Academic literature on the topic 'LTE Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LTE Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "LTE Security"

1

IANCU, Laura. "An Overview of LTE Security." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 48–57. http://dx.doi.org/10.19107/ijisc.2012.02.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Limei, Zheng Yan, and Mohammed Atiquzzaman. "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey." IEEE Access 6 (2018): 4220–42. http://dx.doi.org/10.1109/access.2018.2792534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Daegeon, Do Hyung Gu, and Huy Kang Kim. "Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment." Security and Communication Networks 2020 (December 7, 2020): 1–13. http://dx.doi.org/10.1155/2020/8869418.

Full text
Abstract:
National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy netw
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Shaikhul Arefin, Md Mokarram Hossain Chowdhury, and Uthso Nandy. "LTE/LTE-A Based Advanced Wireless Networks." Journal of Engineering Research and Reports 25, no. 10 (2023): 195–99. http://dx.doi.org/10.9734/jerr/2023/v25i101012.

Full text
Abstract:
LTE/LTE-A is a wireless broadband standard that provides quick and reliable connectivity for the Internet of Things (IoT) and other connected devices. It is the de facto standard for 4G wireless, offering high-speed communication, extensive network coverage, and low latency. LTE/LTE-A networks are crucial for real-time IoT applications, offering high-speed data transfer, extensive coverage, low latency, and scalability. However, challenges in evaluating LTE/LTE-A-based wireless networks for IoT include compatibility, cost, power consumption, network coverage, and security. Large-scale deployme
APA, Harvard, Vancouver, ISO, and other styles
5

Fan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.

Full text
Abstract:
The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially and widely deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities with regard to the integrity algorithms have been recently discovered. To address those issues, we present a detailed specification and security analysis of a bi
APA, Harvard, Vancouver, ISO, and other styles
6

Premchander, Dr Tudi. "Survey on Vulnerability of 4G/LTE Network Security and Improvements." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1736–41. http://dx.doi.org/10.22214/ijraset.2022.42666.

Full text
Abstract:
Abstract: Network security is viewed as a huge issue in our regular routine because of its going into many individuals' exercises like social movement, showcasing and business. Notwithstanding, the requirement for a safe and strong organization has expanded. The requirements for a secure organization have expanded because of the expanding dangers and programmers in our regular routine. In view of the ongoing insights, each second the quantity of supporters is expanding multiple times around the world which refers to the quick development of 4G/LTE organizations. It is seen that 80% of individu
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Jin, Zhongqi Zhang, Yongjun Ren, Bin Li, and Jeong-Uk Kim. "Issues toward Networks Architecture Security for LTE and LTE-A Networks." International Journal of Security and Its Applications 8, no. 4 (2014): 17–24. http://dx.doi.org/10.14257/ijsia.2014.8.4.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cao, Jin, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. "A Survey on Security Aspects for LTE and LTE-A Networks." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 283–302. http://dx.doi.org/10.1109/surv.2013.041513.00174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Panda, Prabhat Kumar, and Sudipta Chattopadhyay. "An improved authentication and security scheme for LTE/LTE-A networks." Journal of Ambient Intelligence and Humanized Computing 11, no. 5 (2019): 2163–85. http://dx.doi.org/10.1007/s12652-019-01248-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.

Full text
Abstract:
With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "LTE Security"

1

Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.

Full text
Abstract:
Récemment, le 3GPP (3rd Generation Partnership Project) a standardisé les systèmes LTE/LTE-A (Long Term Evolution/LTE-Advanced) qui ont été approuvés par l'UIT (Union Internationale des Télécommunications) comme des réseaux de télécommunications mobiles de 4éme génération. La sécurité est l'une des questions essentielles qui doivent être traitées avec soin pour protéger les informations de l'opérateur et des utilisateurs. Aussi, le 3GPP a normalisé plusieurs algorithmes et protocoles afin de sécuriser les communications entre les différentes entités du réseau. Cependant, l'augmentation du nive
APA, Harvard, Vancouver, ISO, and other styles
2

DeMarinis, Nicholas AF. "On LTE Security: Closing the Gap Between Standards and Implementation." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/791.

