Academic literature on the topic 'Private defense'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Private defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Private defense"

1

Gorr, Michael. "Private Defense." Law and Philosophy 9, no. 3 (August 1990): 241. http://dx.doi.org/10.2307/3504802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gorr, Michael. "Private defense." Law and Philosophy 9, no. 3 (August 1990): 241–68. http://dx.doi.org/10.1007/bf01406530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sangero, Boaz. "A New Defense for Self-Defense." Buffalo Criminal Law Review 9, no. 2 (January 1, 2006): 475–559. http://dx.doi.org/10.1525/nclr.2006.9.2.475.

Full text
Abstract:
Abstract Private defense, like self-defense, has been virtually undisputed both in the past and present and even taken for granted, and perhaps particularly for this reason, sufficient attention has not always been given to the rationale underlying private defense. As a result, the legal arrangements set for private defense in the different legal systems are deficient, inconsistent, and, at times, replete with internal contradictions. This article seeks to propose a sound rationale for the concept of private defense. It begins by attempting to clearly and precisely delineate the scope of the defense and weed out cases that are occasionally (and, I maintain, mistakenly) included in the framework of its scope by means of two general and imperative distinctions: between justification and excuse and between the definitive components of offenses and those of defenses. With regard to the first distinction, I consider the validity of its application and its possible implications for private defense. Since the validity of the second distinction is undisputed as an empirical fact (at least formally) in all modern penal codes, the question raised is whether there is a significant difference between the definition of offenses and the definition of defenses. The answer to this question is relevant to a number of issues, and of particular relevance to private defense are its implications for the application of the principle of legality and with regard to the mental element that should be required of the actor in such situations. Next I embark on a discussion of the various theories competing for predominance as elucidations of private defense. These theories and this discussion then serve as the background and foundation for the construction of the article's proposed rationale for private defense. The novelty of this rationale is in its integrative approach, melding a number of the proposed justifications for self-defense, rather than taking the traditional path of espousing one all-excluding rationale.
APA, Harvard, Vancouver, ISO, and other styles
4

Gómez Reyes, José Alfredo. "Los Derechos humanos en la legítima defensa y el uso proporcional de la fuerza." Enfoques Jurídicos, no. 3 (February 25, 2021): 23–34. http://dx.doi.org/10.25009/ej.v0i3.2560.

Full text
Abstract:
RESUMEN: El presente artículo aborda un punto de vista teórico-práctico sobre la legítima defensa como causa de justificación de los delitos, así como el uso proporcional de la fuerza en la defensa de bienes jurídicos tutelados encomendados a cuerpos de seguridad pública y a los de seguridad privada. Todo ello, desde la perspectiva de los derechos humanos.ABSTRACT: This essay addresses a theoretical-practical point of view on legitimate defense as a cause of justification for crimes, as well as the proportional use of force in the defense of protected legal assets encompassed by public security bodies and those of private security. All this, from the perspective of human rights.Keywords: Human rights; legitimate defense; proportional use of force.
APA, Harvard, Vancouver, ISO, and other styles
5

ELBOW, PETER. "In Defense of Private Writing." Written Communication 16, no. 2 (April 1999): 139–70. http://dx.doi.org/10.1177/0741088399016002001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Owaydhah, Khalid, and Mohamad Ismail bin Mohamad Yunus. "The Right of Private Defense against Non-Accountable Offenders and in Defense of the Chastity of Women under Islamic Law." IIUM Law Journal 25, no. 2 (December 31, 2017): 257–70. http://dx.doi.org/10.31436/iiumlj.v25i2.317.

Full text
Abstract:
The right of self-defense under Islamic law (Shariah) distinguishes between two concepts: private and public defense. In this article, legal and practical manifestations of the contemporary legal issue of private defense in the case of physical assaults made by non-accountable (mukallaf) offenders, such as minors and insane persons are focused. Aside from that, this article also analyses the use of private defense to protect the chastity of a woman. The four conditions to exercise the right of private defense are highlighted. In order to explore the effects of private defense, the significance of keeping the lawful measures and exceeding the right of self-defense are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Henri, Sébastien, Gines Garcia-Aviles, Pablo Serrano, Albert Banchs, and Patrick Thiran. "Protecting against Website Fingerprinting with Multihoming." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 89–110. http://dx.doi.org/10.2478/popets-2020-0019.

