Academic literature on the topic 'Security Section'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Section.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Section"

1

Khin, Thandar Tun, Sandar Aung Aye, and Lwin Thant May. "GSM Based Fire Security System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1686–90. https://doi.org/10.5281/zenodo.3591292.

Full text
Abstract:
Telecommunication is a very important part of its life. This technology is used in a very sophisticated area like safety and security purpose. Using the GSM technology, telecommunication is conducive to save its life as well as households from fire accidents which have shown in this paper. In this paper, the overall circuit is constructed with six sections. The first section is power supply. The second section is temperature sensor and smoke sensor. The third section is Arduino. The fourth section is LCD display. The fifth section is fan, buzzer and water pump. The sixth section is GSM module.
APA, Harvard, Vancouver, ISO, and other styles
2

MR., SHIVAM KUMAR DR. SHAMBHU KUMAR SINGH. "STRENGTHENING CLOUD SECURITY AND DATA INTEGRITY WITH INNOVATIVE ENCRYPTION METHODS." International Journal For Technological Research In Engineering 11, no. 11 (2024): 1–11. https://doi.org/10.5281/zenodo.12670480.

Full text
Abstract:
Abstract - Cloud computing has transformed the IT industry by offering storage, computing power, network, and software services on demand over the internet. This allows clients to access these services remotely from anywhere, at any time, using any device. With this shift from personal computer storage to massive data centers, data security has become a major concern for cloud developers.In this paper, we propose a security model implemented in Cloud Analyst to enhance cloud storage security. This model uses various encryption algorithms and an integrity verification scheme to protect data. Th
APA, Harvard, Vancouver, ISO, and other styles
3

Sjoberg, Laura. "Failure and critique in critical security studies." Security Dialogue 50, no. 1 (2018): 77–94. http://dx.doi.org/10.1177/0967010618783393.

Full text
Abstract:
Debates imitates scholarship, which imitates debate. Using perspectives from both my policy debate career and my research career, this article argues that the enterprise of critique, whether in critical security studies or elsewhere, is always and already failing and failed. It proceeds in four sections. The first section sets up my entry into the problems of/with critique. The second section analyzes the types of dissonances inherent in the production of critical security studies scholarship. The third section theorizes those dissonances as failures – arguing that failure itself is a part of
APA, Harvard, Vancouver, ISO, and other styles
4

Munoz-Ausecha, Cesar, Juan Ruiz-Rosero, and Gustavo Ramirez-Gonzalez. "RFID Applications and Security Review." Computation 9, no. 6 (2021): 69. http://dx.doi.org/10.3390/computation9060069.

Full text
Abstract:
Radio frequency identification (RFID) is widely used in several contexts, such as logistics, supply chains, asset tracking, and health, among others, therefore drawing the attention of many researchers. This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy. A total of 62,685 records were downloaded from the Web of Science (WoS) and Scopus core databases and processed, reconciling the datasets to remove duplicates, resulting in 40,677 unique elements. Fundamental indicators were extracted and are presented, such as the citation numbe
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Jin Jiang, Mei He, Hong Ke Xu, Qi Wang, and Yong Mei Yang. "The Identified Method of Accident-Prone Section Based on Principal Component-Gray Clustering Analysis." Applied Mechanics and Materials 135-136 (October 2011): 1060–66. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1060.

Full text
Abstract:
In order to study the rapid and efficient identified method of accident-prone section in montane highway, the method of principal component - gray clustering analysis has been proposed. By deep analysis of the characteristics of accident-prone section, the identified indexes of accident-prone section have been screened out, the reducing dimensionality of principal component analysis and incomplete information processing of gray clustering analysis have been organically integrated, and the clustering weight coefficients are creatively determined based on the information content. Based on data i
APA, Harvard, Vancouver, ISO, and other styles
6

Rangel de Mesquita, Maria José. "Judicial review of Common Foreign and Security Policy by the ECtHR and the (re)negotiation on the accession of the EU to the ECHR." Maastricht Journal of European and Comparative Law 28, no. 3 (2021): 356–70. http://dx.doi.org/10.1177/1023263x20988241.

