To see the other types of publications on this topic, follow the link: Methods of protection and defence.

Journal articles on the topic 'Methods of protection and defence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Methods of protection and defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Khisamova, R. V. "Digital (Self)-Defence by The Example of The Children’s Rights Protection." Theoretical and Applied Law, no. 3 (October 8, 2024): 87–95. http://dx.doi.org/10.22394/3034-2813-2024-3-87-95.

Full text
Abstract:
In relation to the sphere of legal protection the author considers two legal phenomena: “digital self-protection” and “digital protection of rights”. Relaying on examples of actions taken by parents in order to protect the children’s rights on Internet, the author comes to the conclusion that the digital methods of protecting the right that exist today in practice can be considered by modern jurisprudence as alternative ways to protect the right or form a new legal institution of “digital self-protection”.
APA, Harvard, Vancouver, ISO, and other styles
2

Loo, Bee Wah, Pei Ling Tan, Siew Kian Tey, and Wan Yoke Chin. "Authentication Methods Selection in Information Security through Hybrid AHP and EGT." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 2 (2024): 171–85. http://dx.doi.org/10.37934/araset.50.2.171185.

Full text
Abstract:
The information security leader frequently encounters the challenge of choosing the appropriate defence strategy. Effective multi-criteria decision-making (MCDM) is essential in the field of information security for determining the optimal strategies that involve more than one party. To address this challenge, we propose a hybrid model that combines the strengths of the Analytic Hierarchy Process (AHP) with Evolutionary Game Theory (EGT). The hybrid model helps the information security leader assess the criteria for security controls and make the optimal decisions to protect the organization's
APA, Harvard, Vancouver, ISO, and other styles
3

Harmata, Władysław, and Marek Witczak. "Defence against weapons of mass destruction. Technical and functional solutions in personal protection for Territorial Defence Forces." Bulletin of the Military University of Technology 67, no. 2 (2018): 145–68. http://dx.doi.org/10.5604/01.3001.0012.0984.

Full text
Abstract:
The paper characterises methods of defence for use against weapons of mass destruction, as a form of troop protection system in the event of a contamination (infection) hazard from both the functional and the task-oriented perspective. The basic equipment of troops are described, taking into account the classification of equipment and the means used for: identification of the contamination, protection from the contamination, and the elimination of the contamination in terms of personal protection. Keywords: protection against weapons of mass destruction, equipment, personal protection of soldi
APA, Harvard, Vancouver, ISO, and other styles
4

Nemailal, Tarafder. "Defence Textiles Types with Materials and Methods of Manufacturing-A Review." Journal of Industrial Mechanics 4, no. 2 (2019): 25–33. https://doi.org/10.5281/zenodo.3361358.

Full text
Abstract:
Textiles always have an important role in providing huge support to the defence personnel in various ways. It has played a vital role in providing protection to certain extent to the soldiers. Modern days defence is dealing with high performance textiles. Functional textiles have wide applications in defence. Examples of such textiles are like parachute fabric, three layer breathable fabric, camouflage printed fabric, flame retardant fabric, Thermoplastic Polyurethane Urethanes (TPU) coated fabric, etc. It is a great challenge to the system designers for defence departments to satisfy the conf
APA, Harvard, Vancouver, ISO, and other styles
5

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and Current Status of Defence Information Security in Ukraine." Hasanuddin Law Review 8, no. 1 (2022): 18. http://dx.doi.org/10.20956/halrev.v8i1.3582.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy. Considering that the defence forces are an inseparable part of state security, studying their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored by the defence for
APA, Harvard, Vancouver, ISO, and other styles
6

Zolotar, Olha O., Mykola M. Zaitsev, Vitalii V. Topolnitskyi, Kostiantyn I. Bieliakov, and Ihor M. Koropatnik. "Prospects and current status of defence information security in Ukraine." Linguistics and Culture Review 5, S3 (2021): 513–24. http://dx.doi.org/10.21744/lingcure.v5ns3.1545.

Full text
Abstract:
Relevance of the article - security has always been one of the priority issues of state policy, and considering the fact that the defense forces are an inseparable part of state security, the study of their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the information society, the information technology of the Ukrainian defence forces must adapt to the current challenges and threats, to ensure proper protection of information of strategic importance to the state and collected, consolidated and stored b
APA, Harvard, Vancouver, ISO, and other styles
7

SHYSHKA, Y. "Protection of human rights and freedoms in the information sphere." INFORMATION AND LAW, no. 1(10) (January 10, 2014): 101–5. http://dx.doi.org/10.37750/2616-6798.2014.1(10).272433.

Full text
Abstract:
The base categories of defence of information rights are examined in the article. On the basis of analysis of current domestic legislation conclusions are drawn in relation to the types of human and citizens’ information rights. The methods of defence of information rights are explored, recommendations of their application are given.
APA, Harvard, Vancouver, ISO, and other styles
8

Melnyk, Dmytro. "PROTECTION OF NATIONAL CRITICAL INFORMATION INFRASTRUCTURE: ISSUES OF THE DAY AND SOLUTIONS." Administrative law and process, no. 3(38) (2022): 5–16. http://dx.doi.org/10.17721/2227-796x.2022.3.01.

