Journal articles on the topic 'State Security Service'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'State Security Service.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sundar, Priya, R. Raju, P. Mahalakshmi, and G. Lalitha. "Providing security for Web Service Composition using Finite State Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (August 30, 2005): 435–44. http://dx.doi.org/10.24297/ijct.v4i2b1.3232.
Full textGuracha, Adan Moro, and Felix Kiruthu. "Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya." International Journal of Current Aspects 3, no. III (June 5, 2019): 1–13. http://dx.doi.org/10.35942/ijcab.v3iiii.26.
Full textBorichev, Konstantin, and Mihail Pavlik. "The role of State Security bodies in countering terrorism." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, no. 1 (April 9, 2021): 94–103. http://dx.doi.org/10.35750/2071-8284-2021-1-94-103.
Full textOtinashvili, Ramaz. "Security in Company Management." Works of Georgian Technical University, no. 2(520) (June 25, 2021): 67–75. http://dx.doi.org/10.36073/1512-0996-2021-2-67-75.
Full textHordiienko, Serhii. "Powers of government agencies in ensuring the security of the state and directions of their improvement." Legal Ukraine, no. 10 (November 27, 2020): 6–17. http://dx.doi.org/10.37749/2308-9636-2020-10(214)-1.
Full textBarić, Nikica. "State Security of Socialist Republic of Croatia and events in Poland 1980-1982." Balcanica Posnaniensia. Acta et studia 28, no. 2 (December 31, 2021): 117–39. http://dx.doi.org/10.14746/bp.2021.28.23.
Full textKamiński, Mariusz Antoni. "Intelligence and counterintelligence in the structure of the state organs of the Republic of Estonia." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (October 10, 2019): 121–34. http://dx.doi.org/10.34739/dsd.2019.01.09.
Full textMehta, Meera, Dinesh Mehta, and Jaladhi Vavaliya. "Urban drinking water security in Gujarat." Journal of Social and Economic Development 23, S1 (February 18, 2021): 166–80. http://dx.doi.org/10.1007/s40847-020-00122-0.
Full textNielsen, Christian Axboe. "The Yugoslav State Security Service and the Bleiburg Commemorations." Politička misao 55, no. 2 (June 19, 2018): 50–70. http://dx.doi.org/10.20901/pm.55.2.03.
Full textKondrashova, Nataliia. "LEGAL REGULATION OF DISCOVERY UKRAINE'S SECURITY SERVICE THREATS ECONOMIC SECURITY OF THE STATE." Entrepreneurship, Economy and Law, no. 7 (2019): 99–103. http://dx.doi.org/10.32849/2663-5313.2019.7.17.
Full textKilichev, Abror. "The security services and features of Amir Temur's state." International Journal on Integrated Education 3, no. 1 (January 13, 2020): 69–73. http://dx.doi.org/10.31149/ijie.v3i1.275.
Full textGoryca, Tomasz. "The Concept of the Process of Qualification to State Security Service." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 35, no. 35 (September 30, 2019): 37–53. http://dx.doi.org/10.5604/01.3001.0014.0249.
Full textZhou, Cheng, Qian Mu Li, and Jian Shi. "Role-Based Services Certification Model of State Grid Unified Application Platform." Applied Mechanics and Materials 668-669 (October 2014): 757–61. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.757.
Full textKipcharskyi, O. M. "Theoretical and legal problems of state control over the judicial security service." Legal horizons, no. 23 (2020): 78–82. http://dx.doi.org/10.21272/legalhorizons.2020.i23.p78.
Full textEtor, Comfort R., Eno Etudor-Eyo, and Godfrey E. Ukpabio. "Provision of Security Facilities and Security Personnel Service Delivery in Universities in Cross River State, Nigeria." International Education Studies 13, no. 5 (April 18, 2020): 125. http://dx.doi.org/10.5539/ies.v13n5p125.
Full textSolairaju, A., and S. Vivek Saravanan. "Security Service for Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 6 (November 5, 2013): 2715–24. http://dx.doi.org/10.24297/ijct.v11i6.3047.
Full textIvanova, Malinka. "Security of Web Services: Methods and Contrivance." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (August 10, 2015): 6229–39. http://dx.doi.org/10.24297/ijct.v14i11.6374.
Full textMutonyi, Gerald, Ann Merecia Sirera, and Wangari Mwai. "Examining Commercialized Security Industry’s Services on National Security in Nairobi County, Kenya." Technium Social Sciences Journal 8 (May 19, 2020): 710–36. http://dx.doi.org/10.47577/tssj.v8i1.671.
Full textPodolchak, N., and V. Karkovska. "THE INFLUENCE OF PRESTIGIOUS GOVERNMENT SERVICE ON STATE SECURITY STAFF." Investytsiyi: praktyka ta dosvid, no. 5-6 (March 31, 2020): 128. http://dx.doi.org/10.32702/2306-6814.2020.5-6.128.