Full text
Abstract:
The article addresses the issue of judicial control of the implementation of Common Foreign and Security Policy at international regional level within the framework of the relaunching of the negotiation in view of the accession of the EU to the ECHR. Considering the extent of jurisdiction of the CJEU in respect of Common Foreign and Security Policy field in the light of its case law (sections 1 and 2), it analyses the question of judicial review of Common Foreign and Security Policy within international regional justice by the ECtHR in the light of the ongoing negotiations (section 3), in the
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Feifan, Yuncai Wang, Yuehui Sun, et al. "Key Space Enhancement in Chaotic Secure Communication Utilizing Monolithically Integrated Multi-Section Semiconductor Lasers." Photonics 10, no. 2 (2023): 213. http://dx.doi.org/10.3390/photonics10020213.

Full text
Abstract:
Chaotic secure communication schemes encounter a conflict of key space enhancement between the consistency and complexity of chaotic transceivers. In this paper, we propose a monolithically integrated multi-section semiconductor laser (MIMSL), used as a compact chaotic transceiver with an enhanced key space. The MIMSL consists of a distributed feedback (DFB) laser section, a semiconductor optical amplifier (SOA) section, two phase (P) sections and a passive optical waveguide. We simulate the dynamics of the MIMSL by applying the time-dependent coupled-wave equations for traveling-wave optical
APA, Harvard, Vancouver, ISO, and other styles
8

Brooks, Julia, and Rob Grace. "Confronting Humanitarian Insecurity." Journal of Humanitarian Affairs 2, no. 1 (2020): 11–20. http://dx.doi.org/10.7227/jha.030.

Full text
Abstract:
Violence against aid workers seeking to bring assistance and protection to vulnerable people amid ongoing armed conflicts, disasters or other crises has fuelled growing concern over how to protect the humanitarian mission. Based on semi-structured interviews conducted with 118 practitioners involved in humanitarian operations and security management, this article considers three under-analysed prongs of grappling with humanitarian insecurity. The first three sections, in turn, examine the pursuit of accountability at both the domestic and international levels, public advocacy efforts and confi
APA, Harvard, Vancouver, ISO, and other styles
9

VimalRosy, J., and S. Britto Ramesh Kumar. "Security Threats in Cloud Computing." Asian Journal of Computer Science and Technology 8, S1 (2019): 80–83. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1946.

Full text
Abstract:
Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and v
APA, Harvard, Vancouver, ISO, and other styles
10

Sheikh, Mahmood A., Syed Muhammad Bin Ahmed, and Afrasiab Ahmed Rana. "ECONOMIC SECURITY IN PAKISTAN: INDICATORS, ISSUES, IMPACTS AND WAY FORWARD." Pakistan Journal of Social Research 04, no. 01 (2022): 990–99. http://dx.doi.org/10.52567/pjsr.v4i1.1268.

Full text
Abstract:
Economic security is a critical component of a nation's overall well-being, encompassing various aspects such as sustainable growth, stable employment, and equitable wealth distribution. Pakistan, a developing country with a dynamic socio-economic landscape, faces multifaceted challenges in ensuring economic security for its populace. This article presents a comprehensive analysis of the indicators, issues, impacts, and potential pathways to enhance economic security in Pakistan and recommends certain key recommendations while comparing the economic conditions with other Asian economies. Compr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security Section"

1

Matotoka, Motlhatlego Dennis. "Section 37C of the Pension Funds Act, 24 of 1956 : a social security measure to escape destitution." Thesis, University of Limpopo, Turfloop Campus, 2013. http://hdl.handle.net/10386/1102.

