Journal articles on the topic 'Methods of protection and defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Methods of protection and defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khisamova, R. V. "Digital (Self)-Defence by The Example of The Children’s Rights Protection." Theoretical and Applied Law, no. 3 (October 8, 2024): 87–95. http://dx.doi.org/10.22394/3034-2813-2024-3-87-95.
Full textLoo, Bee Wah, Pei Ling Tan, Siew Kian Tey, and Wan Yoke Chin. "Authentication Methods Selection in Information Security through Hybrid AHP and EGT." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 2 (2024): 171–85. http://dx.doi.org/10.37934/araset.50.2.171185.
Full textHarmata, Władysław, and Marek Witczak. "Defence against weapons of mass destruction. Technical and functional solutions in personal protection for Territorial Defence Forces." Bulletin of the Military University of Technology 67, no. 2 (2018): 145–68. http://dx.doi.org/10.5604/01.3001.0012.0984.
Full textNemailal, Tarafder. "Defence Textiles Types with Materials and Methods of Manufacturing-A Review." Journal of Industrial Mechanics 4, no. 2 (2019): 25–33. https://doi.org/10.5281/zenodo.3361358.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.
Full textZolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.
Full textSHYSHKA, Y. "Protection of human rights and freedoms in the information sphere." INFORMATION AND LAW, no. 1(10) (January 10, 2014): 101–5. http://dx.doi.org/10.37750/2616-6798.2014.1(10).272433.
Full textMelnyk, Dmytro. "PROTECTION OF NATIONAL CRITICAL INFORMATION INFRASTRUCTURE: ISSUES OF THE DAY AND SOLUTIONS." Administrative law and process, no. 3(38) (2022): 5–16. http://dx.doi.org/10.17721/2227-796x.2022.3.01.
Full textStochaj, Justyna. "Outline of the Concept of the Population Protection and Civil Defence System in the Context of Contemporary Statutory Regulations." Safety & Fire Technology 65, no. 1 (2025): 42–54. https://doi.org/10.12845/sft.65.1.2025.4.
Full textMykhailovskyi, Denys, and Ihor Skliarov. "Methods of calculation and engineering protection of critical infrastructure objects and other strategic facilities against long-range projectiles." Strength of Materials and Theory of Structures, no. 111 (November 24, 2023): 155–71. http://dx.doi.org/10.32347/2410-2547.2023.111.155-171.
Full textAkimbayev, Yernar, Zhumabek Akhmetov, Arman Abdykalykov, Murat Kuanyshbayev, and Ibragim Kulshimbayev. "Operation procedures of civil defence authorities in time of war." Social Legal Studios 7, no. 1 (2024): 9–17. http://dx.doi.org/10.32518/sals1.2024.09.
Full textOtřísal, Pavel, Iva Vošahlíková, Markéta Weisheitelová, Jiří Slabotinsky, Vladimír Obŝel, and Stanislav Florus. "Evaluation of Breakthrough Time Of Selected Chemical Warfare Agents Through Protection Materials Under Static Conditions Within the Interlaboratory Methods Comparison." International conference KNOWLEDGE-BASED ORGANIZATION 24, no. 3 (2018): 162–68. http://dx.doi.org/10.1515/kbo-2018-0153.
Full textCarr, Debra J., E. Lewis, and PF Mahoney. "UK military helmet design and test methods." BMJ Military Health 166, no. 5 (2019): 342–46. http://dx.doi.org/10.1136/jramc-2018-001123.
Full textByzdra, Chrystian, and Grzegorz Kozieł. "Analysis of the defending possibilities against SQL Injection attacks." Journal of Computer Sciences Institute 13 (December 30, 2019): 339–44. http://dx.doi.org/10.35784/jcsi.1329.
Full textSemenenko, Oleh, Serhii Kirsanov, Artur Movchan, Mykola Ihnatiev, and Uzef Dobrovolskyi. "Impact of computer-integrated technologies on cybersecurity in the defence sector." Naukovij žurnal «Tehnìka ta energetika» 15, no. 2 (2024): 118–29. http://dx.doi.org/10.31548/machinery/2.2024.118.
Full textOchyra-Żurawska, Katarzyna, and Wiktoria Marcinek. "Przyszłość organizacji pozarządowych w świetle ustawy o ochronie ludności i obronie cywilnej." Prawo i Bezpieczeństwo 2025, no. 3 (2025): 200. https://doi.org/10.4467/29567610pib.25.011.21869.
Full textMi, Xinwei. "Analysis of Defence Mechanisms for Security Federated Learning." Applied and Computational Engineering 155, no. 1 (2025): 75–83. https://doi.org/10.54254/2755-2721/2025.gl23426.
Full textZhytnyi, Oleksandr, Mykhailo Spiridonov, and Andrii Vasyliev. "Criminalisation of violation of the right to defence as a remedy for its enforcement (national legislative experience)." Przegląd Europejski, no. 1-2021 (April 14, 2021): 191–99. http://dx.doi.org/10.31338/1641-2478pe.1.21.11.