Full text
Abstract:
Advantages of the modern digital world and development of information technologies stipulated appearance of new threats to national security in an information sphere. All more frequent by the objects of cyberattacs, amount and power of which grows constantly, the information resources of financial institutions, enterprises of transport and power engineering, public organs, which guarantee security, defense, safety in case of disasters. Therefore a research purpose is a search of solutions of issues of the day for protection of national critical information infrastructure. Methods. For implemen
APA, Harvard, Vancouver, ISO, and other styles
9

Stochaj, Justyna. "Outline of the Concept of the Population Protection and Civil Defence System in the Context of Contemporary Statutory Regulations." Safety & Fire Technology 65, no. 1 (2025): 42–54. https://doi.org/10.12845/sft.65.1.2025.4.

Full text
Abstract:
Aim: Development of an outline of the concept of the civil protection and civil defence system in the context of modern statutory regulations, including selected elements such as: the general characteristics of the functioning of the civil protection system and its transformation into a civil defence system under martial law or a state of war, the entities and subsystems of the civil protection and civil defence system and the dependencies that exist between them, taking into account the administrative division of the country. Project and methods: The study formulated the following main resear
APA, Harvard, Vancouver, ISO, and other styles
10

Mykhailovskyi, Denys, and Ihor Skliarov. "Methods of calculation and engineering protection of critical infrastructure objects and other strategic facilities against long-range projectiles." Strength of Materials and Theory of Structures, no. 111 (November 24, 2023): 155–71. http://dx.doi.org/10.32347/2410-2547.2023.111.155-171.

Full text
Abstract:
Relevance. One of the key areas of russia's military operations against Ukraine is the destruction of critical infrastructure objects (CIO) of strategic importance. The main types of enemy means for air strikes on CIO are air-launched, ground-launched and water-launched missiles, as well as barrage munitions. The vast majority of the CIO were built in Ukraine above ground, without any engineering structural protection systems to counter air threats, explosions or other impacts related to military operations. The importance of developing the most effective methods of engineering structural prot
APA, Harvard, Vancouver, ISO, and other styles
11

Akimbayev, Yernar, Zhumabek Akhmetov, Arman Abdykalykov, Murat Kuanyshbayev, and Ibragim Kulshimbayev. "Operation procedures of civil defence authorities in time of war." Social Legal Studios 7, no. 1 (2024): 9–17. http://dx.doi.org/10.32518/sals1.2024.09.

Full text
Abstract:
The relevance of this study is determined by the current instability of the global political climate in the world and the outbreak of a number of military conflicts, which necessitates the study of the mechanisms of activity of structures that protect the interests of the population and the state. Thus, the purpose of the paper is to analyse the algorithm for the activities of civil defence authorities, particularly in wartime conditions. Among the methods used are the methods of logical analysis, deduction, synthesis, induction, functional analysis, analogy. This study provides a detailed ana
APA, Harvard, Vancouver, ISO, and other styles
12

Otřísal, Pavel, Iva Vošahlíková, Markéta Weisheitelová, Jiří Slabotinsky, Vladimír Obŝel, and Stanislav Florus. "Evaluation of Breakthrough Time Of Selected Chemical Warfare Agents Through Protection Materials Under Static Conditions Within the Interlaboratory Methods Comparison." International conference KNOWLEDGE-BASED ORGANIZATION 24, no. 3 (2018): 162–68. http://dx.doi.org/10.1515/kbo-2018-0153.

Full text
Abstract:
Abstract Based on long-term experiences cooperation between the Laboratory of Toxic Compounds at the National Institute for Nuclear, Chemical and Biological Protection and the Nuclear, Chemical and Biological Defence Institute of the University of Defence in Brno an interlaboratory double-sided comparison has been established in recent time. The interlaboratory comparison of methods is one of several quality management tools according to ČSN EN ISO/IEC 17 025:2005. In the Czech Republic a commercial available comparison system for breakthrough time determination of chemical warfare agents thro
APA, Harvard, Vancouver, ISO, and other styles
13

Carr, Debra J., E. Lewis, and PF Mahoney. "UK military helmet design and test methods." BMJ Military Health 166, no. 5 (2019): 342–46. http://dx.doi.org/10.1136/jramc-2018-001123.

Full text
Abstract:
The aim of this paper was to provide the military medical community with an expert summary of military helmets used by HM Armed Forces. The design of military helmets and test methods used to determine the fragmentation and non-ballistic impact protection are discussed. The helmets considered are Parachutist, Combat Vehicle Crewman, Mk6, Mk6A, Mk7 and VIRTUS. The helmets considered provide different levels of fragmentation and non-ballistic impact protection dictated by the materials available at the time of the helmet design and the end-user requirement. The UK Ministry of Defence defines the
APA, Harvard, Vancouver, ISO, and other styles
14

Byzdra, Chrystian, and Grzegorz Kozieł. "Analysis of the defending possibilities against SQL Injection attacks." Journal of Computer Sciences Institute 13 (December 30, 2019): 339–44. http://dx.doi.org/10.35784/jcsi.1329.