Full text
Abstract:
Thesis (LLM. (Labour Law)) -- University of Limpopo, 2013<br>The study will analyse section 37C of the Pension Funds Act, 24 of 1956. This section limits the deceased’s freedom of testate by placing the death benefits and the control of the board of trustees who are tasked to distribute such benefits equitably among the dependants and nominees of the deceased. Section 37C of the Act was enacted to protect dependency by ensuring that the dependants of the deceased are not left in destitute. In order to achieve this, three duties are placed on the board of trustees namely, to identify the depend
APA, Harvard, Vancouver, ISO, and other styles
2

Bhusal, Lok Nath. "Poverty underestimation and relative strength of social security and economic globalisation in poverty reduction : perceptions survey evidence from Nepal and cross-section analysis from 119 developing countries." Thesis, Oxford Brookes University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.579520.

Full text
Abstract:
Persistence underdevelopment as reflected in different kinds of absolute poverty in the global south has instigated scholarly and policy debate on poverty measurement and poverty reduction. In terms of measuring poverty, different empirical investigations, relying on different theoretical traditions, have produced different ratios of poverty. However, not a single study has investigated the public perceptions of these official definitions and estimates of poverty. What do the members of public think about the official poverty measures and their associated poverty estimates? Regarding poverty r
APA, Harvard, Vancouver, ISO, and other styles
3

Sanders, Michael. "The USA PATRIOT Act and Punctuated Equilibrium." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2759.

Full text
Abstract:
Currently, Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001 appears to be stalled as a result of controversy over the intent and meaning of the law. Proponents of the title advocate the necessity of the act to combat modern terrorism, whereas opponents warn of circumventions of the Fourth Amendment of the U.S. Constitution. Using punctuated equilibrium as the theoretical foundation, the purpose of this case study was to explore the dialogue and legal exchanges between the American Civil L
APA, Harvard, Vancouver, ISO, and other styles
4

Jones, Jonathan. "The interpretation and effect of section 197 of the Labour Relations Act 66 of 1995." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52544.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2001.<br>ENGLISH ABSTRACT: Section 197 of the Labour Relations Act 66 of 1995 ensures the transfer of a contract of employment from an old employer to a new employer on the transfer of a business as a gomg concern. Although section 197 is mostly based on European and British statutes and regulations, one should not rely on foreign provisions when interpreting section 197 without careful consideration. It is only when we understand the inherent limitations of applying these provisions, that they can be of any help to formulate definitions for the
APA, Harvard, Vancouver, ISO, and other styles
5

Jakob, Olaf. "Perspectives on determining permanent disablement in South African occupational law." Thesis, North-West University, 2012. http://hdl.handle.net/10394/9068.

Full text
Abstract:
The right to be entitled to compensation for injuries sustained in the course of employment has always been an essential component of basic social security rights. Provision is made in the international sphere by the International Labour Organization and the United Nations. In the regional sphere there are standards that apply within the Southern African Development Community, and on a national level the rights are provided in terms of the Constitution of the Republic of South Africa, 1996, and the Compensation for Occupational Injuries and Diseases Act, 103 of 1993 (COIDA). COIDA provides for
APA, Harvard, Vancouver, ISO, and other styles
6

Telatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.

Full text
Abstract:
The thesis investigates the link between development and security - the ‘development-security nexus’- which emerged during the 1990s, facilitated by the formulation of human development and human security. It examines how this development-security nexus has evolved over time and has influenced the interrelated significance of development and security for international relations. The thesis questions this interdependence and analyses the theory and practice that see development and security issues as reciprocally reinforcing each other, in particular through a set of policies called Security Se
APA, Harvard, Vancouver, ISO, and other styles
7

Noyes, Alexander Hale. "Securing reform? : post-election power sharing and security sector reform in Zimbabwe, Kenya, and Togo, 2006-2013." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:d49f7715-486e-444f-ada3-ac82ff96db0b.