Full text
Abstract:
Modern cellular networks including LTE (Long Term Evolution) and the evolving LTE- Advanced provide high-speed and high-capacity data services for mobile users. As we become more reliant on wireless connectivity, the security of voice and data transmissions on the network becomes increasingly important. While the LTE network standards provide strict security guidelines, these requirements may not be completely followed when LTE networks are deployed in practice. This project provides a method for improving the security of LTE networks by 1) characterizing a gap between security requirements de
APA, Harvard, Vancouver, ISO, and other styles
3

Pfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.

Full text
Abstract:
Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. Accordingly, a major interest in academic research on formal methods for protocol analysis has been apparent for the last two decades. Such methods formalize the operational semantics of a protocol, laying the base for protocol verification with automatic model checking tools. So far, little work in this field has focused on protocol standardization. Within this thesis
APA, Harvard, Vancouver, ISO, and other styles
4

Alzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.

Full text
Abstract:
High data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to issue a new version, 802.16e to tackle the security issues. Despite this security enhancement, WiMAX remains vulnerable. This research project looks at the vulnerability of WiMAX 802.16e Subscriber Statio
APA, Harvard, Vancouver, ISO, and other styles
5

Shahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.

Full text
Abstract:
This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto' air-interface of most wireless broadband standards including LTE and WiMAX. The major contributions of this dissertation are: 1) developing jamming taxonomy, 2) proposing OFDM and MIMO equalization jamming attacks and countermeasures, 3) developing antijam (AJ) MIMO systems, and 4) designing null space projected overlapped-MIMO radar waveform for spectrum sharing between radar and communications s
APA, Harvard, Vancouver, ISO, and other styles
6

Pestrea, Anna. "Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176074.

Full text
Abstract:
In modern society, security has become an increasingly important subject, as technologyhas become an integrated part of everyday life. The security of a system can be tested withthe help of fuzzing, where incoming messages to the system are altered. In this thesis, afuzzer was developed targeting an E-UTRAN Node B (eNB) in the Long-Term Evolution(LTE) landscape. The eNB is current prototype and is from the company Ericsson. Thefuzzer is particularly designed for testing the Medium Access Control (MAC) layer of theeNB. The fuzzer uses a genetic method where all of the fuzzer’s flags (the R, F2,
APA, Harvard, Vancouver, ISO, and other styles
7

BETTASSA, COPET PIERGIUSEPPE. "User-friendly Formal Methods for Security-aware Applications and Protocols." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644847.

Full text
Abstract:
Formal support in the design and implementation of security-aware applications increases the assurance in the final artifact. Formal methods techniques work by setting a model that unambiguously defines attacker capabilities, protocol parties behavior, and expected security properties. Rigorous reasoning can be done on the model about the interaction of the external attacker with the protocol parties, assessing whether the security properties hold or not. Unfortunately, formal verification requires a high level of expertise to be used properly and, in complex systems, the model analysis r
APA, Harvard, Vancouver, ISO, and other styles
8

Parvez, Imtiaz. "Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.

Full text
Abstract:
The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand,
APA, Harvard, Vancouver, ISO, and other styles
9

Legonkov, Pavel, and Vasily Prokopov. "Small Cell Wireless Backhaul in Mobile Heterogeneous Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99010.

Full text
Abstract:
Small cells are deployed in a crowded areas with a high demand for both coverage and capacity. It is hard to address both of these requirements simultaneous with a conventional mobile network architecture based on macro cells. In many case a wire is not available to connect the small cell to the core of the mobile network. Under these circumstances a wireless link could be a convenient solution for the backhaul. In this master’s thesis IEEE 802.11n technology was evaluated to assess its suitability for backhaul from a small wireless cell. The performance of wireless equipment manufactured by s
APA, Harvard, Vancouver, ISO, and other styles
10

Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.