Full text
Abstract:
The article describes various protection methods of database and types of SQL Injection attacks. These are extremely dangerous attacks because they threaten the confidentiality of sensitive data. In order to analyze in detail protection methods and methods of attacks, simulations of attacks and defence were performed in the following languages: C #, PHP, Java. Based on the simulation results for particular languages, the effectiveness and efficiency of database protection methods were compared.
APA, Harvard, Vancouver, ISO, and other styles
15

Semenenko, Oleh, Serhii Kirsanov, Artur Movchan, Mykola Ihnatiev, and Uzef Dobrovolskyi. "Impact of computer-integrated technologies on cybersecurity in the defence sector." Naukovij žurnal «Tehnìka ta energetika» 15, no. 2 (2024): 118–29. http://dx.doi.org/10.31548/machinery/2.2024.118.

Full text
Abstract:
The research relevance is determined by the ever-increasing threat of cyberattacks and the need to protect defence systems from these threats through the introduction of integrated computer technologies. The study aims to develop strategies for ensuring digital security in the defence sector, addressing the impact of information technology. The study analyses the impact of integrated computer technologies on information security in the military sphere, develops cybersecurity strategies and analyses examples of their application in the defence sector. The study determined that integrated comput
APA, Harvard, Vancouver, ISO, and other styles
16

Ochyra-Żurawska, Katarzyna, and Wiktoria Marcinek. "Przyszłość organizacji pozarządowych w świetle ustawy o ochronie ludności i obronie cywilnej." Prawo i Bezpieczeństwo 2025, no. 3 (2025): 200. https://doi.org/10.4467/29567610pib.25.011.21869.

Full text
Abstract:
The introduction of the new Civil Protection and Civil Defence Act creates both opportunities and challenges for non-governmental organisations (NGOs). The article analyzes the consequences of the new regulations, examining their impact on the activities of NGOs and their role in the civil protection system. The first part describes the main assumptions of the Act, the current role of NGOs in civil protection and the changes resulting from the new regulations. Then, the analysis of new opportunities (e.g. access to resources) and challenges (bureaucratization, limitation of autonomy) resulting
APA, Harvard, Vancouver, ISO, and other styles
17

Mi, Xinwei. "Analysis of Defence Mechanisms for Security Federated Learning." Applied and Computational Engineering 155, no. 1 (2025): 75–83. https://doi.org/10.54254/2755-2721/2025.gl23426.

Full text
Abstract:
This review systematically examines security mechanisms in Federated Learning (FL), addressing the critical privacy-utility trade-offs in sensitive sectors such as healthcare, finance, and the Internet of Things (IoT). FL enables collaborative model training without raw data sharing, but its susceptibility to attacks like data poisoning and gradient leakage threatens its adoption in privacy-sensitive domains. The study evaluates four primary defence strategies: Secure Aggregation (SA), Differential Privacy (DP), Byzantine-robust aggregation, and Hybrid Frameworks, assessing them from theoretic
APA, Harvard, Vancouver, ISO, and other styles
18

Zhytnyi, Oleksandr, Mykhailo Spiridonov, and Andrii Vasyliev. "Criminalisation of violation of the right to defence as a remedy for its enforcement (national legislative experience)." Przegląd Europejski, no. 1-2021 (April 14, 2021): 191–99. http://dx.doi.org/10.31338/1641-2478pe.1.21.11.

Full text
Abstract:
The opportunity of admission of the right to defence as an independent object of criminal law protection is analysed in this article. Such opportunity has been considered with the reference to the procedural, constitutional, international law and European aspects of the value of this right. The system-structural, dialectical and comparative methods, as well as the axiological (value) approach were chosen as a methodology for the implementation of the research task. The potential models of criminalisation of violation of the right to defence have been identified as a result.
APA, Harvard, Vancouver, ISO, and other styles
19

Shuvalova, A. "Providing Legislative Framework for Judicial Defence and Methods of Protection of Labour Rights and Legal Interests." RUSSIAN JUSTICE 1, no. 117 (2016): 63–67. http://dx.doi.org/10.17238/issn2072-909x.2016.1.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Parkhuts, Liubomyr, Yaroslav Sovyn, and Larysa Rakobovchuk. "INTERIOR ROOM INFLUENCE ON THE DEFENCE FROM LASER ACOUSTIC INTELLIGENCE SYSTEMS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 246–57. http://dx.doi.org/10.28925/2663-4023.2024.23.246257.

Full text
Abstract:
One of the most vulnerable issues in the technical protection of information is the acquisition of private or confidential data due to leakage through the optoelectronic channel. Today, the most promising area of protection of speech information from laser acoustic intelligence systems is development of passive protection methods. The work is devoted to the influence study of interior elements in the room on the protection of language information from LAIS, that can be implemented effectively and with minimal costs at the design stage in order to comfortably conduct confidential negotiations.
APA, Harvard, Vancouver, ISO, and other styles
21

Бігняк, О. В. "Теоретико-прикладні аспекти охорони та захисту корпоративних прав держави". Форум права, № 3 (24 квітня 2018): 13–21. https://doi.org/10.5281/zenodo.1319142.

Full text
Abstract:
Розглянуті поняття та специфіка корпоративних прав держави, співвідношення дефініцій "корпоративні права" та "корпоративні права держави". Проведено аналіз чинного законодавства України, регулюючого питання управління корпоративними правами держави, їх охорони та захисту. Виявлені особливості охорони та захисту корпоративних прав держави на відміну від захисту корпоративних прав суб’єктів приватного сектору. Розглянута ефективність існуючого механізму охорони та захисту корпоративних прав держави. Виявлені недоліки існуючі у чинному механізмі охорони та захисту корпор
APA, Harvard, Vancouver, ISO, and other styles
22

Sotnyk, Viktoriia, Vladislav Sotnyk, Yevgeniy Kosaretskyi, Viktoriia Mogylevska, Oleksandr Nikolaichuk, and Serhii Kutsak. "THE INFLUENCE OF CRITICAL RISKS ON THE MECHANISM OF DEFENCE RESOURCE MANAGEMENT." Financial and credit activity problems of theory and practice 4, no. 57 (2024): 244–61. http://dx.doi.org/10.55643/fcaptp.4.57.2024.4436.

Full text
Abstract:
The continuation of warfare in the territory of the country causes many economic, environmental and social problems. That is why it is important to study the influence of critical risks on the mechanism of managing defence resources, which the state’s ability to withstand in difficult times and to ensure the protection of state borders depends on. The main purpose of the paper is the evaluation of scientific and practical principles of determination and analysis of critical risks in the defence industry.Subject to the foregoing, the paper investigates the main scientists’ approaches to the def
APA, Harvard, Vancouver, ISO, and other styles
23

Tsvetkov, Vyacheslav, and Svetlana Novoselskaya. "The ways to develop defence and coping strategies among employees of internal affairs bodies." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2024, no. 2 (2024): 256–63. http://dx.doi.org/10.35750/2071-8284-2024-2-256-263.

Full text
Abstract:
Introduction. The efficiency of staff of the internal affairs bodies, their mental health and stress tolerance largely depend on the psychological counseling that is carried out with them throughout the entire period of service [1]. One of the factors ensuring the effective performance of official duties by police officers is the process of formation and development of psychic protective mechanisms. The development of the existing potential for the protection of mental health among employees of Department of Internal Affairs (hereinafter – DIA) continues being an essential direction of psychol
APA, Harvard, Vancouver, ISO, and other styles
24

Gromov, Andrey A. "Defences Applicable against Unfair Contract Terms." Zakon 22, no. 3 (2025): 177–92. https://doi.org/10.37239/0869-4400-2025-22-3-177-192.

Full text
Abstract:
Russian court practice presents various ways of fighting unfair contract terms. Despite the fact that the purpose of these defence mechanisms is generally the same, each of them presupposes its own set of factual circumstances allowing to invalidate the condition in whole or in part. The article attempts to analyse the mentioned methods of protection and to determine what facts are directly necessary to confirm when using each of them.
APA, Harvard, Vancouver, ISO, and other styles
25

Николаев, К. Д., and Е. С. Квасников. "VIOLATION OF LABOUR PROTECTION REQUIREMENTS AT DEFENCE INDUSTRY FACILITIES: ISSUES OF CRIMINAL AND LEGAL ASSESSMENT." VESTNIK OF THE EAST SIBERIAN INSTITUTE OF THE MINISTRY OF INTERNAL AFFAIRS OF THE RUSSIAN FEDERATION, no. 2(109) (June 27, 2024): 235–43. http://dx.doi.org/10.55001/2312-3184.2024.56.86.020.

Full text
Abstract:
.В статье исследуются вопросы взаимосвязи уголовно-правовой охраны безопасного труда и обороноспособности государства. Авторами отмечается значение соблюдения требований охраны труда в широком аспекте, анализируется соотношение уровня уголовно-правовой охраны частных и публичных интересов, приводятся аргументы повышенной степени общественной опасности нарушения требований безопасности труда на объектах оборонно-промышленного комплекса. Материалы и методы. Нормативную основу исследования образуют Конституция Российской Федерации, российское уголовное законодательство. Методологической основой я
APA, Harvard, Vancouver, ISO, and other styles
26

Brandt, Jayce W., Germain Chevignon, Kerry M. Oliver, and Michael R. Strand. "Culture of an aphid heritable symbiont demonstrates its direct role in defence against parasitoids." Proceedings of the Royal Society B: Biological Sciences 284, no. 1866 (2017): 20171925. http://dx.doi.org/10.1098/rspb.2017.1925.

Full text
Abstract:
Heritable symbionts are common in insects with many contributing to host defence. Hamiltonella defensa is a facultative, bacterial symbiont of the pea aphid, Acyrthosiphon pisum that provides protection against the endoparasitoid wasp Aphidius ervi . Protection levels vary among strains of H. defensa that are differentially infected by bacteriophages named APSEs. By contrast, little is known about mechanism(s) of resistance owing to the intractability of host-restricted microbes for functional study. Here, we developed methods for culturing strains of H. defensa that varied in the presence and
APA, Harvard, Vancouver, ISO, and other styles
27

Wulandari, Elysa, Dyah Erti Idawati, Burhan Nasution, Muhammad Heru Arie Edytia, Siti Shara, and Zia Ul Haq. "Examining the Concept of Protection (Defence) and Islamic Religious Cosmology in Vernacular Village Patterns in Gayo Highlands, Aceh." Journal of Islamic Architecture 8, no. 3 (2025): 661–74. https://doi.org/10.18860/jia.v8i3.25982.

Full text
Abstract:
Serule Village is the oldest Islamic settlement originating from the 17th century during the Aceh Sultanate and is classified as a Historical Cultural Heritage Village. Therefore, this research aimed to (1) identify the concepts of protection/defense found in the early vernacular settlement patterns of Serule, (2) analyze symbolic interpretations and Islamic values in the arrangement of Serule vernacular settlements, and (3) examine the harmonization of defense concepts with principles of Islamic cosmology in the embodiment of Serule vernacular settlements. Descriptive qualitative methods were
APA, Harvard, Vancouver, ISO, and other styles
28

Payo, Andres, and Mike J. A. Walkden. "MODELLING RAPID COASTAL CATCH-UP AFTER DEFENCE REMOVAL ALONG THE SOFT CLIFF COAST OF HAPPISBURGH, UK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 63. http://dx.doi.org/10.9753/icce.v36.sediment.63.

Full text
Abstract:
There are currently no well-established methods of predicting coastal catch-up, i.e. the response of shores to the removal of existing coast protection. Such estimates are vital to inform decisions around the renewal of such structures. At a deeper level, the lack of predictive methods undermines progress towards more sustainable approaches to coastal management, and the implementation of policies of managed realignment. Some progress has been made in recent years using the SCAPE numerical modelling tool (e.g. Walkden et al, 2015). That study demonstrated coastal response that included retreat
APA, Harvard, Vancouver, ISO, and other styles
29

Lohova, Elizabeta, Zane Vitenberga-Verza, Dzintra Kazoka, and Mara Pilmane. "Local Defence System in Healthy Lungs." Clinics and Practice 11, no. 4 (2021): 728–46. http://dx.doi.org/10.3390/clinpract11040088.

Full text
Abstract:
Background: The respiratory system is one of the main entrance gates for infection. The aim of this work was to compare the appearance of specific mucosal pro-inflammatory and common anti-microbial defence factors in healthy lung tissue, from an ontogenetic point of view. Materials and methods: Healthy lung tissues were collected from 15 patients (three females and 12 males) in the age range from 18 to 86. Immunohistochemistry to human β defensin 2 (HBD-2), human β defensin 3 (HBD-3), human β defensin 4 (HBD-4), cathelicidine (LL-37) and interleukine 17A (IL-17A) were performed. Results: The l
APA, Harvard, Vancouver, ISO, and other styles
30

Yuldoshev, Shakhboz Khoshimjon, and Makhzuna Ravshanbek's Abdullajonova. "METHODS OF KEEPING CITIZENS IN PROTECTIVE FACILITIES RADIATION PROTECTION FACILITIES." JOURNAL OF INNOVATIONS IN SCIENTIFIC AND EDUCATIONAL RESEARCH 6, no. 4 (2023): 587–92. https://doi.org/10.5281/zenodo.7883383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Gürfidan, Remzi. "INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES." Mühendislik Bilimleri ve Tasarım Dergisi 12, no. 2 (2024): 416–29. http://dx.doi.org/10.21923/jesd.1458955.

Full text
Abstract:
Phishing attack on web pages is a type of malicious attack that aims to steal personal and sensitive information of internet users. Phishing attacks are usually conducted through various communication channels such as email, SMS, social media messages or websites. Users are directed to fake web pages of trusted organizations such as government agencies, banks, online shopping sites, etc. and asked to enter their personal information. These fake web pages may look remarkably like the original sites and are designed to mislead users. In this study, we used machine learning methods to detect the
APA, Harvard, Vancouver, ISO, and other styles
32

Gusev, Vladimir, and Evgeniy Larin. "Constitutional right to receive qualified legal assistance in operational investigative activities." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, no. 4 (2021): 42–48. http://dx.doi.org/10.35750/2071-8284-2021-4-42-48.

Full text
Abstract:
The article deals with the actual problems of bringing a lawyer in the protection of human rights and freedoms, in the implementation of operational investigative activities and the collection of evidence. The authors note that the formal indictment of a person follows an operative-investigative activity, which restricts his rights and freedoms. At the same time, the Federal Law “On operative-investigative activity” doesn’t contain any reference to the defence counsel (lawyer), not to mention the procedure of his participation in the protection of citizens whose right and freedoms were limited
APA, Harvard, Vancouver, ISO, and other styles
33

Tsilyna, Maryna. "Security of Confidential Military Information: Problems, Challenges and Methods of Protection." Digital Platform: Information Technologies in Sociocultural Sphere 8, no. 1 (2025): 123–34. https://doi.org/10.31866/2617-796x.8.1.2025.335536.

Full text
Abstract:
The purpose of the research in the article is to identify the main problems and challenges in the security of confidential military information, and to find ways to protect such information from existing and potential threats. The research methodology is outlined as are general scientific methods, in particular survey and analytical methods, that are used to determine the theoretical basis of scientific research. The systematic method proved effective during the study of individual foreign and domestic publications and the consideration of regulatory and legislative acts on the problem raised.
APA, Harvard, Vancouver, ISO, and other styles
34

Kovalchuk, O., O. Zachko, and D. Kobilkin. "METHOD OF EVALUATION AND SELECTION OF CANDIDATES IN THE PROJECT TEAMS OF HIGHER EDUCATION INSTITUTIONS IN THE CIVIL PROTECTION SYSTEM." Bulletin of Lviv State University of Life Safety 24 (January 11, 2022): 123–29. http://dx.doi.org/10.32447/20784643.24.2021.16.

Full text
Abstract:
Abstract. The article classifies the methods of selection and evaluation of applicants for higher education with specific learning conditions based on the Civil Defence Law. The application of the competence approach to the teambuilding process and the qualimetric evaluation method with the analysis of criteria that describe the business, psychological and personal values are generalized. The possibility of applying the qualimetric model to the relative integral value of the applicant's similarity to the requirements for inclusion in the project team is presented. A mathematical qualimetric mo
APA, Harvard, Vancouver, ISO, and other styles
35

Horáková, Natálie, Pavel Maňas, Ota Rolenec, and Tibor Palasiewicz. "National Defense and Environmental Protection: On the Czech Armed Forces´ Approach to the Development of Environmental Legislation in the Czech, EU and NATO Context." Vojenské rozhledy 31, no. 4 (2022): 172–202. http://dx.doi.org/10.3849/2336-2995.31.2022.04.172-202.

Full text
Abstract:
The aim of this study was to create an overview of the Czech Armed Forces' development in approach to environmental protection from 1989 to 2022. Using the methods of analysis, synthesis and comparison of the Czech, EU´s and NATO´s environmental legislation, we created a comprehensive and previously unpublished overview of environmental protection within the Czech Armed Forces. Found outputs were set into illustrations depicting the activities in the environmental field with internal links between civil legislation, EU's requirements, and NATO's policy in chronological order. We conclude that
APA, Harvard, Vancouver, ISO, and other styles
36

Pytel, Marek, and Mariusz Cieśla. "Use of the Territorial Defence Forces (TDF) in counter-subversive operations." Scientific Journal of the Military University of Land Forces 196, no. 2 (2020): 395–408. http://dx.doi.org/10.5604/01.3001.0014.2542.

Full text
Abstract:
The Territorial Defence Forces (TDF, Polish abbrev. WOT) are to participate in combat counter-subversive operations, alone or in cooperation with other security actors. Using both offensive and protective-defensive forms and methods, they will create freedom of action for operational troops. Precise reconnaissance of the area, infrastructure knowledge in permanent areas of responsibility (Polish abbrev. SRO), cooperation with the non-military system (Polish abbrev. UPM), and cooperation with the local population in combination with the training of the TDF commanders and soldiers equipped with
APA, Harvard, Vancouver, ISO, and other styles
37

Verezomska, Iryna, Liudmyla Bovsh, Kseniia Prykhod’ko, and Khrystyna Baklan. "Cyber Protection of Hotel Brands." Restaurant and hotel consulting. Innovations 5, no. 2 (2022): 190–209. http://dx.doi.org/10.31866/2616-7468.5.2.2022.270089.

Full text
Abstract:
Topicality. The hotel industry suffered significant financial shifts during pandemic, which have been exacerbated by the martial law in Ukraine. The problem of protecting intangible assets has become relevant, in particular, in conditions that some blighty hotels have Russian beneficiaries, and certain international brands have remained their activity in Russia, which unleashed a full-scale war in Ukraine. In addition to physical destruction, hotels have also become the subject of information war and cybercrimes. Therefore, the issue of brands cyber protection has become an important component
APA, Harvard, Vancouver, ISO, and other styles
38

Verezomska, Iryna, Liudmyla Bovsh, Kseniia Prykhod'ko, and Khrystyna Baklan. "Cyber Protection of Hotel Brands." Restaurant and Hotel Consulting. Innovations 5, no. 2 (2022): 190–209. https://doi.org/10.31866/2616-7468.5.2.2022.270089.

Full text
Abstract:
Topicality. The hotel industry suffered significant financial shifts during pandemic, which have been exacerbated by the martial law in Ukraine. The problem of protecting intangible assets has become relevant, in particular, in conditions that some blighty hotels have Russian beneficiaries, and certain international brands have remained their activity in Russia, which unleashed a full-scale war in Ukraine. In addition to physical destruction, hotels have also become the subject of information war and cybercrimes. Therefore, the issue of brands cyber protection has become an important component
APA, Harvard, Vancouver, ISO, and other styles
39

Kamergrauzis, Andris, Mara Pilmane, and Anna Junga. "Human Defence Factors in Different Gestational Week Placenta: A Pilot Study." Life 15, no. 1 (2025): 86. https://doi.org/10.3390/life15010086.

Full text
Abstract:
Background: Numerous studies have shown the presence of multiple defence factors in placental tissue, although their role is partially understood; therefore, the aim of this study was to evaluate the expression of nuclear factor-kappa B (NF-κB); human beta-defensin 2, 3, and 4 (HBD-2,3,4); cathelicidine (LL-37); heat shock protein 60 (HSP60); and interleukin 10 (IL-10) in dissimilar gestational week placental tissue and display correlations between immunoreactive cells. Methods: A total of 15 human placental tissue samples were acquired from mothers with different gestational weeks: 28, 31, an
APA, Harvard, Vancouver, ISO, and other styles
40

Wan Ibrahim, Wan Aiman, Ahmad Nazrin Ahmad Khalil, and Adamu Abubakar. "Design and Development of Cybersecurity Suite." International Journal on Perceptive and Cognitive Computing 10, no. 2 (2024): 104–12. http://dx.doi.org/10.31436/ijpcc.v10i2.493.

Full text
Abstract:
Protecting personal, corporate and government data in the digital age requires cybersecurity. Traditional cybersecurity methods sometimes lack comprehensive and dynamic protection mechanisms as cyber-attacks change and become more sophisticated. A new cybersecurity suite is proposed in this study. It integrates various advanced security technologies into a single user-friendly platform interaction. This paper specifically combines techniques for real-time phishing detection, strong password management, safe encryption and decryption services and an interactive module to promote user awareness
APA, Harvard, Vancouver, ISO, and other styles
41

Yashchuk, Valentyna, Yulia Demyanchuk, and Victoria Savitska. "INTEGRATIVE APPROACH TO THE ANALYSIS, MODELING, AND ENSURING CYBER SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE UNDER MODERN THREATS." Baltic Journal of Economic Studies 11, no. 2 (2025): 273–86. https://doi.org/10.30525/2256-0742/2025-11-2-273-286.

Full text
Abstract:
The present study explores contemporary approaches to the analysis, modelling and assurance of cyber security of critical information infrastructure in the face of modern threats. This text focuses on the utilisation of intelligent methods and advanced technologies for the protection of critical information infrastructure (CII). The objective of the present study is to employ an integrative approach to analysing, modelling, and ensuring the cyber security of CII in the face of contemporary threats. The methodological foundation of the study is a comprehensive analysis of scientific literature
APA, Harvard, Vancouver, ISO, and other styles
42

Kamionek, Dorota, and Władysław Harmata. "Tightness of movable means of collective protection against contamination ‒ control methods." Bulletin of the Military University of Technology 69, no. 1 (2020): 89–108. http://dx.doi.org/10.5604/01.3001.0014.2812.

Full text
Abstract:
This paper characterizes the tasks assigned to pollution protection measures, in particular mobile pollution protection measures. General principles of protection against contamination, using filter ventilation systems “UFW”, are presented. The problem was discussed and the method of testing the general tightness of movable means present in the SZ of RP was analyzed. The methodology and the results of tests for general tightness of mobile objects of protection against pollution are presented. Keywords: defense against weapons of mass destruction, filter ventilation systems, tightness of movabl
APA, Harvard, Vancouver, ISO, and other styles
43

Galan, Y. "Physical education and sports as a means of increase the level of motivation to the defense capacity of the state." Scientific Journal of National Pedagogical Dragomanov University. Series 15. Scientific and pedagogical problems of physical culture (physical culture and sports), no. 2(160) (February 28, 2023): 69–75. http://dx.doi.org/10.31392/npu-nc.series15.2023.02(160).15.

Full text
Abstract:
Numerous studies prove the fact that in the modern world, it is possible to ensure the state's defence capability only through cooperation with various fields, including physical education and sports. One of the important aspects of ensuring a reliable degree of the state's national security is its own combat-ready armed forces, which should include persons with an appropriate level of physical training and health condition. Currently, taking into account the break out of the COVID-19 pandemic, an insufficient level of physical activity is observed among young children, which poses a serious p
APA, Harvard, Vancouver, ISO, and other styles
44

Jónsson, Árni, and Erik Hestnes. "The proposed open-pit protection of Bolungarvík, Iceland." Annals of Glaciology 32 (2001): 345–49. http://dx.doi.org/10.3189/172756401781819049.