Full text
Abstract:
Power-sharing arrangements have become the default tool of international actors to resolve a vast range of conflicts worldwide, with a particular concentration in sub-Saharan Africa. Traditionally used to end high-intensity civil wars, recently power sharing has increasingly been used to terminate an array of lower-intensity conflicts, such as election-related violence in Togo in 2006 and Kenya and Zimbabwe in 2008. The thin but emerging scholarship on post-election power sharing is largely negative, maintaining that the model is unlikely to deliver the institutional reforms necessary to resol
APA, Harvard, Vancouver, ISO, and other styles
8

Denney, Lisa. "Thin security? : the challenge of engaging informal security actors in DFID's security sector reform programme in Sierra Leone." Thesis, Aberystwyth University, 2013. http://hdl.handle.net/2160/2a246333-453e-4ee3-b714-7a53c3e9eeb7.

Full text
Abstract:
The United Kingdom's Department for International Development (DFID) has undertaken a highly innovative development strategy in Sierra Leone, reforming the security sector of the post-conflict state in order to ensure a stable environment in which investment and development can occur. Yet in doing so, DFID has not engaged with the actual locus of security provision in Sierra Leone and the effectiveness of reforms thus remains limited. This thesis seeks to understand why DFID has been unable to engage with informal security actors in its security sector reform (SSR) programme in Sierra Leone. I
APA, Harvard, Vancouver, ISO, and other styles
9

Fielder, Jesse K. "Does Procedural Justice Matter in the Private Security Sector?: Comparing Public Perceptions of the Private Security and Public Policing Sector." Thesis, Griffith University, 2020. http://hdl.handle.net/10072/398873.

Full text
Abstract:
The private security industry is expanding rapidly. One explanation for this rapid growth has been the rise of ‘risk thinking’ (Beck, 1992; Button, 2002). Governments, organisations and individuals have become increasingly preoccupied with the idea of risk management and the management of crime. As a result of this rapid expansion, private security officers now find themselves dealing with an ever-increasing diversification of roles, tasks and responsibilities. These new functions are increasingly overlapping with duties and roles traditionally fulfilled by public police officers. Empirical re
APA, Harvard, Vancouver, ISO, and other styles
10

Nyamnjoh, Anye-Nkwenti. "Local ownership and democratic governance in security sector reform." Master's thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/24924.

Full text
Abstract:
Local ownership is a major component of what is considered best practice in contemporary peacebuilding. It seeks to reallocate authority between local and international actors in peacebuilding contexts. In its purest form, it requires that the design, implementation and evaluation of reform should be led by local actors. Therefore, under local ownership, external actors are circumscribed to a supporting role in post-conflict reconstruction. Local ownership is thus a critique of the tendency towards top-down internationally led peacebuilding reform. The primacy of local ownership is evident in
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security Section"

1

United States. Executive Office of the President., ed. Health Security Act section-by-section analysis. [Executive Office of the President], 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Steers, Robin. FSS, Field Security Section. Robin Steers, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brewer, Dennis C. Security Controls for Sarbanes-Oxley Section 404 IT Compliance. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daniel, Kent. Covariance risk, mispricing, and the cross section of security returns. National Bureau of Economic Research, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. Senate. Committee on Finance. Amendments to section 1619 of the Social Security Act: Report (to accompany S. 2209). U.S. G.P.O., 1986], 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, Home. Reform of Section 2 of the Official Secrets Act 1911. H.M.S.O., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quarterman, John S. Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance. John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oregon Dept. of State Police Tribal Gaming Section. Oregon State Police Tribal Gaming Section: Billings audit. Secretary of State, Audits Division, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Maine. Office of Health Planning and Development. Procedures manual, Section 1122 of the Social Security Act: Effective September 4, 1985. Maine Dept. of Human Services, Office of Health Planning and Development, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Security, Great Britain Department of Health and Social. Uprating of mobility allowance: Statement prepared pursuant to section 37A(4) of the Social Security Act 1975 as amended by section 3(2) of the Social Security Act 1979. H.M.S.O., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security Section"