Full text
Abstract:
5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. With fuzzing, testers can send crafted inputs to monitor the System Under Test (SUT) for a response. 3GPP, the standardization body for the telecom system, produces new versions of specifications as part of continuously evolving features and enhancements. This leads to
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "LTE Security"

1

Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470973271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118380642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pustovoĭ, Valeriĭ. Zvezdochki prozhitykh let. Izd-vo Tatʹi︠a︡ny Lurʹe, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Federal Bureau of Investigation., ed. FBI Personnel Security Polygraph Program. U.S. Justice, Federal Bureau of Investigation, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

White, Jonathan Randall. Terrorism and homeland security. 6th ed. Wadsworth Cengage Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jane, Pulkingham, and Ternowetsky Gordon W, eds. Remaking Canadian social policy: Social security in the late 1990s. Fernwood Publishing, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cerexhe, Peter. It's never too late: To achieve financial security - start today. Allen & Unwin, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Peterson, Richard Lewis. The real social security problem: What everyone must know before it is too late. Financial Economics Publications, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Skinner, Kiron K. Executive and Congressional use of security linkage during the late 1970s. RAND, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bach, David. Start Late, Finish Rich. Broadway Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "LTE Security"

1

Penttinen, Jyrki T. J. "LTE/SAE Security." In The LTE/SAE Deployment Handbook. John Wiley & Sons, Ltd, 2011. http://dx.doi.org/10.1002/9781119954187.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Remy, Jean-Gabriel, and Charlotte Letamendia. "LTE Security. SIM/USIM Subsystem." In LTE Standards. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043508.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jang, Uijin, Hyungmin Lim, and Hyungjoo Kim. "Security Scheme for LTE Initial Attach." In Ubiquitous Computing Application and Wireless Sensor. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9618-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alt, Stephanie, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, and Benjamin Richard. "A Cryptographic Analysis of UMTS/LTE AKA." In Applied Cryptography and Network Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39555-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vachhani, Khyati. "Security Threats Against LTE Networks: A Survey." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_119-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Isha, Silke Holtmanns, and Raimo Kantola. "Roaming Interface Signaling Security for LTE Networks." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12942-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Shujie, Jia Yu, and Ji Zhu. "Properties Emulation on TD-LTE Electric Power Wireless Private." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fang, Kaiming, and Guanhua Yan. "Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning." In Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "LTE Security"

1

Chlosta, Merlin, David Rupprecht, Thorsten Holz, and Christina Pöpper. "LTE security disabled." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3324927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhu, Li, Hang Qin, Huaqing Mao, and Zhiwen Hu. "Research on 3GPP LTE Security Architecture." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Samy, Islam, Loukas Lazos, Yong Xiao, Ming Li, and Marwan Krunz. "LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard." In WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 2018. http://dx.doi.org/10.1145/3212480.3212485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Siwach, Gautam, and Amir Esmailpour. "LTE Security potential vulnerability and algorithm enhancements." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liyanage, Madhusanka, Ijaz Ahmad, Mika Ylianttila, Andrei Gurtov, Ahmed Bux Abro, and Edgardo Montes de Oca. "Leveraging LTE security with SDN and NFV." In 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2015. http://dx.doi.org/10.1109/iciinfs.2015.7399014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

KIM, HWANGUK, and SEKWON KIM. "Security Vulnerabilities and Threats of LTE Networks." In International Conference on Advances in Computing, Control and Networking - ACCN 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-038-5-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhiyuan Shi, Zhiliang Ji, Zhibin Gao, and Lianfen Huang. "Layered security approach in LTE and simulation." In 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID). IEEE, 2009. http://dx.doi.org/10.1109/icasid.2009.5276930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu Hui and Bai Shuo. "Research and implementation of LTE NAS security." In 2010 International Conference on Educational and Information Technology (ICEIT). IEEE, 2010. http://dx.doi.org/10.1109/iceit.2010.5607551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rupprecht, David, Katharina Kohls, Thorsten Holz, and Christina Popper. "Breaking LTE on Layer Two." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oulaourf, Sanaa, Abdelfatteh Haidine, and Hassan Ouahmane. "Review on using game theory in resource allocation for LTE/LTE-Advanced." In 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE, 2016. http://dx.doi.org/10.1109/acosis.2016.7843946.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "LTE Security"

1

Cichonski, Jeffrey, Joshua M. Franklin, and Michael Bartock. Guide to LTE security. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Antinozzi, Isabella, and Simon Brawley. UK-EU relations and European security. Parliamentary Office of Science and Technology, 2024. http://dx.doi.org/10.58248/hs74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Item Inventories. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Bulk Processes. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Galang, Ivory Myka. Is Food Supply Accessible, Affordable, and Stable? The State of Food Security in the Philippines. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.21.

Full text
Abstract:
Based on The Economist’s 2021 Global Food Security Index (GFSI), the Philippines ranked 64th out of 113 countries in terms of its four dimensions of food security. After the World War II ended, the world still had to contend with population explosion, hunger, and poverty. The Philippines, just like other countries in the world, was actively searching for solutions through the conduct of research and the implementation of various agricultural programs and nutrition programs aimed at increasing food production and fighting the widespread malnutrition, especially among Filipino children. Since th
APA, Harvard, Vancouver, ISO, and other styles
7

Assaye, Abebaw, and Dawit Alemu. Impact of COVID-19 on Food Systems and Rural Livelihoods in Fogera Plain, Ethiopia - Round 2 Report . Institute of Development Studies (IDS), 2020. http://dx.doi.org/10.19088/apra.2020.021.

Full text
Abstract:
This report presents an assessment of the changes in effects of COVID-19 on agricultural commercialisation, food and nutrition security, labour and employment, and poverty and well-being in rural Ethiopia by comparing the results of a baseline household survey (R1) in late June 2020 with a follow-up survey (R2) in late October 2020. Data was collected from a stratified random sample of 106 smallholder rice farmer households (24 female and 82 male-headed) in five kebeles (villages) in the Fogera Plain area of Amhara Region. Data was also collected through 25 key informant interviews conducted i
APA, Harvard, Vancouver, ISO, and other styles
8

Motel-Klingebiel, Andreas, and Gerhard Naegele. Exclusion and inequality in late working life in the political context of the EU. Linköping University Electronic Press, 2022. http://dx.doi.org/10.3384/9789179293215.

Full text
Abstract:
European societies need to increase the participation in work over the life course to support the provision of qualified labour and to meet the challenges for social security systems under the condition of their ageing populations. One of the key ambitions is to extend people’s working lives and to postpone labour market exit and retirement where possible. This requires informed policies, and the research programme EIWO – ‘Exclusion and Inequality in Late Working Life: Evidence for Policy Innovation towards Inclusive Extended Work and Sustainable Working Conditions in Sweden and Europe’ – aims
APA, Harvard, Vancouver, ISO, and other styles
9

Kugler, Adriana. The Incidence of Job Security Regulations on Labor Market Flexibility and Compliance in Colombia: Evidence from the 1990 Reform. Inter-American Development Bank, 2000. http://dx.doi.org/10.18235/0011242.

Full text
Abstract:
Utilizing differences-in-differences estimates, this paper reviews the impact of reduced firing costs on the dynamism of the Colombian labor market. The effects include raising exit rates into and out of unemployment, increasing compliance with labor legislation by lowering the costs of formal production, and reducing unemployment from the late 1980s to the early 1990s.
APA, Harvard, Vancouver, ISO, and other styles
10

Belporo, Lydie. Building Peace through DDR Programs: Lessons from Reintegrating Boko Haram Ex-Recruits in Cameroon. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.19.lpbi.

Full text
Abstract:
In the countries of the Lake Chad Basin, Boko Haram’s emergence has created major new security challenges for the region’s governments. Cameroon’s Far North region, the most populous in the country, is at the heart of these security issues. Since late 2020, Boko Haram has intensified attacks in Far North localities with assassinations targeting civilians, kidnappings, and looting in small towns along the Nigerian border. In response, the Cameroonian government has pursued a hardline strategy and militarized the affected localities. In addition to arbitrary arrests, prolonged pre-trial detentio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!