resolve them. The article singles out seven main groups of problems an unbalanced structure of the rights and obligations of the shareholders of credit cooperatives, low degree of state regulation of the credit cooperative market, instability in the subject composition of the credit cooperative market, low degree of security of the invested funds in credit cooperatives, ultra-low openness of financial statistics of credit cooperation, low transparency of the conditions for the provision of financial services by credit 83 cooperatives, insufficient attention to strategic planning and conducting scientific and practical consultations.
APA, Harvard, Vancouver, ISO, and other styles
10

KATSUMATA, HIRO. "Mimetic adoption and norm diffusion: ‘Western’ security cooperation in Southeast Asia?" Review of International Studies 37, no. 2 (September 2, 2010): 557–76. http://dx.doi.org/10.1017/s0260210510000872.

Full text
Abstract:
AbstractThe members of the Association of Southeast Asian Nations (ASEAN) have been pursuing new cooperative security agendas – namely, confidence-building measures (CBMs), preventive diplomacy (PD), conflict resolution and a set of agendas associated with security communities. The ASEAN members' pursuit of these agendas should be seen as a set of instances of their mimetic adoption of external norms for the sake of legitimacy. They have mimetically been adopting a set of norms associated with the collective management of conflicts, which have been practiced by the participant states of the Organisation for Security and Cooperation in Europe (OSCE). They have been doing so, with the intention of securing their identities as legitimate members of the community of modern states, and of enhancing the status of ASEAN and the ASEAN Regional Forum (ARF) as legitimate cooperative security institutions.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cooperative security"

1

Tate, Samuel L. "Toward multilateral cooperative security in Northeast Asia." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alotaibi, Esa. "Physical layer security in cooperative wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).html.

Full text
Abstract:
Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, new mathematical models were developed for the analysis of secrecy capacity and outage probability in different scenarios, following which new optimisation problems were formulated and new algorithms devised to solve those problems. The process began by analysing secrecy performance for various cooperative communication scenarios in the presence of single and multiple eavesdropper(s). A multicast cooperative system was also analysed, based on distributed Alamouti space-time coding. Furthermore, the secrecy performance of a relay selection scheme was analysed in an independent but non-identically distributed (i.n.i.d) Rayleigh fading scenario. The second part of the thesis concentrated on optimisation methods for cooperative relaying and jamming techniques. For a dual-hop system, a joint cooperative beamforming and jamming scheme was created, considering both a perfect and an imperfect eavesdropper's channel state information (CSI). Optimal solutions to degrade the eavesdropper's interception by minimising its received signal to interference and noise ratio (SINR) were also presented whilst ensuring the legitimate receiver's SINR requirement. For the multi-hop scenario, the secrecy rate, with and without transmitting artificial noise, was considered for maximisation, and an optimal power splitting solution under limited power constraints at the transmitters was also proposed. In addition, an iterative solution for the joint optimisation of transmit power and power splitting coefficient at each transmitter was posited. The analyses and optimisation algorithms developed provide new insights into secrecy performance and optimal transmission schemes in various practical scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Swahn, Joakim, and Christian Udin. "Cooperative Vehicle-Infrastructure System : Identification, Privacy and Security." Thesis, Linköping University, Department of Science and Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9399.

Full text
Abstract:

This master thesis is to highlight the importance of what needs to be identified in the CVIS system, how this could be done, how different techniques affect privacy and security and how the privacy and security mechanisms can be improved for the whole system. The report starts with a background of ERTICO – ITS Europe, followed by a description of how the CVIS project is organized, how the CVIS system will work, and a presentation of privacy, security and identification, both in general and in CVIS. After this follows the analysis and the report is finally wrapped up with conclusions and recommendations.

Why this is an important topic to highlight and discuss and the reason being for this master thesis, is because there is a clear need within the CVIS consortium to harmonise these topics. As it is today, different persons and different sub-projects have different views and opinions on what needs to be identified for example. This needs to be harmonised in order for everyone to know what is being developed, but also, and much more importantly, to in the end get acceptance for the CVIS system. If people do not feel they can trust the system, if they feel it is not secure or that it violates their privacy, they will not use it, even if it has been proved the technique works.