Full text
Abstract:
AbstractAnonymous communication tools, such as Tor, are extensively employed by users who want to keep their web activity private. But recent works have shown that when a local, passive adversary observes nothing more than the timestamp, size and direction (incoming or outgoing) of the packets, it can still identify with high accuracy the website accessed by a user. Several defenses against these website fingerprinting attacks have been proposed but they come at the cost of a significant overhead in traffic and/or website loading time. We propose a defense against website fingerprinting which exploits multihoming, where a user can access the Internet by sending the traffic through multiple networks. With multihoming, it is possible to protect against website fingerprinting by splitting traffic among the networks, i.e., by removing packets from one network and sending them through another, whereas current defenses can only add packets. This enables us to design a defense with no traffic overhead that, as we show through extensive experimentation against state-of-the-art attacks, reaches the same level of privacy as the best existing practical defenses. We describe and evaluate a proof-ofconcept implementation of our defense and show that is does not add significant loading-time overhead. Our solution is compatible with other state-of-the-art defenses, and we show that combining it with another defense further improves privacy.
APA, Harvard, Vancouver, ISO, and other styles
8

Parekh, M., H. Majeed, T. Khan, A. Khan, S. Khalid, N. Khwaja, R. Khalid, M. Khan, I. Rizqui, and I. Jehan. "Fc24-01 - Ego defense mechanisms in pakistani medical students: a cross sectional analysis." European Psychiatry 26, S2 (March 2011): 1945. http://dx.doi.org/10.1016/s0924-9338(11)73649-5.

Full text
Abstract:
BackgroundEgo defense mechanisms, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. Vaillants’ proposed Hierarchy of Defenses states that mature defenses are associated with better adaptive functioning and health, as opposed to immature defense which are correlated negatively with measures of adaptive adult functioning.ObjectivesThis study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population.MethodsA questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire(DSQ-40) individually and as grouped under Mature, Immature, and Neurotic factors.ResultsNeurotic defenses had a higher mean score(5.62) than Mature(5.60) and Immature(4.78) mechanisms. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p< 0.05).ConclusionsNeurotic mechanisms are more commonly encountered than Mature or Immature mechanisms among medical students of Karachi, and this could reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.
APA, Harvard, Vancouver, ISO, and other styles
9

PERSKY, JOSEPH. "Rawls's Thin (Millean) Defense of Private Property." Utilitas 22, no. 2 (May 10, 2010): 134–47. http://dx.doi.org/10.1017/s0953820810000051.

Full text
Abstract:
This article suggests that Rawls's break with early utilitarians is not so much over the greatest happiness principle as it is over the relation of the institution of private property to justice. In this respect Rawls is very close to John Stuart Mill, arguing for a cleansed or tamed version of the institution. That said, Rawls's defense of private property remains very thin and highly idealized, again following Mill. If Hume and Bentham fail to demonstrate their claims, Rawls and Mill do little better. Rawls, like Mill, has constructed a challenging standard, admits to severe limitations on our empirical knowledge, and remains deeply ambivalent over the role of private property.
APA, Harvard, Vancouver, ISO, and other styles
10

Simón Ruiz, Inmaculada. "Conflictos ambientales y conflictos ambientalistas en el México porfiriano / Environmental Conflicts and Environmentalist Conflicts in Porfirian Mexico." Estudios Demográficos y Urbanos 25, no. 2 (May 1, 2010): 363. http://dx.doi.org/10.24201/edu.v25i2.1354.

Full text
Abstract:
En estas páginas vamos a hablar de conflictos ambientalistas en perspectiva histórica. Se presentarán dos estudios de caso en torno al servicio público o privado del agua en la Ciudad de México y al abastecimiento de la misma desde el Desierto de los Leones durante el porfiriato. Las partes en el conflicto serán: los empresarios particulares, el gobierno del Ayuntamiento de la Ciudad de México, el gobierno del Distrito Federal y el poder central. Presentaremos el conflicto como una parte del enfrentamiento entre el poder local y el poder central en un momento crítico de la historia mexicana previo a la Revolución, e introduciremos en el debate la preocupación del momento por cuestiones ambientales. Producto de este enfrentamiento fueron las primeras leyes de protección ambiental entendidas como defensa de un “proyecto nacional” en el que se considera la defensa del medio ambiente como defensa del patrimonio de la nación. AbstractThis paper discusses environmentalist conflicts in a historical perspective. Two case studies will be presented on public and private water service in Mexico City and water supplies from Desierto de los Leones during the time of Porfirio Díaz. The parties in the conflict include: private entrepreneurs, the Mexico City Town Hall government, the Federal District government and central power. The conflict is presented as part of a con­frontation between local and central power at a critical point in Mexican history prior to the Revolution and the debate will include environmental concerns of the time. This confrontation led to the first laws of environmental protection, understood as the defense of a “national Project” in which the defense of the environment is regarded as the defense of the nation’s heritage.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Private defense"

1

Dunar, Charles J. Mitchell Jared L. Robbins Donald L. "Private military industry analysis private and public companies /." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FDunar%5FMBA.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2007."
Advisor(s): Dew, Nicholas ; Hudgens, Bryan J. "December 2007." "MBA professional report"--Cover. Description based on title screen as viewed on January 10, 2008. Includes bibliographical references (p. 87-127). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Richardson, Robert R. "Defense co-production : collaborative national defense /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FRichardson.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jaksec, Gregory M. "Public-private-defense partnering in critical infrastructure protection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FJaksec.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Ted Lewis. "March 2006." Includes bibliographical references (p.41-45). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Low, Kuan Hong. "Public-private partnerships in defense acquisition programs-defensible?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLow_Kuan.pdf.

Full text
Abstract:
Thesis (M.S. in Business Administration)--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Summers, Don ; San Miguel, Joseph. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: PPP, public-private partnership, defense contracting, defense contracting, finance, Singapore, U.S., UK, Australia, off-balance sheet Includes bibliographical references (p. 53-61). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Olds, David A. "Food defense management practices in private country clubs." Diss., Kansas State University, 2010. http://hdl.handle.net/2097/6651.

Full text
Abstract:
Doctor of Philosophy
Department of Hospitality Management and Dietetics
Carol W. Shanklin
The purpose of this study was to survey country club professionals’ importance perceptions of food defense and the frequency with which preventive practices were implemented in their clubs to prevent bioterrorism. Gaps between importance perceptions and practice frequency were compared with concern of food terrorism and practice frequency implementation. Perceived self-efficacy measures and perceived barriers were compared with motivations to develop a food defense management plan and practice frequency implementation. Importance perceptions and practice frequencies were studied to ascertain if there were differences among operational factors. Club professionals with smaller gaps implemented preventive practices more frequently. Club professionals with higher self-efficacy levels were more motivated to develop food defense management plans and implemented preventive practices more frequently. Club professionals with higher barriers were less motivated to develop food defense management plans and implemented preventive practices less frequently. The field study component investigated food security practices in private country clubs. Club manager interviews and observations of operational practices were conducted. Most club managers stated that they did not think their clubs were at risk of a bioterrorist attack. Cost and lack of need were identified as barriers towards implementing a food defense management plan. Club employees were perceived to be more likely to initiate a bioterrorism attack than non-employees. Background checks and good employment practices were perceived as effective in increasing food security in clubs. Most clubs did not monitor arrivals and over half did not secure their chemicals. Based on the results of the field study, the researcher recommended several actions that could improve food security in country clubs including installing video surveillance and developing disaster management plans that include food defense. Recommendations for future research included continued examination of club managers’ self-efficacy perceptions towards biosecurity and identifying barriers to food defense implementation in other retail foodservice segments.
APA, Harvard, Vancouver, ISO, and other styles
6

Stallworth, Rachel. "Private Sector Defense Contractor Management Strategies for Contract Fulfillment." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5420.

Full text
Abstract:
Private sector U.S. defense contractors failing to meet contract objectives experience lower profitability, pay costly penalties, and risk survivability. Using the theory of contracts, the purpose of this multiple case study was to the explore strategies that some leaders of U.S. defense contracting businesses use to meet all the contract terms with the U.S. Department of Defense. Data were collected from 5 leaders of private sector defense contracting companies in northwest Florida through face-to-face, semistructured interviews and through a review of operations manuals, quality assurance policy manuals, and archived U.S. Department of Defense contracts. During data analysis using Yin's 5-step process of compiling, disassembling, reassembling, interpreting, and concluding the data, 4 themes on strategies emerged: (a) communication strategy for successful completion of contracts, (b) technology strategy to monitor contract compliance, (c) training strategy for program managers, and (d) subcontractor selection strategy. The findings indicated that communication among all contract parties was an essential component of each of the 4 themes. Computerizing the contracting workflow to monitor compliance efforts, training program managers for effective oversight of contract compliance, and selecting subcontractors were vital elements of the strategies private sector defense contractors used to meet all the terms and conditions of U.S. Department of Defense contracts. The implications for positive social change include the potential for private sector defense contractors to improve the strength of the defense of the northwest Florida community, lower unemployment, and provide a safer environment for humanity.
APA, Harvard, Vancouver, ISO, and other styles
7

Snyder, Elizabeth A. "Public or private : the outsourcing dilemma within the Department of Defense /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA295657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pitts, Bobby. "DLA/FedEx premium service effects on defense distribution inventories and shipments." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2882.

Full text
Abstract:
This research reviews and evaluates the FedExâ s Premium Service Program currently being used by DLA customers. The research will examine some of the benefits and costs of this co-locating of DOD warehousing and shipping operation managed by a commercial express transportation carrier. The research will view the possible benefits gained through commercial inventory and transportation practices by partnering a third party logistics service with the Defense Transportation System. DLA and FedEx have formed a partnership called DLA Premium Service. Premium Service is the only DoD warehousing operation that is co-located with and managed by a commercial express transportation carrier at FedEx main transportation hub. Premium Service System allows users to position materials in the Memphis facility for expedited delivery to the required destinations worldwide. All items are guaranteed, under contract, to be delivered to their continental U.S. (CONUS) destination within 24 hours and within 48 hours to outside of CONUS (OCONUS) to the major airports serviced by FedEx. Items will be delivered to the OCONUS final destination 24 hours of release from customs holding area at the airport. The service provides advance notification to streamline customs requirements of all OCONUS shipments.
APA, Harvard, Vancouver, ISO, and other styles
9

Paquette, Richard A. "Comparison of environmental remediation contracting approaches between the Department of Defense and the Private sector." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401548.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, Dec. 2001.
Thesis advisor(s): Matthews, David F.; Simon, Cary. "December 2001." Includes bibliographical references (p. 71-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
10

Turner, Robert B. "Implementation of electronic data interchange in the Department of Defense: lessons learned from private industry." Thesis, Monterey, California. Naval Postgraduate School, 1993. http://hdl.handle.net/10945/44440.

Full text
Abstract:
Approved for public release, distribution is unlimited
The Department of Defense (DoD) has emphasized Electronic Data Interchange (EDI) since 1988 when the Deputy Secretary of Defense issued a policy directive that EDI was to become 'the way of doing business' for DoD in the future. The focus of this research is on how private industry is implementing EDI, and specifically how EDI is being used in the procurement and acquisitions environment. The results from a survey of private industry showed that (1) EDI use will continue to grow in the procurement environment and that most impediments to EDI will be resolved with time and experience; (2) EDI must be adopted by the critical mass before the full benefits and savings will be recognized by DoD and industry; (3) top level management support and a detailed, well thought out strategic EDI plan are mandatory for successful implementation of EDI; and (4) the transaction sets currently being used by private industry for procurements and acquisitions limit DoD EDI opportunities for large purchases. Recognizing these conclusions, recommendations to DoD are then presented.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Private defense"

1

United States. Commission on Roles and Missions of the Armed Forces. and National Defense Research Institute (U.S.), eds. Expanding private production of defense services. Santa Monica, CA: RAND, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moitra, Anukul Chandra. The law of private defence. 5th ed. Allahabad: University Book Agency, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Daniel, Burton-Rose, ed. Private warriors. New York: Verso, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Law relating to private defence. Lahore: Law Book Land, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Private matters: In defense of the personal life. Emeryville, CA: Seal Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Private matters: In defense of the personal life. Reading, Mass: Addison-Wesley Pub., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Taite, Carsen. The best defense. Valley Falls, NY: Bold Strokes Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Flynn, Stephen E. Neglected defense: Mobilizing the private sector to support homeland security. [New York, NY]: Council on Foreign Relations, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

America's covert warriors: Inside the world of private military contractors. Washington, D.C: Potomac Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Best defense: Beth Bowman, P.I. Waterville, Maine: Thorndike Press, A part of Gale, Cengage Learning, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Private defense"

1

Gottschalk, Petter. "Attorney defense strategies." In Private Policing of Economic Crime, 179–92. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003142607-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

French, Roger Allan, and Timothy Grance. "A Case for Public and Private Review of Developing it Security Standards." In Cyberspace Security and Defense: Research Issues, 25–42. Dordrecht: Springer Netherlands, 2005. http://dx.doi.org/10.1007/1-4020-3381-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Le, Dac-Nhuong, Vo Nhan Van, and Trinh Thi Thuy Giang. "A New Private Security Policy Approach for DDoS Attack Defense in NGNs." In Advances in Intelligent Systems and Computing, 1–10. New Delhi: Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2757-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

De Schryver, Tom, and Gert Demmink. "Contract-Boundary-Spanning Governance Initiatives in the International Defense Supply Chain of the F-35 Program." In NL ARMS, 219–42. The Hague: T.M.C. Asser Press, 2021. http://dx.doi.org/10.1007/978-94-6265-471-6_12.

Full text
Abstract:
AbstractInternational cooperation in the American-led F-35 program inherently triggers national security concerns. Consequently, the multiple exports in the supply chain are subject to intricate licensing and export controls. Drawing on insights from governance and contract theory we introduce a theoretical lens that highlights some important trade compliance challenges in supply chain networks. In this chapter, contract-boundary-spanning governance mechanisms are defined as increasingly sophisticated hard or soft governance mechanisms in the private law sphere that can be deployed by any public or private stakeholder to govern international supply chains. We find contract-boundary-spanning governance initiatives by state and private stakeholders in the defense supply chain of the F-35 program. At the same time, we argue that while serious efforts have been made by various state actors and legislators to reduce the burden in trade compliance requirements in the F-35 program, the industry is still facing a considerable number of compliance challenges. We argue that more contract-boundary-spanning initiatives by the private parties in defense supply chain network are needed if these challenges are to be successfully overcome.
APA, Harvard, Vancouver, ISO, and other styles
5

Kis, András, and Gábor Ungvári. "Commentary: An Economic View on the Prospects of a Flood Defense Related Development Rights Market in Flanders." In Nature-Based Flood Risk Management on Private Land, 105–8. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23842-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fernández-Villacañas Marín, Manuel A. "The Transformation of the Defense and Security Sector to the New Logistics 4.0: Public–Private Cooperation as a Necessary Catalyst Strategy." In Smart Innovation, Systems and Technologies, 293–303. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9155-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eddy, Wesley M. "SYN Cookie Defense." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_275-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Wenyuan. "Jamming Attack Defense." In Encyclopedia of Cryptography, Security and Privacy, 1–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_632-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ekström, Thomas, and Michael Dorn. "Public Private Partnerships in Defence Acquisition." In Performance Based Logistics, 303–24. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-8349-3726-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Millan, Matteo. "From “state protection” to “private defence”." In Corporate Policing, Yellow Unionism, and Strikebreaking, 1890–1930, 242–58. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Routledge studies in modern history: Routledge, 2020. http://dx.doi.org/10.4324/9780429354243-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Private defense"

1

R. Simpson, William, and Kevin E. Foltz. "Network Defense in an End-to-End Paradigm." In 9th International Conference on Natural Language Processing (NLP 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101414.

Full text
Abstract:
Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets when encrypted. This decryption implies that the defensive suite has access to the private keys of the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly with each other. In an end-to-end paradigm, maintaining confidentiality through unbroken end-toend encryption, the private key resides only with the holder-of-key in the communication and on a distributed computation of inspection and reporting. This paper examines a formulation that is pertinent to the Enterprise Level Security (ELS) framework.
APA, Harvard, Vancouver, ISO, and other styles
2

Szu, Harold, and Amir Mehmood. "Authenticated, private, and secured smart cards (APS-SC)." In Defense and Security Symposium, edited by Harold H. Szu. SPIE, 2006. http://dx.doi.org/10.1117/12.684205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen, Minh, Priyanka Samanta, and Saptarshi Debroy. "Analyzing Moving Target Defense for Resilient Campus Private Cloud." In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE, 2018. http://dx.doi.org/10.1109/cloud.2018.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Glassco, David H. J., and Jordan C. Glassco. "Enabling private and public sector organizations as agents of homeland security." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.665294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Sherbaz, Ali, Chris Adams, and Sabah Jassim. "Private synchronization technique for heterogeneous wireless network (WiFi and WiMAX)." In SPIE Defense and Security Symposium, edited by Sos S. Agaian and Sabah A. Jassim. SPIE, 2008. http://dx.doi.org/10.1117/12.777580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stytz, Martin R., and Sheila B. Banks. "Enabling distributed simulation multilevel security using virtual machine and virtual private network technology." In Defense and Security Symposium, edited by Belur V. Dasarathy. SPIE, 2007. http://dx.doi.org/10.1117/12.724256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rendleman, James D., and Robert Ryals. "Private defense of space systems and Letters of Marque and Reprisal." In AIAA SPACE 2015 Conference and Exposition. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2015. http://dx.doi.org/10.2514/6.2015-4571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shen, Weiran, Weizhe Chen, Taoan Huang, Rohit Singh, and Fei Fang. "When to Follow the Tip: Security Games with Strategic Informants." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/52.

Full text
Abstract:
Although security games have attracted intensive research attention over the past years, few existing works consider how information from local communities would affect the game. In this paper, we introduce a new player -- a strategic informant, who can observe and report upcoming attacks -- to the defender-attacker security game setting. Characterized by a private type, the informant has his utility structure that leads to his strategic behaviors. We model the game as a 3-player extensive-form game and propose a novel solution concept of Strong Stackelberg-perfect Bayesian equilibrium. To compute the optimal defender strategy, we first show that although the informant can have infinitely many types in general, the optimal defense plan can only include a finite (exponential) number of different patrol strategies. We then prove that there exists a defense plan with only a linear number of patrol strategies that achieve the optimal defender's utility, which significantly reduces the computational burden and allows us to solve the game in polynomial time using linear programming. Finally, we conduct extensive experiments to show the effect of the strategic informant and demonstrate the effectiveness of our algorithm.
APA, Harvard, Vancouver, ISO, and other styles
9

Spitz, Olivier, Andreas Herdt, Gregory Maisons, Mathieu Carras, Wolfgang Elsaser, and Frederic Grillot. "Chaos synchronization in mid-infrared quantum cascade lasers for private free-space communication." In 2021 IEEE Research and Applications of Photonics in Defense Conference (RAPID). IEEE, 2021. http://dx.doi.org/10.1109/rapid51799.2021.9521424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maier, Jonathan R. A., James M. McLellan, Gregory Mocko, Georges M. Fadel, and Mark Brudnak. "Lightweight Engineering of Military Vehicles Through Requirements Analysis and Function Integration." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86562.

Full text
Abstract:
The trend toward lighter-weight vehicles in the private sector has been pushed by demands to improve fuel economy, improve dynamic performance, and reduce material and transportation costs. The same demands exist and are even more acute for military vehicles. The reduction of weight across a military vehicle platform can affect hundreds of thousands of vehicles with dramatic ramifications for military budgets, logistic support, deployment time and cost, and other factors critical to national defense. In this paper we report on methods developed for requirements analysis and function integration based on a modeling framework (developed in previous work) which captures requirements, functions, working principles, components, component parameters, test measures, and tests. We also show that the problem of assigning the mass of individual components to requirements is not solvable in practice. The methods are demonstrated using a case study of the United States Department of Defense Family of Medium Tactical Vehicles (FMTV).
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Private defense"

1

Singh, Surya V., and Aaron I. Thronas. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems. Office of Scientific and Technical Information (OSTI), January 2010. http://dx.doi.org/10.2172/1023133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kleinknecht, Henry F., Anella J. Oliva, Rebecca L. Yovich, Nicole M. Ellis, and Meredith H. Johnson. Defense Infrastructure: DoD Workforce Employed to Conduct Public-Private Competitions Under the DoD Competitive Sourcing Program. Fort Belvoir, VA: Defense Technical Information Center, February 2005. http://dx.doi.org/10.21236/ada432640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Donohue, Sean, and Lina M. Downing. Capital Budgeting: Do Private Sector Methods of Budgeting for Capital Assets Have Applicability to the Department of Defense. Fort Belvoir, VA: Defense Technical Information Center, December 2005. http://dx.doi.org/10.21236/ada443411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Flagg, Melissa, and Jack Corrigan. Ending Innovation Tourism: Rethinking the U.S. Military’s Approach to Emerging Technology Adoption. Center for Security and Emerging Technology, July 2021. http://dx.doi.org/10.51593/20210030.

Full text
Abstract:
As dual-use technologies transform the national security landscape, the U.S. Department of Defense has established a variety of offices and programs dedicated to bringing private sector innovation into the military. However, these efforts have largely failed to drive cutting-edge commercial technology into major military platforms and systems. This report examines the shortcomings of the DOD’s current approach to defense innovation and offers recommendations for a more effective strategy.
APA, Harvard, Vancouver, ISO, and other styles
5

Frausto, Victor A., Trinh E. Hoang, Richard Obregon, and Tuan-Anh T. Pham. An Analysis of the U.S. Navy's Military Housing Privatization Initiative and the Application of Transaction Cost Economics as a Component of the Decision Framework for the Establishment of Future Partnerships Between the Department of Defense and Private Sector Industry. Fort Belvoir, VA: Defense Technical Information Center, December 2004. http://dx.doi.org/10.21236/ada429312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Raffoul, Jaqueline. Documento de Trabalho. Departamento de Estudos Econômicos, June 2021. http://dx.doi.org/10.52896/dee.dt2.021.

Full text
Abstract:
"Working Document" publications produced by Cade's (Administrative Council of Competition Defense) Department of Economic Studies is intended to disseminate economic studies relating to Cade's areas of activity, either to improve the analysis of mergers and acquisitions, or to help in the conduct investigation process harmful to free competition and to promote competition advocacy in the public and private sectors. In addition to giving visibility to the work of Cade's technical staff and people involved in related topics, it is expected to improve the institution's analysis.
APA, Harvard, Vancouver, ISO, and other styles
7

Oliver, Derek M. A Cost Reduction Alternative for the Department of Defense Global Privately Owned Vehicle Contract. Fort Belvoir, VA: Defense Technical Information Center, February 2012. http://dx.doi.org/10.21236/ada566221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ashley, Caitlyn, Elizabeth Spencer Berthiaume, Philip Berzin, Rikki Blassingame, Stephanie Bradley Fryer, John Cox, E. Samuel Crecelius, et al. Law and Policy Resource Guide: A Survey of Eminent Domain Law in Texas and the Nation. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, 2017. http://dx.doi.org/10.37419/eenrs.eminentdomainguide.

Full text
Abstract:
Eminent Domain is the power of the government or quasi-government entities to take private or public property interests through condemnation. Eminent Domain has been a significant issue since 1879 when, in the case of Boom Company v. Patterson, the Supreme Court first acknowledged that the power of eminent domain may be delegated by state legislatures to agencies and non-governmental entities. Thus, the era of legal takings began. Though an important legal dispute then, more recently eminent domain has blossomed into an enduring contentious social and political problem throughout the United States. The Fifth Amendment to the United States Constitution states, “nor shall private property be taken for public use, without just compensation.” Thus, in the wake of the now infamous decision in Kelo v. City of New London, where the Court upheld the taking of private property for purely economic benefit as a “public use,” the requirement of “just compensation” stands as the primary defender of constitutionally protected liberty under the federal constitution. In response to Kelo, many state legislatures passed a variety of eminent domain reforms specifically tailoring what qualifies as a public use and how just compensation should be calculated. Texas landowners recognize that the state’s population is growing at a rapid pace. There is an increasing need for more land and resources such as energy and transportation. But, private property rights are equally important, especially in Texas, and must be protected as well. Eminent domain and the condemnation process is not a willing buyer and willing seller transition; it is a legally forced sale. Therefore, it is necessary to consider further improvements to the laws that govern the use of eminent domain so Texas landowners can have more assurance that this process is fair and respectful of their private property rights when they are forced to relinquish their land. This report compiles statutes and information from the other forty-nine states to illustrate how they address key eminent domain issues. Further, this report endeavors to provide a neutral third voice in Texas to strike a more appropriate balance between individual’s property rights and the need for increased economic development. This report breaks down eminent domain into seven major topics that, in addition to Texas, seemed to be similar in many of the other states. These categories are: (1) Awarding of Attorneys’ Fee; (2) Compensation and Valuation; (3) Procedure Prior to Suit; (4) Condemnation Procedure; (5) What Cannot be Condemned; (6) Public Use & Authority to Condemn; and (7) Abandonment. In analyzing these seven categories, this report does not seek to advance a particular interest but only to provide information on how Texas law differs from other states. This report lays out trends seen across other states that are either similar or dissimilar to Texas, and additionally, discusses interesting and unique laws employed by other states that may be of interest to Texas policy makers. Our research found three dominant categories which tend to be major issues across the country: (1) the awarding of attorneys’ fees; (2) the valuation and measurement of just compensation; and (3) procedure prior to suit.
APA, Harvard, Vancouver, ISO, and other styles
9

Ayala, David, Ashley Graves, Colton Lauer, Henrik Strand, Chad Taylor, Kyle Weldon, and Ryan Wood. Flooding Events Post Hurricane Harvey: Potential Liability for Dam and Reservoir Operators and Recommendations Moving Forward. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, September 2018. http://dx.doi.org/10.37419/eenrs.floodingpostharvey.

Full text
Abstract:
When Hurricane Harvey hit the Texas coast as a category 4 hurricane on August 25, 2017, it resulted in $125 billion in damage, rivaling only Hurricane Katrina in the amount of damage caused. It also resulted in the deaths of 88 people and destroyed or damaged 135,000 homes. Much of that devastation was the result of flooding. The storm dumped over 27 trillion gallons of rain over Texas in a matter of days. Some parts of Houston received over 50 inches of rainfall. The potential liability that dam and reservoir operators may face for decisions they make during storm and flooding events has now become a major concern for Texas citizens and its elected officials. Law suits have now been instituted against the federal government for its operation of two flood control reservoirs, as well as against the San Jacinto River Authority for its operation of a water supply reservoir. Moreover, the issues and concerns have been placed on the agenda of a number of committees preparing for the 2019 Texas legislative session. This report reviews current dam and reservoir operations in Texas and examines the potential liability that such operators may face for actions and decisions taken in response to storm and flooding events. In Section III, the report reviews dam gate operations and differentiates between water supply reservoirs and flood control reservoirs. It also considers pre-release options and explains why such actions are disfavored and not recommended. In Section IV, the report evaluates liabilities and defenses applicable to dam and reservoir operators. It explains how governmental immunity can limit the exposure of state and federally-run facilities to claims seeking monetary damages. It also discusses how such entities could be subject to claims of inverse condemnation, which generally are not subject to governmental immunity, under Texas law as well as under the Fifth Amendment to the U.S. Constitution. In addition, the Section discusses negligence and nuisance claims and concludes that plaintiffs asserting either or both of these claims will have difficulty presenting successful arguments for flooding-related damage and harm against operators who act reasonably in the face of storm-related precipitation. Finally, Section V offers recommendations that dam and reservoir operators might pursue in order to engage and educate the public and thereby reduce the potential for disputes and litigation. Specifically, the report highlights the need for expanded community outreach efforts to engage with municipalities, private land owners, and the business community in flood-prone neighborhoods both below and above a dam. It also recommends implementation of proactive flood notification procedures as a way of reaching and alerting as many people as possible of potential and imminent flooding events. Finally, the report proposes implementation of a dispute prevention and minimization mechanism and offers recommendations for the design and execution of such a program.
APA, Harvard, Vancouver, ISO, and other styles
10

Defense Programs benchmarking in Chicago, April 1994: Identifying best practices in the pollution prevention programs of selected private industries. Office of Scientific and Technical Information (OSTI), December 1995. http://dx.doi.org/10.2172/251320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography