Journal articles on the topic 'Cooperative security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cooperative security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cohen, Richard. "European Defense: Spreading Cooperative Security." Connections: The Quarterly Journal 1, no. 1 (2002): 14–21. http://dx.doi.org/10.11610/connections.01.1.03.
Full textMihalka, Michael. "Cooperative Security in the 21st Century." Connections: The Quarterly Journal 04, no. 4 (2005): 113–22. http://dx.doi.org/10.11610/connections.04.4.10.
Full textKHAFIZOV, D. F. "PROBLEMS OF AGRICULTURAL COOPERATION IN RUSSIA." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4, no. 12 (2020): 63–67. http://dx.doi.org/10.36871/ek.up.p.r.2020.12.04.009.
Full textWang, Li, Mei Song, Jacob Xin Ma, and Lie-Liang Yang. "Security-oriented cooperation scheme in wireless cooperative networks." IET Communications 8, no. 8 (May 22, 2014): 1265–73. http://dx.doi.org/10.1049/iet-com.2013.0365.
Full textTang, Zhipeng, Anfeng Liu, Zhetao Li, Young-june Choi, Hiroo Sekiya, and Jie Li. "A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing." Mobile Information Systems 2016 (2016): 1–22. http://dx.doi.org/10.1155/2016/9083608.
Full textKaurova, O. V., A. N. Maloletko, and A. V. Tkach. "Consumer Cooperation in the Formation of Regional Food Resources." Economy of agricultural and processing enterprises, no. 1 (January 2021): 54–59. http://dx.doi.org/10.31442/0235-2494-2021-0-1-54-59.
Full textShin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality." Journal of International Politics 15, no. 1 (March 31, 2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.
Full textWang, Lu, Jianli Luo, and Yuxia Liu. "Agricultural cooperatives participating in vegetable supply chain integration: A case study of a trinity cooperative in China." PLOS ONE 16, no. 6 (June 24, 2021): e0253668. http://dx.doi.org/10.1371/journal.pone.0253668.
Full textEzrokh, Yurij. "Credit Cooperation in Russia: Accumulated Problems and Their Solutions." Moscow University Economics Bulletin 2018, no. 1 (February 28, 2018): 82–104. http://dx.doi.org/10.38050/01300105201815.
Full textKATSUMATA, HIRO. "Mimetic adoption and norm diffusion: ‘Western’ security cooperation in Southeast Asia?" Review of International Studies 37, no. 2 (September 2, 2010): 557–76. http://dx.doi.org/10.1017/s0260210510000872.
Full textZonouz, Saman, and Parisa Haghani. "Approximate Core Allocation for Large Cooperative Security Games." ISRN Communications and Networking 2012 (October 24, 2012): 1–8. http://dx.doi.org/10.5402/2012/913294.
Full textNdlovu, Confidence, and Mfundo M. Masuku. "The Efficacy of Agricultural Cooperatives Towards Enhancing Food Security in Rural Areas: Mbombela Local Municipality, Mpumalanga Province." Technium Social Sciences Journal 21 (July 9, 2021): 661–74. http://dx.doi.org/10.47577/tssj.v21i1.3786.
Full textEvans, Gareth. "Cooperative Security and Intrastate Conflict." Foreign Policy, no. 96 (1994): 3. http://dx.doi.org/10.2307/1149213.
Full textZagoria, Donald S., and R. Mark Bean. "Cooperative Security in Northeast Asia." Foreign Affairs 69, no. 5 (1990): 206. http://dx.doi.org/10.2307/20044679.
Full textDewitt, David. "Common, comprehensive, and cooperative security." Pacific Review 7, no. 1 (January 1994): 1–15. http://dx.doi.org/10.1080/09512749408719067.
Full textSteinbruner, John D. "The Prospect of Cooperative Security." Brookings Review 7, no. 1 (1988): 53. http://dx.doi.org/10.2307/20080079.
Full textEvans, Paul. "Searching for Cooperative Security 2.0." China Quarterly of International Strategic Studies 01, no. 04 (December 2015): 537–51. http://dx.doi.org/10.1142/s237774001550030x.
Full textGuoliang, Gu. "Redefine cooperative security, not preemption." Washington Quarterly 26, no. 2 (March 2003): 135–45. http://dx.doi.org/10.1162/01636600360569748.
Full textZagorski, Andrei. "The OSCE and Cooperative Security." Security and Human Rights 21, no. 1 (2010): 58–63. http://dx.doi.org/10.1163/187502310791305963.
Full textZellner, Wolfgang. "Cooperative Security — principle and reality." Security and Human Rights 21, no. 1 (2010): 64–68. http://dx.doi.org/10.1163/187502310791305981.
Full textGarcia-Morchon, Oscar, Dmitriy Kuptsov, Andrei Gurtov, and Klaus Wehrle. "Cooperative security in distributed networks." Computer Communications 36, no. 12 (July 2013): 1284–97. http://dx.doi.org/10.1016/j.comcom.2013.04.007.
Full textFeng, Nan, and Chundong Zheng. "A Cooperative Model for IS Security Risk Management in Distributed Environment." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/167497.
Full textBrosig, Malte, and Dimpho Motsamai. "Modeling Cooperative Peacekeeping." Journal of International Peacekeeping 18, no. 1-2 (June 9, 2014): 45–68. http://dx.doi.org/10.1163/18754112-1802002.
Full textShumeta, Zekarias, and Marijke D’Haese. "Do Coffee Farmers Benefit in Food Security from Participating in Coffee Cooperatives? Evidence from Southwest Ethiopia Coffee Cooperatives." Food and Nutrition Bulletin 39, no. 2 (April 18, 2018): 266–80. http://dx.doi.org/10.1177/0379572118765341.
Full textFan, Xin, and Yan Huo. "Cooperative secure transmission against collusive eavesdroppers in Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772093346. http://dx.doi.org/10.1177/1550147720933464.
Full textAlbin, Cecilia. "Cooperative security: reducing Third World wars." International Affairs 72, no. 2 (April 1996): 373. http://dx.doi.org/10.2307/2624381.
Full textLEATHERMAN, JANIE. "Making the Case for Cooperative Security." Cooperation and Conflict 31, no. 1 (March 1996): 105–18. http://dx.doi.org/10.1177/0010836796031001005.
Full textRegehr, Ernie. "Cooperative Security and Denuclearizing the Arctic." Journal for Peace and Nuclear Disarmament 2, no. 1 (January 2, 2019): 274–96. http://dx.doi.org/10.1080/25751654.2019.1631696.
Full textSokolov, Vadim. "National security analytical activities organizational models classification." Public administration aspects 8, no. 3 (August 27, 2020): 58–70. http://dx.doi.org/10.15421/152070.
Full textKim, Ki-Young, Sung-Won Lee, and Jong-Hyun Kim. "A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure." Journal of the Institute of Electronics Engineers of Korea 50, no. 2 (February 25, 2013): 60–69. http://dx.doi.org/10.5573/ieek.2013.50.2.060.
Full textChen, Jianchao, Liang Yang, and Mohamed-Slim Alouini. "Physical Layer Security for Cooperative NOMA Systems." IEEE Transactions on Vehicular Technology 67, no. 5 (May 2018): 4645–49. http://dx.doi.org/10.1109/tvt.2017.2789223.
Full textWang, Lifeng, Kyeong Jin Kim, Trung Q. Duong, Maged Elkashlan, and H. Vincent Poor. "Security Enhancement of Cooperative Single Carrier Systems." IEEE Transactions on Information Forensics and Security 10, no. 1 (January 2015): 90–103. http://dx.doi.org/10.1109/tifs.2014.2360437.
Full textBrostrom, Jannika. "Re-evaluating Australia's “Cooperative Security” in Cambodia." Australian Journal of Politics & History 60, no. 4 (December 2014): 549–63. http://dx.doi.org/10.1111/ajph.12075.
Full textKarsh, Efraim, and Yezid Sayigh. "A cooperative approach to Arab—Israeli security." Survival 36, no. 1 (March 1994): 114–25. http://dx.doi.org/10.1080/00396339408442727.
Full textNewman, Andrew. "Cooperative threat reduction: ‘Locking in’ tomorrow's security." Contemporary Security Policy 22, no. 1 (April 2001): 83–106. http://dx.doi.org/10.1080/13523260512331391076.
Full textPayne, Rodger A. "Cooperative Security: Grand Strategy Meets Critical Theory?" Millennium: Journal of International Studies 40, no. 3 (May 24, 2012): 605–24. http://dx.doi.org/10.1177/0305829812441733.
Full textBORAWSKI, JOHN. "The OSCE: In Search of Cooperative Security." Security Dialogue 27, no. 4 (December 1996): 401–8. http://dx.doi.org/10.1177/0967010696027004004.
Full textKing, John. "The new warfare and cooperative international security." Foresight 6, no. 4 (August 2004): 212–17. http://dx.doi.org/10.1108/14636680410554683.
Full textCruz, Tiago, Paulo Simões, Edmundo Monteiro, Fernando Bastos, and Alexandre Laranjeira. "Cooperative security management for broadband network environments." Security and Communication Networks 8, no. 18 (July 20, 2015): 3953–77. http://dx.doi.org/10.1002/sec.1313.
Full textZeweld, Woldegebrial, Guido Van Huylenbroeck, and Jeroen Buysse. "Household food security through cooperative societies in northern Ethiopia." International Journal of Development Issues 14, no. 1 (April 7, 2015): 60–72. http://dx.doi.org/10.1108/ijdi-02-2014-0014.
Full textWasilewski, Mirosław, and Marzena Ganc. "A DYNAMIC AND STATIC VIEW OF THE FINANCIAL SECURITY OF DAIRY COOPERATIVES." Annals of the Polish Association of Agricultural and Agribusiness Economists XXIII, no. 2 (April 15, 2021): 109–19. http://dx.doi.org/10.5604/01.3001.0014.8381.
Full textKirilenko, Victoria. "Corruption factor in the use of allocated funds for the development of animal husbandry." E3S Web of Conferences 273 (2021): 08019. http://dx.doi.org/10.1051/e3sconf/202127308019.
Full textPronko, Lyudmila, Irina Furman, Anatolii Kucher, and Yaroslav Gontaruk. "Formation of a State Support Program for Agricultural Producers in Ukraine Considering World Experience." European Journal of Sustainable Development 9, no. 1 (February 1, 2020): 364. http://dx.doi.org/10.14207/ejsd.2020.v9n1p364.
Full textАдамов, Насрулла, Nasrulla Adamov, Анна Морозова, Anna Morozova, Антон Морозов, Anton Morozov, Сергей Хмелев, and Sergey Khmelev. "COMPETITIVE ADVANTAGES AS A FACTOR OF ENSURING ECONOMIC SECURITY OF CONSUMER COOPERATION." Russian Journal of Management 7, no. 3 (October 29, 2019): 61–65. http://dx.doi.org/10.29039/article_5db8801ee667c3.33435070.
Full textKuus, Merje. "Toward Cooperative Security? International Integration and the Construction of Security in Estonia." Millennium: Journal of International Studies 31, no. 2 (March 2002): 297–317. http://dx.doi.org/10.1177/03058298020310020401.
Full textIkrami, Hadyu. "Sulu-Sulawesi Seas Patrol: Lessons from the Malacca Straits Patrol and Other Similar Cooperative Frameworks." International Journal of Marine and Coastal Law 33, no. 4 (November 13, 2018): 799–826. http://dx.doi.org/10.1163/15718085-12334092.
Full textIspas, Lucian, Aurelian Ratiu, and Mihai-Marcel Neag. "Post-Conflict Operations – A Cooperative Effort." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (June 1, 2015): 50–55. http://dx.doi.org/10.1515/kbo-2015-0008.
Full textСурай, Наталья, Natalia Surai, Жанна Диброва, Zhanna Dibrova, Оксана Сагина, Oksana Sagina, Борис Орлов, and Boris Orlov. "Modern condition and development prospects for agricultural consumer cooperation in the Central Federal District of the Russian Federation." Food Processing: Techniques and Technology 48, no. 1 (January 10, 2019): 172–83. http://dx.doi.org/10.21603/2074-9414-2018-1-172-183.
Full textHerTyan Yeh, BingChang Chen, and MingChih Tsai. "Network Security Architecture Combined Netflow with Cooperative Firewall." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 9 (May 15, 2013): 819–27. http://dx.doi.org/10.4156/aiss.vol5.issue9.96.
Full textLanglois, Catherine C., and Jean-Pierre P. Langlois. "Rational deterrence by proxy: designing cooperative security agreements." Defence and Peace Economics 28, no. 1 (December 30, 2015): 1–33. http://dx.doi.org/10.1080/10242694.2015.1118943.
Full text