The key question discussed in the report is what needs to be identified. This is the most important question to solve. There must be very good reasons and consensus why a certain entity is to be identified, otherwise identification of that entity will always be questioned. This also links very tightly with privacy.

The objective of this master thesis is to bring forward this critical question about identification, to highlight different reasons for identifying or not identifying different entities and to get the discussion started.

Finally, the main conclusions and recommendations on what to actually identify is the vehicle and the different parts in the central sub-system. The best technique would be by using single sign on with a very strong encryption, for example random numbers, that will be handle by a new node Identification Management Centre or that it will be a part of the Host Management Centre. To ensure privacy in the system, the single sign on mechanism should be combined with the approach of using pseudonyms when communicating in the CVIS system.

APA, Harvard, Vancouver, ISO, and other styles
4

Maarof, M. A. B. "Integrating security services into computer supported cooperative work." Thesis, Aston University, 2000. http://publications.aston.ac.uk/7989/.

Full text
Abstract:
This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.
APA, Harvard, Vancouver, ISO, and other styles
5

Landau, Ethan. "Cooperative Security: The American Strategy for a Rising China." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/815.

Full text
Abstract:
This paper analyzes the theoretical underpinnings and strategic goals of US security strategy with respect to China. It argues that the language used in statements and publications of US strategy demonstrate the development of a strategy of cooperative security. This strategy is dependent on the security environment the United States cultivates with allies and partners in the region. The paper uses evidence from the two largest PACOM military operations--RIMPAC and Cobra Gold-to demonstrate this developing strategy.
APA, Harvard, Vancouver, ISO, and other styles
6

Ranito, Jovana Jezdimirovic. "Limitations to post-conflict cooperative security : Kosovo 1999-2009." Master's thesis, FEUC, 2009. http://hdl.handle.net/10316/11532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kassenova, Togzhan O. "Cooperative security in the post-Cold War international system : the cooperative threat reduction (CTR) process." Thesis, University of Leeds, 2004. http://etheses.whiterose.ac.uk/2656/.

Full text
Abstract:
The thesis explores cooperative security efforts between the United States and Russia in the framework of the Cooperative Threat Reduction (CTR) Programme and other non-proliferation programmes, which were established in the aftermath of the Soviet collapse as a response to nuclear proliferation threats in the former Soviet Union. One of the main objectives of CTR is to reduce nuclear dangers associated with vast nuclear arsenals, which first and foremost, means reductions in nuclear weapons. This work presents an overview of different proliferation threats ranging from proliferation of nuclear material to potential ““brain-drain”” from the former Soviet nuclear complex, explains their technical and socio-economic aspects and assesses the effectiveness of the U.S.-Russian programmes, which deal with these threats. The CTR process has encountered some major obstacles on its way. The research suggests that some important problems in the implementation of CTR programmes are of bureaucratic nature. However, bureaucratic factors are aggravated by the political factors stemming from the fact that the national security policies of the U.S. and Russia are still in part based on concepts and strategies adopted during the Cold War. This is especially evident with regard to the role assigned to nuclear weapons by both countries. Therefore, the CTR process is used as a laboratory study of the U.S.-Russian strategic relations in the post-Cold War era. The study demonstrates that the processes happening in the international security system below the surface and which might not be so obvious at a glance can be absolutely important for the future of the international system. The CTR process represents a mechanism, which can be used to build a new international system, where the role of the nuclear weapons becomes more and more obsolete.
APA, Harvard, Vancouver, ISO, and other styles
8

O'Quinn, Caitlin. "Negotiating Security: Gender, Economics and Cooperative Institutions in Costa Rica." Thesis, University of Oregon, 2018. http://hdl.handle.net/1794/23705.

Full text
Abstract:
Costa Rica is heralded as a leader in social and environmental issues and an example of a successful development story. However, how does this singular narrative minimize the more complex lived experiences of people? I introduce nuances to the story of Costa Rica by centering the lived experiences of women, drawing on primary data from questionnaires and interviews, and situating my research within the long history of cooperatives in Costa Rica, to learn more about issues women face and opportunities these institutions may offer. When looking through the lens of everyday experiences, we see that despite the significant progress in creating a safe country for all, women still experience inequality, discrimination, and violence. My hope is by including women’s voices, we move beyond the “single story” toward a more nuanced understanding of multilayered lives of Costa Rican women and an appreciation for the opportunities they seek and create.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Weigang. "Enhancing physical layer security in wireless networks with cooperative approaches." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/19565.

Full text
Abstract:
Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement due to the application of the FFR is limited by the capacity of the legitimate channel.
APA, Harvard, Vancouver, ISO, and other styles
10

Finocchio, Chris James. "Latin American regional cooperative security : civil-military relations and economic interdependence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFinocchio.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Jeanne K. Giraldo, Harold A. Trinkunas. Includes bibliographical references (p. 67-71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cooperative security"

1

Katsumata, Hiro. ASEAN’s Cooperative Security Enterprise. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1927-, Perry William James, and Steinbruner John D. 1941-, eds. A new concept of cooperative security. Washington, D.C: Brookings Institute, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institute for Defence Studies and Analyses, ed. Cooperative security framework for South Asia. New Delhi: Published by Pentagon Press in association with Institute for Defence Studies and Analyses, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dipankar, Banerjee. Security in South Asia: Comprehensive and cooperative. New Delhi: Manas Publications, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Millett, Richard L. Reshaping cooperative security among Central American states. [Washington, D.C.?]: Institute for National Strategic Studies, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hamlett, Cathy A. Dairy farmers' valuation of cooperative market security. Washington, D.C: U.S. Dept. of Agriculture, Agricultural Cooperative Service, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Paul, Joshy M. Emerging powers and cooperative security in Asia. Singapore: S. Rajaratnam School of International Studies, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zou, Yulong, and Jia Zhu. Physical-Layer Security for Cooperative Relay Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Li. Physical Layer Security in Wireless Cooperative Networks. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-61863-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Acharya, Amitav. Reordering Asia: "cooperative security" or concert of powers? Singapore: Nanyang Technological University, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cooperative security"

1

Xie, Hongxia, and Fanrong Meng. "OGSA Security Authentication Services." In Grid and Cooperative Computing, 996–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wagner, Gerd. "Multi-level security in multiagent systems." In Cooperative Information Agents, 272–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-62591-7_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Katsumata, Hiro. "ASEAN in the ARF." In ASEAN’s Cooperative Security Enterprise, 77–97. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Katsumata, Hiro. "China." In ASEAN’s Cooperative Security Enterprise, 101–18. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Katsumata, Hiro. "The United States." In ASEAN’s Cooperative Security Enterprise, 119–37. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Katsumata, Hiro. "Australia." In ASEAN’s Cooperative Security Enterprise, 138–58. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Katsumata, Hiro. "East Asia and the Asia-Pacific." In ASEAN’s Cooperative Security Enterprise, 161–73. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Katsumata, Hiro. "Introduction." In ASEAN’s Cooperative Security Enterprise, 3–15. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Katsumata, Hiro. "The Significance of the ASEAN Regional Forum (ARF)." In ASEAN’s Cooperative Security Enterprise, 16–34. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Katsumata, Hiro. "The Conventional Explanation for the Establishment of the ARF." In ASEAN’s Cooperative Security Enterprise, 37–48. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230277038_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cooperative security"

1

Blanchard, Tiffany A., William J. Abramson, James W. J. R. Russell, and Catherine K. Roberts. "The Global Threat Reduction Initiative’s Radiological Security Cooperation With Russia." In ASME 2011 14th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2011. http://dx.doi.org/10.1115/icem2011-59361.