Full text
Abstract:
AbstractSnow avalanches threaten a large part of the residential area of Bolungarvik, a town of 1100 inhabitants located in the Vestfirðir peninsula, northwest Iceland. Methods for the complete protection of all the houses were requested by the Ministry of Environment. As conventional deflecting and catching dams were not feasible due to avalanche velocities of > 40 m s–1 in the actual defence area, a huge open pit built into the lower mountainside was proposed. The pit is designed to dissipate the energy of avalanches of any expected size. It is 1000 m long, and the upper and lower pit wal
APA, Harvard, Vancouver, ISO, and other styles
45

Nazarkevych, M. A., and O. A. Troyan. "Identification of latent images in printed documents." Scientific Bulletin of UNFU 29, no. 3 (2019): 120–24. http://dx.doi.org/10.15421/40290325.

Full text
Abstract:
The protection of printed documents plays an important role in the information security of the state. The problems of the development of graphic methods of document protection are analysed. The analysis showed that there is a certain gap in document protection and the control of originality, and also the need for effective protection of documents to prevent their falsification. The possibility to improve the protection result by using latency for the effectiveness of document security is considered. This method allows providing a high level security of information in printed form, leaving no r
APA, Harvard, Vancouver, ISO, and other styles
46

Azarenko, O., Yu Honcharenko, M. Diviziniuk, R. Shevchenko, and O. Shevchenko. "METHODS OF ASSESSING TERRORIST THREATS TO STRATEGIC FACILITIES OF THE STATE." Municipal economy of cities 6, no. 180 (2023): 187–95. http://dx.doi.org/10.33042/2522-1809-2023-6-180-187-195.

Full text
Abstract:
The study highlights the main regularities of preparation and execution of a terrorist act from the standpoint of considering a terrorist emergency as a spatiotemporal process. It is proposed to use the expert method of scenarios to assess terrorist threats to strategic objects. Ensuring the national security of Ukraine is a multifaceted problem, which includes military and political, economic and informational security, protection of the state border, and civil defence. Solving these component tasks is impossible without taking into account the possible terrorist impact on the strategic objec
APA, Harvard, Vancouver, ISO, and other styles
47

Matytsin, D. E. "Defense of Rights and Interests of Participants of Remote Investment Transactions." Journal of Law and Administration 18, no. 3 (2022): 32–38. http://dx.doi.org/10.24833/2073-8420-2022-3-64-32-38.

Full text
Abstract:
Introduction. Article is devoted to protection and defense of rights and legitimate interests of participants of remote investment transactions. It is noted that the Federal Law №69-FZ «On Protection and Encouragement of Capital Investments in the Russian Federation» in fact does not regulate any protection of investments but only those based on a special agreement. As for the content of this agreement, proceeding from the provisions of Articles 9-10 of this Federal Law, it also regulates only some particular aspects of protection of investments. Consideration of protection in general by analo
APA, Harvard, Vancouver, ISO, and other styles
48

Ravi1,, Panuganti. "Empowering Security with Machine Learning for Ransomware and Malware Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30675.

Full text
Abstract:
Due to the increase and frequency of network attacks, network security protection needs to be established[1]. The project focuses on using machine learning technology to detect ransomware and malware and aims to improve computer security. This work involves using advanced algorithms and models to analyze different types of data to identify patterns associated with crime. The proposed system extracts relevant features from various data points, including archive behavior, network traffic, and physical interactions. These features are used to train machine learning models to distinguish between g
APA, Harvard, Vancouver, ISO, and other styles
49

Mazurenko, Olena. "FORMS AND PROTECTION METHODS OF LABOR RIGHTS OF EMPLOYEES ON LEGISLATION OF UKRAINE." Law Journal of Donbass 74, no. 1 (2021): 36–42. http://dx.doi.org/10.32366/2523-4269-2021-74-1-36-42.

Full text
Abstract:
The article is devoted to the research of forms and protection methods of labor rights and legitimate interests of employees. There is emphasized that the activities of state authorities to protect labor rights and legitimate interests of employees are carried out in statutory forms of activity, where the judicial form of protection is the most effective and complete regarding the legal possibilities of deciding on the case in all its aspects and with the possibility of using the state coercion in case of non-compliance with the court decision. The court as a body that protects the labor right
APA, Harvard, Vancouver, ISO, and other styles
50

Xiao, Xingpeng, Yaomin Zhang, Jian Xu, Wenkun Ren, and Junyi Zhang. "Assessment Methods and Protection Strategies for Data Leakage Risks in Large Language Models." Journal of Industrial Engineering and Applied Science 3, no. 2 (2025): 6–15. https://doi.org/10.70393/6a69656173.323736.

Full text
Abstract:
Large Language Models (LLMs) have demonstrated remarkable capabilities in natural language processing tasks, yet their inherent vulnerabilities to data leakage pose significant security and privacy risks. This paper presents a comprehensive analysis of assessment methods and protection strategies for addressing data leakage risks in LLMs. A systematic evaluation framework is proposed, incorporating multi-dimensional risk assessment models and quantitative metrics for vulnerability detection. The research examines various protection mechanisms across different stages of the LLM lifecycle, from
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!