1

Knott, Eugene F. "Test Security." In Radar Cross Section Measurements. Springer US, 1993. http://dx.doi.org/10.1007/978-1-4684-9904-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Murphy, Christopher J. "Approaching Section V." In Security and Special Operations. Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230625532_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonser, Charles F. "Introduction, Section I." In Security, Trade, and Environmental Policy. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4399-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bonser, Charles F. "Introduction, Section II." In Security, Trade, and Environmental Policy. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4399-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bonser, Charles F. "Introduction, Section III." In Security, Trade, and Environmental Policy. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4399-2_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thomsen, Dan. "Introduction to Security and Policy Section." In Handbook of Human Computation. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8806-4_66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Murphy, Christopher J. "The Origins and Development of SOE’s Security Section." In Security and Special Operations. Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230625532_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schlenker, Wolfram. "Crop Responses to Climate and Weather: Cross-Section and Panel Models." In Climate Change and Food Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2953-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

López Gunn, Elena, Laura Vay, and Carlos Marcos. "A Reader’s Guide to Natural Assurance Schemes." In Water Security in a New World. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-25308-9_2.

Full text
Abstract:
AbstractThis chapter provides a Reader’s Guide for the book based on the different elements to develop a natural assurance scheme, from its conceptual frame in this section (Sect. 2.1). The chapter is structured based on the different targeted audiences and the process of developing a natural assurance scheme (or NAS). The first section is addressed to Technical Experts and Researchers looking at the methodological assessment (physical, social and economic) needed to be undertaken to design a natural assurance scheme. These physical impacts of a NAS and the its value in monetary and non-moneta
APA, Harvard, Vancouver, ISO, and other styles
10

Wagner, Lars, and Dieter Wehe. "The Establishment of the International Police Relations Section at the German Police University—An Investment in the Present and the Future." In International Security Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42523-4_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Section"

1

Vermani, Lovkesh Singh, Blessy Thankachan, Anooja A., Preeti Purohit, Abhijeet Kumar, and Garima Jolly. "Blockchain-Nanotechnology Integration: Securing the Future through Enhanced Credibility and Security." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhandari, Vedant, Hemant Mahale, Prem Bhutada, Shivaji Harne, Aniket Narsale, and Pallavi Deshpande. "Sensitive Security: The Next Generation Alarm System." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tian, Dongping, Chen Liu, and Tuersunjiang Yimamu. "Chaotic particle swarm optimization with golden section strategy." In International Conference on Computer Application and Information Security (ICCAIS 2024), edited by Sadiq Ali Safaa, Pandey Hari Mohan, and Boussaid Farid. SPIE, 2025. https://doi.org/10.1117/12.3061595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sangekar, Avinash, Vaibhav Gumalwad, Shreyash Khillare, Kartik Warbhog, Shivhar Hadbe, and Umakant Tupe. "Blockchain-Powered Forensic Evidence Storage: A New Approach to Data Security." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sathiyamoorthi, A. S. Anishvishwa, S. Rahul Senthil, Sudha Vittaldass, and Raja Raman. "Anti-Theft Alert System for Home Security." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10867266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maity, Sourav, and Jatin Arora. "The Colossal Defense: Security Challenges of Large Language Models." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bodat, Harshil, Harshil Patel, Monika Arora, Dhruti Ambekar, Sonu Bodat, and Sonia. "AES-Driven Image Encryption: Overcoming Security and Transmission Challenges." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

C, Pavithra H., and Rajeshwari J. "A Comprehensive IoT Security Framework Empowered by Machine Learning." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nixon, J. Sebastian, J. Jeya A. Celin, Senthil Kumar A, C. Ganesh, U. Pavan Kumar, and Dilip Kumar. "LoRaWAN Security Framework to Mitigate DoS Attacks at the Gateway Level using Machine Learning." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chriki, F. Z., E. Simó, F. Aguiló, I. Garcia-Milà, and X. Masip. "A Deep Learning Framework for Safety Monitoring of a Railway Section." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679387.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security Section"

1

Daniel, Kent, David Hirshleifer, and Avanidhar Subrahmanyam. Covariance Risk, Mispricing, and the Cross Section of Security Returns. National Bureau of Economic Research, 2000. http://dx.doi.org/10.3386/w7615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Basbugoglu, Tarik, Roland Fazekas, and Marcus Nicolson. Security Forces Radicalisation Report. Glasgow Caledonian University, 2025. https://doi.org/10.59019/xqhnf105.

Full text
Abstract:
The structure of this report begins with the introduction. The second section introduces the concept of Democratic Control of Armed Forces. The third section examines the theoretical framework and methodology. The fourth part explains how political elites tackle radicalization within the armed forces (training programs etc.). The fifth underscores how political elites perceived threat of radicalization in each country. The fifth underlines the constitutional background of armed forces and judicial implications that seek to prevent the radicalization and extremism within the military. The sixth
APA, Harvard, Vancouver, ISO, and other styles
3

Shull, D., and M. Lane. Use of Data Libraries for IAEA Nuclear Security Assessment Methodologies (NUSAM) [section 5.4]. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1229806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reno, Ron, Harold Drollinger, Maureen L. King, and Colleen M. Beck. A Section 106 Evaluation of Building CP-1, Area 6, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1573363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ramírez Rodríguez, Santiago. Violence and Crime in Nicaragua: A Country Profile. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0006969.

Full text
Abstract:
The Office of Evaluation and Oversight (OVE) conducted an evaluation of a cluster of citizen security projects. The main objective was to identify what factors explained the implementation performance of the projects, and what lessons could be learned from these experiences. This Background Paper presents the results of one of these diagnostics for Nicaragua. Following the introduction, the country profile begins with an overview of the Nicaraguan context in terms of geography, demographics, economy, as well as recent political history (section II). It then builds a diagnostic that covers diff
APA, Harvard, Vancouver, ISO, and other styles
6

Wedding, Jeffrey, and Susan Edwards. Section 110 Documentation of a Douglas AD-2 Skyraider Crash Site, Area 1, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1836548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bolton, Laura. Synthesis of Work by the Covid Collective. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/cc.2022.001.

Full text
Abstract:
Overview: This report looked across Covid Collective outputs and grouped findings into three sections. Section 2) Pandemic response; Section 3) Increased marginalisation; and Section 4) Emergent outcomes. Section 4 describes outcomes, both positive and negative, which evolved and were more unpredictable in nature. Pandemic response: Findings on national response highlight shortfalls in national government actions in Bangladesh, Malawi, the Philippines, Yemen, and Syria. Emergency law responses have, in some cases, led states to exert powers with no legal basis. In transitioning economies, stat
APA, Harvard, Vancouver, ISO, and other styles
8

Keach, Levi. A Section 110 Evaluation of Three Sites Associated with the Grable Test, Area 5, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1821223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Coleman-Jensen, Alisha, and Matthew P. Rabbit. Analysis of the Current Population Survey Food Security Supplement Split-Panel Test. Economic Research Service, U.S. Department of Agriculture, 2023. http://dx.doi.org/10.32747/2023.8134354.ers.

Full text
Abstract:
The U.S. Department of Agriculture has monitored the extent and severity of food insecurity in U.S. households for more than 25 years. Data on food security is collected annually as part of the Current Population Survey Food Security Supplement (CPS-FSS). USDA, Economic Research Service undertook a process to update the survey instrument used for the CPS-FSS data collection. An updated survey instrument was created through a process of expert content review and cognitive testing. The revised survey instrument was implemented by the U.S. Census Bureau in a split-panel data collection test in Se
APA, Harvard, Vancouver, ISO, and other styles
10

Reno, Ron, Maureen King, and Cheryl Collins. A Section 106 Evaluation of the Mercury Bowling Alley, Area 23, Nevada National Security Site, Nye County, Nevada, with Photographic Documentation Addendums. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1482738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!