Full textShuvalova, A. "Providing Legislative Framework for Judicial Defence and Methods of Protection of Labour Rights and Legal Interests." RUSSIAN JUSTICE 1, no. 117 (2016): 63–67. http://dx.doi.org/10.17238/issn2072-909x.2016.1.63.
Full textParkhuts, Liubomyr, Yaroslav Sovyn, and Larysa Rakobovchuk. "INTERIOR ROOM INFLUENCE ON THE DEFENCE FROM LASER ACOUSTIC INTELLIGENCE SYSTEMS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 246–57. http://dx.doi.org/10.28925/2663-4023.2024.23.246257.
Full textБігняк, О. В. "Теоретико-прикладні аспекти охорони та захисту корпоративних прав держави". Форум права, № 3 (24 квітня 2018): 13–21. https://doi.org/10.5281/zenodo.1319142.
Full textSotnyk, Viktoriia, Vladislav Sotnyk, Yevgeniy Kosaretskyi, Viktoriia Mogylevska, Oleksandr Nikolaichuk, and Serhii Kutsak. "THE INFLUENCE OF CRITICAL RISKS ON THE MECHANISM OF DEFENCE RESOURCE MANAGEMENT." Financial and credit activity problems of theory and practice 4, no. 57 (2024): 244–61. http://dx.doi.org/10.55643/fcaptp.4.57.2024.4436.
Full textTsvetkov, Vyacheslav, and Svetlana Novoselskaya. "The ways to develop defence and coping strategies among employees of internal affairs bodies." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2024, no. 2 (2024): 256–63. http://dx.doi.org/10.35750/2071-8284-2024-2-256-263.
Full textGromov, Andrey A. "Defences Applicable against Unfair Contract Terms." Zakon 22, no. 3 (2025): 177–92. https://doi.org/10.37239/0869-4400-2025-22-3-177-192.
Full textНиколаев, К. Д., and Е. С. Квасников. "VIOLATION OF LABOUR PROTECTION REQUIREMENTS AT DEFENCE INDUSTRY FACILITIES: ISSUES OF CRIMINAL AND LEGAL ASSESSMENT." VESTNIK OF THE EAST SIBERIAN INSTITUTE OF THE MINISTRY OF INTERNAL AFFAIRS OF THE RUSSIAN FEDERATION, no. 2(109) (June 27, 2024): 235–43. http://dx.doi.org/10.55001/2312-3184.2024.56.86.020.
Full textBrandt, Jayce W., Germain Chevignon, Kerry M. Oliver, and Michael R. Strand. "Culture of an aphid heritable symbiont demonstrates its direct role in defence against parasitoids." Proceedings of the Royal Society B: Biological Sciences 284, no. 1866 (2017): 20171925. http://dx.doi.org/10.1098/rspb.2017.1925.
Full textWulandari, Elysa, Dyah Erti Idawati, Burhan Nasution, Muhammad Heru Arie Edytia, Siti Shara, and Zia Ul Haq. "Examining the Concept of Protection (Defence) and Islamic Religious Cosmology in Vernacular Village Patterns in Gayo Highlands, Aceh." Journal of Islamic Architecture 8, no. 3 (2025): 661–74. https://doi.org/10.18860/jia.v8i3.25982.
Full textPayo, Andres, and Mike J. A. Walkden. "MODELLING RAPID COASTAL CATCH-UP AFTER DEFENCE REMOVAL ALONG THE SOFT CLIFF COAST OF HAPPISBURGH, UK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 63. http://dx.doi.org/10.9753/icce.v36.sediment.63.
Full textLohova, Elizabeta, Zane Vitenberga-Verza, Dzintra Kazoka, and Mara Pilmane. "Local Defence System in Healthy Lungs." Clinics and Practice 11, no. 4 (2021): 728–46. http://dx.doi.org/10.3390/clinpract11040088.
Full textYuldoshev, Shakhboz Khoshimjon, and Makhzuna Ravshanbek's Abdullajonova. "METHODS OF KEEPING CITIZENS IN PROTECTIVE FACILITIES RADIATION PROTECTION FACILITIES." JOURNAL OF INNOVATIONS IN SCIENTIFIC AND EDUCATIONAL RESEARCH 6, no. 4 (2023): 587–92. https://doi.org/10.5281/zenodo.7883383.
Full textGürfidan, Remzi. "INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES." Mühendislik Bilimleri ve Tasarım Dergisi 12, no. 2 (2024): 416–29. http://dx.doi.org/10.21923/jesd.1458955.
Full textGusev, Vladimir, and Evgeniy Larin. "Constitutional right to receive qualified legal assistance in operational investigative activities." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, no. 4 (2021): 42–48. http://dx.doi.org/10.35750/2071-8284-2021-4-42-48.
Full textTsilyna, Maryna. "Security of Confidential Military Information: Problems, Challenges and Methods of Protection." Digital Platform: Information Technologies in Sociocultural Sphere 8, no. 1 (2025): 123–34. https://doi.org/10.31866/2617-796x.8.1.2025.335536.