Full text
Abstract:
The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration’s (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI’s approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI’s accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material.
APA, Harvard, Vancouver, ISO, and other styles
2

Han-Ting Chiang and James S. Lehnert. "Optimal cooperative jamming for security." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Coulouris, George, and Jean Dollimore. "Security requirements for cooperative work." In the 6th workshop. New York, New York, USA: ACM Press, 1994. http://dx.doi.org/10.1145/504390.504439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohite, Vaishali, and Lata Ragha. "Cooperative Security Agents for MANET." In 2012 World Congress on Information and Communication Technologies (WICT). IEEE, 2012. http://dx.doi.org/10.1109/wict.2012.6409138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McCubbin, Christopher B., Christine D. Piatko, Adam V. Peterson, Creighton R. Donnald, and David Cohen. "Cooperative organic mine avoidance path planning." In Defense and Security, edited by Russell S. Harmon, J. Thomas Broach, and John H. Holloway, Jr. SPIE, 2005. http://dx.doi.org/10.1117/12.602815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kabir, Hammad, Raimo Kantola, and Jesus Llorente Santos. "Security Mechanisms for a Cooperative Firewall." In 2014 IEEE International Conference on High Performance Computing and Communications (HPCC), 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS) and 2014 IEEE 11th International Conference on Embedded Software and Systems (ICESS). IEEE, 2014. http://dx.doi.org/10.1109/hpcc.2014.135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garcia Morchon, Oscar, Heribert Baldus, Tobias Heer, and Klaus Wehrle. "Cooperative security in distributed sensor networks." In 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007). IEEE, 2007. http://dx.doi.org/10.1109/colcom.2007.4553817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sedjelmaci, Hichem, Fateh Guenab, Aymen Boudguiga, and Yohann Petiot. "Cooperative Security Framework for CBTC Network." In 2018 IEEE International Conference on Communications (ICC 2018). IEEE, 2018. http://dx.doi.org/10.1109/icc.2018.8422763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Dan, Genshe Chen, Jose B. Cruz, Jr., Khanh Pham, Erik Blasch, and Robert Lynch. "Cooperative controls with intermittent communication." In SPIE Defense, Security, and Sensing, edited by Joseph L. Cox, Manfred G. Bester, and Wolfgang Fink. SPIE, 2010. http://dx.doi.org/10.1117/12.849786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Soule, Terence, and Robert B. Heckendorn. "Evolutionary optimization of cooperative heterogeneous teams." In Defense and Security Symposium, edited by Misty Blowers and Alex F. Sisti. SPIE, 2007. http://dx.doi.org/10.1117/12.724018.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cooperative security"

1

Langley, Michael E. Emboldened Cooperative Security: Globalization and 21st Century U.S. Security. Fort Belvoir, VA: Defense Technical Information Center, March 2007. http://dx.doi.org/10.21236/ada469011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pregenzer, A. L., M. Vannoni, and K. L. Biringer. Cooperative monitoring of regional security agreements. Office of Scientific and Technical Information (OSTI), November 1996. http://dx.doi.org/10.2172/414330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Millett, Richard L. Reshaping Cooperative Security Among Central American States. Fort Belvoir, VA: Defense Technical Information Center, January 1995. http://dx.doi.org/10.21236/ada385757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), May 1995. http://dx.doi.org/10.2172/79720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cohen, Richard, and Michael Mihalka. Cooperative Security: New Horizons for International Order. Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada478855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Netzer, Colonel Gideon. Cooperative Monitoring Center Occasional Paper/7: A Generic Model for Cooperative Border Security. Office of Scientific and Technical Information (OSTI), March 1999. http://dx.doi.org/10.2172/6982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Biringer, K., J. Olsen, R. Lincoln, and F. Wehling. Cooperative monitoring and its role in regional security. Office of Scientific and Technical Information (OSTI), March 1997. http://dx.doi.org/10.2172/465860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qojas, M. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options. Office of Scientific and Technical Information (OSTI), March 1999. http://dx.doi.org/10.2172/6122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography