Academic literature on the topic 'Intelligence and security services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intelligence and security services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intelligence and security services"

1

Ilic, Predrag. "Intelligence services and national security." Vojno delo 68, no. 3 (2016): 108–21. http://dx.doi.org/10.5937/vojdelo1603108i.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kudors, Andis. "Transformation of Security and Intelligence Services in Latvia." Connections: The Quarterly Journal 18, no. 3-4 (2019): 105–24. http://dx.doi.org/10.11610/connections.18.3-4.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Michálek, Luděk, and Ladislav Pokorný. "Transformation of the Security and Intelligence Services in the Czech Republic." Connections: The Quarterly Journal 18, no. 3-4 (2019): 65–86. http://dx.doi.org/10.11610/connections.18.3-4.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trifunović, Darko. "Medical Safety, Security And Intelligence." Security science journal 5, no. 2 (2024): 21–32. http://dx.doi.org/10.37458/ssj.5.2.2.

Full text
Abstract:
The COVID-19 pandemic was not only medical and health services, as their name suggests, have the task of informing their governments about all possible threats and risks that come from the internal or external arena. In order to be able to inform and for the state to be able to react readily, numerous conditions and preconditions must be met, which will be discussed in this article. By analyzing the content of educational institutions that deal with medical sciences, security science, or intelligence, numerous shortcomings in the education process itself can be easily identified, which certain
APA, Harvard, Vancouver, ISO, and other styles
5

Kovacevic, Filip. "Glorified Images of Soviet State Security and Intelligence Services." Journal of Cold War Studies 26, no. 4 (2024): 135–73. https://doi.org/10.1162/jcws_a_01243.

Full text
Abstract:
Abstract This survey article critically evaluates books about the Soviet-era state security and intelligence services published in Russia over the past quarter century by eight major pro-regime publishers. The article underscores the publishing houses’ efforts to foster a laudatory image of Soviet-era security and intelligence services in the broader context of the return of “Chekism” (idolization of state security agencies) under Russian President Vladimir Putin, who himself was a product of the Soviet State Security Committee (KGB), and the restoration of a repressive, authoritarian system i
APA, Harvard, Vancouver, ISO, and other styles
6

Kuchuk, Nina, Roman Udyansky, Vladyslav Usichenko, Pavlo Buslov, and Artem Huk. "MOBILE APPLICATION SECURITY ANALYSIS MODEL BASED ON ARTIFICIAL INTELLIGENCE." Системи управління, навігації та зв’язку. Збірник наукових праць 1, no. 79 (2025): 188–92. https://doi.org/10.26906/sunz.2025.1.188-192.

Full text
Abstract:
This article analyzes and studies holographic services, which established that the growth of traffic generated by holographic services will increase several times in the foreseeable future. The main features inherent in the holographic type of communication are identified. A study was conducted of innovative technologies for recording holographic copies, data compression methods to ensure holographic communication, and the transmission of holographic copies to the end user with high-quality reproduction. An analysis of the traffic of multimedia and holographic services, as well as Internet of
APA, Harvard, Vancouver, ISO, and other styles
7

Dimitrijević, Bojan. "Intelligence and Security Services in Tito's Yugoslavia 1944-1966." Istorija 20. veka 37, no. 2/2019 (2019): 9–28. http://dx.doi.org/10.29362/ist20veka.2019.2.dim.9-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goscha, Christopher E. "Three documents on early Vietnamese intelligence and security services." Intelligence and National Security 22, no. 1 (2007): 139–46. http://dx.doi.org/10.1080/02684520701200863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dalip, Andrew. "Intelligence and Corruption." Journal of Intelligence, Conflict, and Warfare 3, no. 3 (2021): 34–54. http://dx.doi.org/10.21810/jicw.v3i3.2516.

Full text
Abstract:
The Journal of Intelligence, Conflict, and Warfare is pleased to publish the following thought piece from one of our esteemed Speakers from the 2020 West Coast Security Conference. The author, Mr. Dalip, is a lawyer working in the financial crime and corruption sphere. From 2015 to 2018, Mr. Dalip was a chairman at the Steering Group Planning Committee for the Caribbean Financial Action Task Force (CFATF); and from 2014 to 2018, he was a special legal advisor to the Ministry of Attorney General Trinidad and Tobago. The intersection between corruption and intelligence is gaining increased focus
APA, Harvard, Vancouver, ISO, and other styles
10

Kamiński, Mariusz Antoni. "Intelligence and counterintelligence in the structure of the state organs of the Republic of Estonia." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (2019): 121–34. http://dx.doi.org/10.34739/dsd.2019.01.09.

Full text
Abstract:
The article presents an analysis of the legal status, organization and powers of the special services of the Republic of Estonia. The author presents the mission and tasks of the Estonian Internal Security Service (Kaitsepolitsei), the Estonian Foreign Intelligence Service (Välisluureamet) and the Military Intelligence Centre (Luurekeskus). The article show the historical aspect of the Estonian special services and their location in the structure of state organs responsible for national security. In addition, the author presents a surveillance system on the activities of intelligence and count
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Intelligence and security services"

1

Muldoon, Thomas C. "Russian intelligence and security services : an indicator of Democratic reform." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366081.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 1999.<br>"June 1999". Thesis advisor(s): Mikhail Tsypkin, Terry D. Johnson. Includes bibliographical references (p. 75-77). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Clipson, Edmund Bede. "Constructing an intelligence state : the colonial security services in Burma, 1930-1942." Thesis, University of Exeter, 2010. http://hdl.handle.net/10036/98382.

Full text
Abstract:
My doctoral research focuses on the development and operation of the intelligence services in British colonial Burma during the years 1930 to 1942. This involves an examination of the causes of intelligence development, its progress throughout 1930-1942, its rationale and modus operandi, and the pressures it faced. This time period permits us to assess how intelligence development was a product of the colonial government's response to the 1930 peasant uprising which came as such a shock to colonial security and how thereafter intelligence helped prevent popular hostility to the government from
APA, Harvard, Vancouver, ISO, and other styles
3

Forsberg, Gabriel. "Scandinavian Intelligence Services and Threat Perceptions of Russia." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96450.

Full text
Abstract:
Russia has since the beginning of the Cold War been a security problem and a threat to the Scandinavian countries, this considered by the countries' respective intelligence service, actors that are analysing Russia and the threat to the countries. However, information about Russia as a threat from the intelligence services' own perspective has so far been limited to information related to the Cold War period. This study thus aims to fill the research gap that exists on how intelligence services currently view Russia and contribute to more knowledge about how they view the threat from Russia, t
APA, Harvard, Vancouver, ISO, and other styles
4

Frade, Rita Pavia Madeira Campos. "O fenómeno da subversão: a análise do terrorismo - o papel dos serviços de informações portugueses na perceção da ameaça." Master's thesis, Instituto Superior de Ciências Sociais e Políticas, 2020. http://hdl.handle.net/10400.5/19678.

Full text
Abstract:
Dissertação de Mestrado em Estratégia<br>A presente dissertação visa analisar a ameaça em que consiste a subversão sob a forma de terrorismo, e o modo em como esta é percecionada pelo Sistema de Informações da República Portuguesa. Cuja relevância do objeto de estudo se prende com o intuito de prover um contributo na compreensão de um tema que afeta a sociedade contemporânea e que simultaneamente consiste num dos maiores desafios securitários a nível global. Foram estabelecidos objetivos de investigação que permitiram compreender mais aprofundadamente os temas discutidos. Estabe
APA, Harvard, Vancouver, ISO, and other styles
5

Hutton, Lauren Angie. "Regional Security, Early Warning and Intelligence Cooperation in Africa." Thesis, University of the Western Cape, 2010. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_7512_1299223486.

Full text
Abstract:
<p>This dissertation explores the potential contributions of the mechanisms for early warning and intelligence sharing to regional security in Africa. The Continental Early Warning System (CEWS) and the Committee on Intelligence and Security Services of Africa (CISSA) are centrally concerned with the dissemination of information to enable decision-making on continental security. The main focus of the dissertation is on the manner in which the information generated by the CEWS and CISSA can contribute to regional security. In order to analyse the potential contribution of the CEWS and CISSA to
APA, Harvard, Vancouver, ISO, and other styles
6

Tracey, Neil R. "Metaphor, the press, and the Canadian Security Intelligence Service (CSIS)." Thesis, University of Ottawa (Canada), 1990. http://hdl.handle.net/10393/6006.

Full text
Abstract:
The dissemination of press information in areas of concern to criminal justice plays an important role in the public conceptions of crime and the criminal justice system. The theoretical basis of the work, which integrates studies in phenomenology and metaphor, serves as a vehicle to arrive at a critical understanding of the press portrayal of the security legislation (CSIS Act). The thesis studies press articles gathered from microfilms, government press clippings, and a computer search (Dialog, File 262) for the Vancouver Sun, Winnipeg Free Press, Toronto Globe and Mail, Toronto Star, Ottawa
APA, Harvard, Vancouver, ISO, and other styles
7

Wierzbieniec, Gabriel. "Architecture and design requirements forEnterprise Security Monitoring Platform : Addressing security monitoring challenges in the financial services industry." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69269.

Full text
Abstract:
Security Monitoring Platform (SMP) represents multiple detective controls applied inthe enterprise to protect against cyberattacks. Building SMP is a challenging task, as itconsists of multiple systems that require integration. This paper introduces a framework thatcompiles various aspects of Security Monitoring and presents respective requirements sets.SMP framework provides guidance for establishing a risk-based detection platform,augmented with automation, threat intelligence and analytics capabilities. It provides morebroad view on the problem of Security Monitoring in the enterprise conte
APA, Harvard, Vancouver, ISO, and other styles
8

Dlomo, Dennis Thokozani. "An analysis of parliamentary intelligence oversight in South Africa with specific reference to the Joint Committee on Intelligence." Pretoria : [s.n.], 2004. http://upetd.up.ac.za/thesis/available/etd-02082005-092528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sotana, Lizo. "Levels of job satisfaction experienced by employees at crime intelligence, protection and security services in King William's Town." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1021031.

Full text
Abstract:
This study evaluated the levels of job satisfaction experienced by warrant officers and constables at crime intelligence, protection and security services in King William’s Town. Job satisfaction is a personal appraisal of the job and the psychological experience at work. It is a measure of the general attitudes to work of a specific individual rather than of a collection of attitudes of an employee to a number of aspects related to his / her job. These include the work itself, workplace interactions and relationships, rewards and incentive schemes, and personal characteristics. The main purpo
APA, Harvard, Vancouver, ISO, and other styles
10

Storey, Bradley J. "Organizational change for the intelligence community supporting maritime homeland security and defense : developing a domestic maritime intelligence network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FStorey.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Intelligence and security services"

1

Williams, Kieran, and Dennis Deletant. Security Intelligence Services in New Democracies. Palgrave Macmillan UK, 2001. http://dx.doi.org/10.1057/9781403905369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

J, Dziak John, and Consortium for the Study of Intelligence., eds. Bibliography on Soviet intelligence and security services. Westview Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McCarthy, Shaun. Intelligence services for a democratic South Africa. Research Institute for the Study of Conflict and Terrorism, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gregory, Logan Keith, ed. Homeland security and intelligence. Praeger Security International, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Branch, Canada Library of Parliament Research. The Canadian Security Intelligence Service. Library of Parliament, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rosen, Philip. The Canadian Security Intelligence Service. Library of Parliament, Research Branch, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Logan, Keith Gregory. Homeland security and intelligence. Praeger Security International, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

McCarthy, Shaun. Intelligence services for a democratic South Africa: Ensuring parliamentary control. Research Institute for the Study of Conflict and Terrorism, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Eltaher, Hassan M. Aviation & maritime security intelligence. E&W Communications, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1954-, Bergin Anthony, Hall Robert A. 1947-, and Australian Defence Studies Centre, eds. Intelligence: And Australian national security. Australian Defence Studies Centre, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Intelligence and security services"

1

Benny, Daniel J. "United States Intelligence Services." In U.S. National Security and the Intelligence Services. CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Benny, Daniel J. "Intelligence Analysis." In U.S. National Security and the Intelligence Services. CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Benny, Daniel J. "Key Hostile Nations Intelligence Services." In U.S. National Security and the Intelligence Services. CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Benny, Daniel J. "Categories of Intelligence." In U.S. National Security and the Intelligence Services. CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Benny, Daniel J. "Selected Intelligence Resources." In U.S. National Security and the Intelligence Services. CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Delgado, Jaime. "Multimedia Services & Security." In Intelligence in Services and Networks Paving the Way for an Open Service Market. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48888-x_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alemika, Etannibi E. O. "Intelligence Services and National Security in Nigeria." In Contemporary Intelligence in Africa. Routledge, 2024. http://dx.doi.org/10.4324/9781003365105-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Benny, Daniel J. "United States Key Allied Intelligence Services." In U.S. National Security and the Intelligence Services. CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wimmreuter, Wilhelm. "Traffic considerations for security services in VoIP systems." In Telecommunication Network Intelligence. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35522-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Song, Yong Ho, Jung Min Park, Yongsu Park, and Eul Gyu Im. "A New Methodology of Analyzing Security Vulnerability for Network Services." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11760146_112.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intelligence and security services"

1

Khan, Mansoor, Muhammad Ilyas, and Oguz Bayat. "Enhancing IoT Security Through Hardware Security Modules (HSMs)." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bee, J. Yamuna, S. Vanithamani, S. Shanmugapriya, et al. "Application of Machine Learning to Optical Network Traffic-Driven Provisioning Services." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Wenqing, Lufang Liu, and Hua Peng. "Research on the construction of intelligent knowledge service platform of university library based on artificial intelligence." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Taneski, Nenad, Sinisha Vitanovski, and Aleksandar Petrovski. "THE PLACE AND ROLE OF THE INTELLIGENCE AND COUNTERINTELLIGENCE SERVICES." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p28.

Full text
Abstract:
The security (Intelligence and Counterintelligence) services are one of the key elements for dealing with the 21st century challenges. The principle itself is directed mostly in preventive action i.e. early discovery, identifying and stopping the security threats. Intelligence is a process of collecting, processing, analyzing and distribution of intelligence data. The Intelligence i.e. the Intelligence services own the capacity for collecting information which is important for the safety and the constitutional order of the country. Counterintelligence is inverse process of the Intelligence i.e
APA, Harvard, Vancouver, ISO, and other styles
5

Stefan, Malin, Mandita Dragos, Chirana Paul, and Babarada Florin. "Security Considerations at the Service Level Agreement in Cloud Computing Services." In 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2023. http://dx.doi.org/10.1109/ecai58194.2023.10194163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Li-ping, Guo-jun Zhang, and Wei-tao Ha. "A Reliable Service Quality Evaluation Model in the Web Services Community." In 2010 International Conference on Computational Intelligence and Security (CIS). IEEE, 2010. http://dx.doi.org/10.1109/cis.2010.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wolthusen, Stephen D. "Modeling Network Security Services in Tactical Networks." In 2007 International Conference on Computational Intelligence and Security (CIS 2007). IEEE, 2007. http://dx.doi.org/10.1109/cis.2007.238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Augustyn, Duszan, and Andrea Tick. "Security Threats in Online Metasearch Booking Services." In 2020 IEEE 20th International Symposium on Computational Intelligence and Informatics (CINTI). IEEE, 2020. http://dx.doi.org/10.1109/cinti51262.2020.9305839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Augustyn, Duszan, and Andrea Tick. "Security Threats in Online Metasearch Booking Services." In 2020 IEEE 20th International Symposium on Computational Intelligence and Informatics (CINTI). IEEE, 2020. http://dx.doi.org/10.1109/cinti51262.2020.9305839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Liping. "Services Selection of QoS-based Skyline Computation for Web Service Composition." In 2012 Eighth International Conference on Computational Intelligence and Security (CIS). IEEE, 2012. http://dx.doi.org/10.1109/cis.2012.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Intelligence and security services"

1

Rossbach, Niclas. Intelligence and data resilience: A small state perspective on digitalisation and national defence towards the 2030s. Swedish Defence University, 2024. https://doi.org/10.62061/iibr1180.

Full text
Abstract:
Due to the increased reliance of governments on digital data, it is probably safe to suggest that, without it, there would be no state left to defend. Because, without data, there might not even be a continuity of government, and consequently no state, in a time of crisis. Hence, this paper looks at critical national digital data as a key feature of national security. This paper shows why and how the protection of digitalised critical national data is important for a country’s defence at different levels of conflict, both below and above the threshold of armed conflict. This issue can be studi
APA, Harvard, Vancouver, ISO, and other styles
2

Latorre, Lucia, Valeria Lovaisa, Lorenzo De Leo, Alexander Riobó, Eduardo Riego, and Mariana Gutierrez. Tech Report: Edge Computing. Inter-American Development Bank, 2024. https://doi.org/10.18235/0013021.

Full text
Abstract:
The adoption of edge computing in Latin America and the Caribbean (LAC) underscores its ability to address the regions unique challenges, including limited connectivity and the need to process data in remote locations. Innovative projects in smart public lighting, urban security, and sustainable resource management highlight the transformative impact of edge computing in improving quality of life and operational efficiency. Looking ahead, edge computing stands at the forefront of technological innovation. Deeper integration with artificial intelligence and the rise of 5G will unlock fresh oppo
APA, Harvard, Vancouver, ISO, and other styles
3

Agarwal, Smisha, Madhu Jalan, Holly C. Wilcox, et al. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), 2022. http://dx.doi.org/10.23970/ahrqepctb41.

Full text
Abstract:
Background. Mental health mobile applications (apps) have the potential to expand the provision of mental health and wellness services to traditionally underserved populations. There is a lack of guidance on how to choose wisely from the thousands of mental health apps without clear evidence of safety, efficacy, and consumer protections. Purpose. This Technical Brief proposes a framework to assess mental health mobile applications with the aim to facilitate selection of apps. The results of applying the framework will yield summary statements on the strengths and limitations of the apps and ar
APA, Harvard, Vancouver, ISO, and other styles
4

Crocker, S., N. Freed, J. Galvin, and S. Murphy. MIME Object Security Services. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Allen, Julia, Derek Gabbard, Christopher May, Eric Hayes, and Carol Sledge. Outsourcing Managed Security Services. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada412014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nicholson, Brian D. Intelligence Support To Maritime Homeland Security. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada420306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kamikubo, Masato. Japan’s intelligence disclosure threatens security exposure. East Asian Bureau of Economic Research, 2018. http://dx.doi.org/10.59425/eabc.1524952807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

van Ginkel, Bibi, and Fulco van Deventer. Responding to Anti-Institutionalism in the Netherlands: Challenges and Opportunities for (Local) Policymakers. International Centre for Counter Terrorism, 2024. https://doi.org/10.19165/2024.1659.

Full text
Abstract:
The issue of anti-institutionalism and anti-institutional violent extremism was placed on the policy agenda in the Netherlands in June 2023 with the publication of the report on anti-institutional extremism by the General Intelligence and Security Service (AIVD). In this report, we will explore the concept and phenomenon, and focus on what anti institutionalism looks like in the Netherlands. Part of the phenomenon is also the movement of sovereign citizens. They pose a challenge that increasingly more municipalities have to deal with. We question whether it makes sense to qualify anti-institut
APA, Harvard, Vancouver, ISO, and other styles
9

Newbill, III, and Raymond R. Intelligence Sharing, Fusion Centers, and Homeland Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada487349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sample, Char, and Shannon Eggers. Artificial Intelligence for Digital Security and Protections. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1847906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!