Full textHuang, Wei, Afshar Ganjali, Beom Heyn Kim, Sukwon Oh, and David Lie. "The State of Public Infrastructure-as-a-Service Cloud Security." ACM Computing Surveys 47, no. 4 (July 21, 2015): 1–31. http://dx.doi.org/10.1145/2767181.
Full textRosicki, Remigiusz. "State security and individual security as exemplified by operational surveillance used by the Polish counter-intelligence service." Przegląd Politologiczny, no. 3 (September 15, 2021): 5–23. http://dx.doi.org/10.14746/pp.2021.26.3.1.
Full textTonkens, Evelien, and Loes Verplanke. "When Social Security Fails to Provide Emotional Security: Single Parent Households and the Contractual Welfare State." Social Policy and Society 12, no. 3 (April 10, 2013): 451–60. http://dx.doi.org/10.1017/s1474746413000110.
Full textAveryanova, Maria Igorevna. "The right to social security of State civil servants from the standpoint of chronodiscret monogeographic comparative jurisprudence (HMP)." Genesis: исторические исследования, no. 2 (February 2022): 47–64. http://dx.doi.org/10.25136/2409-868x.2022.2.34991.
Full textMadugu, A. J. "Food security status of female-headed households in Mubi North Local Government area, Adamawa State, Nigeria." Agricultural Science and Technology 11, no. 1 (2019): 98–102. http://dx.doi.org/10.15547/10.15547/ast.2019.01.016.
Full textAliti, Admirim, Edmond Jajaga, and Kozeta Sevrani. "A need for an integrative security model for semantic stream reasoning systems." International Journal of Business & Technology 6, no. 3 (May 1, 2018): 1–4. http://dx.doi.org/10.33107/ijbte.2018.6.3.01.
Full textSOKOLOV, M. V., and A. V. MERKULOV. "OREL SECURITY OFFICER GAVRIIL STARINOV." JOURNAL OF PUBLIC AND MUNICIPAL ADMINISTRATION 9, no. 4 (2020): 44–57. http://dx.doi.org/10.22394/2225-8272-2020-9-4-44-57.
Full textBOLILYI, V. O., L. P. SUKHOVIRSKA, and O. M. LUNHOL. "ОПЕРАЦІЙНИЙ ЦЕНТР БЕЗПЕКИ ЯК ПОСЛУГА НА ОСНОВІ SIEM." Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, no. 2 (October 4, 2021): 177–86. http://dx.doi.org/10.31494/2412-9208-2021-1-2-177-186.
Full textShafack, Rosemary M. "Securing Library and Information Resources: The Situation in Two State University Libraries in Cameroon." European Journal of Education and Pedagogy 2, no. 1 (January 11, 2021): 25–31. http://dx.doi.org/10.24018/ejedu.2021.2.1.13.
Full textSukhonos, V. V., Y. V. Harust, T. A. Vasilieva, V. I. Melnyk, and V. V. Mirgorod-Karpova. "Directions of adaptation of the financial legislation of Ukraine to the EU legislation taking into account implementation of the concept of a new innovative model of the state management of financial system of Ukraine." Legal horizons, no. 25 (2020): 97–114. http://dx.doi.org/10.21272/legalhorizons.2020.i25.p97.
Full textEt al., Artem Bratko. "Some Aspects of Capability-based Planning in the Field of National Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2219–25. http://dx.doi.org/10.17762/turcomat.v12i6.4827.
Full textKopczewski, Marian, Zbigniew Ciekanowski, and Anna Piotrowska. "Legal basis for the functioning of special services in Poland." Scientific Journal of the Military University of Land Forces 196, no. 2 (June 26, 2020): 292–307. http://dx.doi.org/10.5604/01.3001.0014.2534.
Full textAbdullaev, Bobomurod Juraevich. "Some Reflections On The History Of Security Activities In Uzbekistan." American Journal of Political Science Law and Criminology 03, no. 06 (June 12, 2021): 104–8. http://dx.doi.org/10.37547/tajpslc/volume03issue06-15.
Full textKhan, Naveed, Jianbiao Zhang, and Saeed Ullah Jan. "A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server." Security and Communication Networks 2022 (March 14, 2022): 1–14. http://dx.doi.org/10.1155/2022/1943426.
Full textSapkota, Vishnu Prasad, and Umesh Prasad Bhusal. "Governance and Purchasing Function under Social Health Insurance in Nepal: Looking Back and Moving Forward." Journal of Nepal Health Research Council 15, no. 1 (August 13, 2017): 85–87. http://dx.doi.org/10.3126/jnhrc.v15i1.18027.
Full textIlchenko, O. V. "State border as an object of administrative and legal activity of the State Customs Service." Legal horizons, no. 25 (2020): 81–85. http://dx.doi.org/10.21272/legalhorizons.2020.i25.p81.
Full textWłodarczyk, Renata. "Unmanned Aerial Vehicles ‘in service’ of Internal Security of the State." Internal Security 12, no. 1 (July 22, 2020): 195–210. http://dx.doi.org/10.5604/01.3001.0014.3197.