Full textKovalchuk, O., O. Zachko, and D. Kobilkin. "METHOD OF EVALUATION AND SELECTION OF CANDIDATES IN THE PROJECT TEAMS OF HIGHER EDUCATION INSTITUTIONS IN THE CIVIL PROTECTION SYSTEM." Bulletin of Lviv State University of Life Safety 24 (January 11, 2022): 123–29. http://dx.doi.org/10.32447/20784643.24.2021.16.
Full textHoráková, Natálie, Pavel Maňas, Ota Rolenec, and Tibor Palasiewicz. "National Defense and Environmental Protection: On the Czech Armed Forces´ Approach to the Development of Environmental Legislation in the Czech, EU and NATO Context." Vojenské rozhledy 31, no. 4 (2022): 172–202. http://dx.doi.org/10.3849/2336-2995.31.2022.04.172-202.
Full textPytel, Marek, and Mariusz Cieśla. "Use of the Territorial Defence Forces (TDF) in counter-subversive operations." Scientific Journal of the Military University of Land Forces 196, no. 2 (2020): 395–408. http://dx.doi.org/10.5604/01.3001.0014.2542.
Full textVerezomska, Iryna, Liudmyla Bovsh, Kseniia Prykhod’ko, and Khrystyna Baklan. "Cyber Protection of Hotel Brands." Restaurant and hotel consulting. Innovations 5, no. 2 (2022): 190–209. http://dx.doi.org/10.31866/2616-7468.5.2.2022.270089.
Full textVerezomska, Iryna, Liudmyla Bovsh, Kseniia Prykhod'ko, and Khrystyna Baklan. "Cyber Protection of Hotel Brands." Restaurant and Hotel Consulting. Innovations 5, no. 2 (2022): 190–209. https://doi.org/10.31866/2616-7468.5.2.2022.270089.
Full textKamergrauzis, Andris, Mara Pilmane, and Anna Junga. "Human Defence Factors in Different Gestational Week Placenta: A Pilot Study." Life 15, no. 1 (2025): 86. https://doi.org/10.3390/life15010086.
Full textWan Ibrahim, Wan Aiman, Ahmad Nazrin Ahmad Khalil, and Adamu Abubakar. "Design and Development of Cybersecurity Suite." International Journal on Perceptive and Cognitive Computing 10, no. 2 (2024): 104–12. http://dx.doi.org/10.31436/ijpcc.v10i2.493.
Full textYashchuk, Valentyna, Yulia Demyanchuk, and Victoria Savitska. "INTEGRATIVE APPROACH TO THE ANALYSIS, MODELING, AND ENSURING CYBER SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE UNDER MODERN THREATS." Baltic Journal of Economic Studies 11, no. 2 (2025): 273–86. https://doi.org/10.30525/2256-0742/2025-11-2-273-286.
Full textKamionek, Dorota, and Władysław Harmata. "Tightness of movable means of collective protection against contamination ‒ control methods." Bulletin of the Military University of Technology 69, no. 1 (2020): 89–108. http://dx.doi.org/10.5604/01.3001.0014.2812.
Full textGalan, Y. "Physical education and sports as a means of increase the level of motivation to the defense capacity of the state." Scientific Journal of National Pedagogical Dragomanov University. Series 15. Scientific and pedagogical problems of physical culture (physical culture and sports), no. 2(160) (February 28, 2023): 69–75. http://dx.doi.org/10.31392/npu-nc.series15.2023.02(160).15.
Full textJónsson, Árni, and Erik Hestnes. "The proposed open-pit protection of Bolungarvík, Iceland." Annals of Glaciology 32 (2001): 345–49. http://dx.doi.org/10.3189/172756401781819049.
Full textNazarkevych, M. A., and O. A. Troyan. "Identification of latent images in printed documents." Scientific Bulletin of UNFU 29, no. 3 (2019): 120–24. http://dx.doi.org/10.15421/40290325.
Full textAzarenko, O., Yu Honcharenko, M. Diviziniuk, R. Shevchenko, and O. Shevchenko. "METHODS OF ASSESSING TERRORIST THREATS TO STRATEGIC FACILITIES OF THE STATE." Municipal economy of cities 6, no. 180 (2023): 187–95. http://dx.doi.org/10.33042/2522-1809-2023-6-180-187-195.
Full textMatytsin, D. E. "Defense of Rights and Interests of Participants of Remote Investment Transactions." Journal of Law and Administration 18, no. 3 (2022): 32–38. http://dx.doi.org/10.24833/2073-8420-2022-3-64-32-38.
Full textRavi1,, Panuganti. "Empowering Security with Machine Learning for Ransomware and Malware Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30675.
Full textMazurenko, Olena. "FORMS AND PROTECTION METHODS OF LABOR RIGHTS OF EMPLOYEES ON LEGISLATION OF UKRAINE." Law Journal of Donbass 74, no. 1 (2021): 36–42. http://dx.doi.org/10.32366/2523-4269-2021-74-1-36-42.
Full textXiao, Xingpeng, Yaomin Zhang, Jian Xu, Wenkun Ren, and Junyi Zhang. "Assessment Methods and Protection Strategies for Data Leakage Risks in Large Language Models." Journal of Industrial Engineering and Applied Science 3, no. 2 (2025): 6–15. https://doi.org/10.70393/6a69656173.323736.
Full text