Full textManurung, Siska Purnama, and Chen Ke. "ANALYSIS OF FACTORS THAT AFFECT CHINESE PEOPLE’S DECISION OF CHINA STATE-OWNED COMMERCIAL BANKS." Hasanuddin Economics and Business Review 2, no. 1 (June 30, 2018): 35. http://dx.doi.org/10.26487/hebr.v2i1.1472.
Full textVoskresenskaya, O. A., and N. M. Sladkova. "COMPETENCY-BASED APPROACH TO MONITORING THE EFFECTIVENESS OF PUBLIC SERVICES PERSONNEL ON INFORMATION SECURITY." Social@labor researches 45, no. 4 (2021): 121–29. http://dx.doi.org/10.34022/2658-3712-2021-45-4-121-129.
Full textThomson, Lindsay D. G. "Management of schizophrenia in conditions of high security." Advances in Psychiatric Treatment 6, no. 4 (July 2000): 252–60. http://dx.doi.org/10.1192/apt.6.4.252.
Full textLo Iacono, Luigi, Hoai Nguyen, and Peter Gorski. "On the Need for a General REST-Security Framework." Future Internet 11, no. 3 (February 27, 2019): 56. http://dx.doi.org/10.3390/fi11030056.
Full textBratko, Artem, Dmytro Oleshko, Anton Datskov, Valerii Vychavka, Oleksandr Olytskyi, and Ihor Balytskyi. "Use of the SWOT Analysis in the Field of National Security Planning." Emerging Science Journal 5, no. 3 (June 1, 2021): 330–37. http://dx.doi.org/10.28991/esj-2021-01280.
Full textKuprijanova, Jekaterina, Juris Livdāns, and Iluta Arbidāne. "PRACTICAL ASPECTS OF PRACTICAL ASPECTS OF COOPERATION BETWEEN THE STATE BORDER GUARD OF LATVIA AND FEDERAL SECURITY SERVICE BORDER GUARD SERVICE OF RUSSIAN FEDERATION." BORDER SECURITY AND MANAGEMENT 1, no. 6 (May 10, 2016): 77. http://dx.doi.org/10.17770/bsm.v1i6.1698.
Full textKubás, Jozef, Viktor Šoltés, and Katarína Repková Štofková. "SUPPORTING SMALL AND MEDIUM SIZED BUSINESSES IN SPECIFIC SERVICES WITHIN SLOVAKIA." CBU International Conference Proceedings 6 (September 25, 2018): 260–65. http://dx.doi.org/10.12955/cbup.v6.1166.
Full textAnnenkova, Viktoriya, Alexander Naryzhny, and Lyubov' Petrova. "OPTIMIZATION OF COSTS FOR THE PROVISION OF PUBLIC SERVICE IN THE SYSTEM OF ENSURING ECONOMIC AND BUDGET SAFETY." Russian Journal of Management 7, no. 4 (January 28, 2020): 61–65. http://dx.doi.org/10.29039/2409-6024-2019-7-4-61-65.
Full textMakarchuk, Vitalii. "ADMINISTRATIVE AND LEGAL STATUS OF LAW ENFORCEMENT BODIES AS SUBJECTS OF FORMATION AND IMPLEMENTATION OF STATE POLICY IN THE FIELD OF NATIONAL SECURITY AND DEFENSE." Law Journal of Donbass 75, no. 2 (2021): 35–44. http://dx.doi.org/10.32366/2523-4269-2021-75-2-35-44.
Full textPiwowarski, Juliusz, Barbara Piwowarska, and Jacek A. Piwowarski. "State Fire Service in the National Emergency and Fire System." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 37, no. 37 (June 30, 2020): 47–66. http://dx.doi.org/10.5604/01.3001.0014.2815.
Full textPrudyus, Ievgenii. "CONCEPTUAL ASPECTS OF STRATEGIC MANAGEMENT BY COURT SECURITY SERVICE." HERALD OF KHMELNYTSKYI NATIONAL UNIVERSITY 300, no. 6 (December 3, 2021): 94–100. http://dx.doi.org/10.31891/2307-5740-2021-300-6-17.
Full textNarain, Vishal, Pranay Ranjan, Sumit Vij, and Aman Dewan. "Taking the road less taken: reorienting the state for periurban water security." Action Research 18, no. 4 (October 27, 2017): 528–45. http://dx.doi.org/10.1177/1476750317736370.
Full textDzidzah, Esther, Kwame Owusu Kwateng, and Benjamin Kofi Asante. "Security behaviour of mobile financial service users." Information & Computer Security 28, no. 5 (June 29, 2020): 719–41. http://dx.doi.org/10.1108/ics-02-2020-0021.
Full textA. Naagas, M., E. L. Mique Jr, T. D. Palaoag, and J. S. Dela Cruz. "Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack." Bulletin of Electrical Engineering and Informatics 7, no. 4 (December 1, 2018): 593–600. http://dx.doi.org/10.11591/eei.v7i4.1349.
Full text