Journal articles on the topic 'Threat synergy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threat synergy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rizki, Aththaariq, and Fauzia Gustarina Cempaka Timur. "SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS." Journal of Social Political Sciences 2, no. 4 (2021): 342–54. http://dx.doi.org/10.52166/jsps.v2i4.80.
Full textRijal, Najamuddin Khairur. "Local Governance dalam Merespons Isu dan Ancaman ISIS: Kasus di Kota Malang." JURNAL SOSIAL POLITIK 2, no. 1 (2017): 85. http://dx.doi.org/10.22219/sospol.v2i1.4758.
Full textPutri Ulfa, Syariefful Ikhwan, and Dwi Harini. "Strategi Marketing Mix Dalam Meningkatkan Volume Penjualan Menggunakan Analisis Swot Olahan Bawang Merah Pada PT. Sinergi Brebes Inovatif." E-Bisnis : Jurnal Ilmiah Ekonomi dan Bisnis 15, no. 2 (2022): 346–57. http://dx.doi.org/10.51903/e-bisnis.v15i2.870.
Full textCipta, Hendra, and Hatamar Hatamar. "The Potential Synergy of Halal Industry and Islamic Banking in Bangka Belitung Province: SWOT Analysis." Integrated Journal of Business and Economics 7, no. 1 (2023): 309. http://dx.doi.org/10.33019/ijbe.v7i1.510.
Full textZabotkina, V. I., O. V. Pavlenko, E. L. Boyarskaya, and E. Yu Moiseeva. "Communication of Covid-19 consequences in the Baltic States inforsphere." Baltic Region 12, no. 4 (2020): 147–64. http://dx.doi.org/10.5922/2079-8555-2020-4-8.
Full textZabotkina, V. I., O. V. Pavlenko, E. L. Boyarskaya, and E. Yu Moiseeva. "Communication of Covid-19 consequences in the Baltic States inforsphere." Baltic Region 12, no. 4 (2020): 147–64. http://dx.doi.org/10.5922/2079-8555-2020-4-8.
Full textApriliani, Dewi. "Policy and Guide for Dealing with Nuclear Disaster Threat in Indonesia." JKAP (Jurnal Kebijakan dan Administrasi Publik) 24, no. 1 (2020): 1. http://dx.doi.org/10.22146/jkap.54913.
Full textLomeyko, A. "Factors Affecting the Corporate Security of Companies." Scientific Research and Development. Economics of the Firm 13, no. 2 (2024): 22–28. http://dx.doi.org/10.12737/2306-627x-2024-13-2-22-28.
Full textAmarachi F. Ndubuisi. "Strengthening national cybersecurity policies through coordinated threat intelligence sharing and real-time public-private collaboration frameworks." International Journal of Science and Research Archive 8, no. 2 (2023): 812–31. https://doi.org/10.30574/ijsra.2023.8.2.0299.
Full textSarjito, Aris. "Formation of the TNI Cyber Force: A Strategic and Policy Analysis." Defense and Security Studies 5 (November 12, 2024): 74–83. http://dx.doi.org/10.37868/dss.v5.id272.
Full textRahul Kumar Jha. "Strengthening Smart Grid Cybersecurity: An In-Depth Investigation into the Fusion of Machine Learning and Natural Language Processing." Journal of Trends in Computer Science and Smart Technology 5, no. 3 (2023): 284–301. http://dx.doi.org/10.36548/jtcsst.2023.3.005.
Full textSotardodo, Siahaan, and Risman Helda. "Contemporary Irregular Warfare: Defense Strategy." Journal of Social and Political Sciences 4, no. 1 (2021): 55–63. https://doi.org/10.31014/aior.1991.04.01.249.
Full textKingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Proactive cyber threat mitigation: Integrating data-driven insights with user-centric security protocols." Computer Science & IT Research Journal 5, no. 8 (2024): 2083–106. http://dx.doi.org/10.51594/csitrj.v5i8.1493.
Full textWahyudi, Rizki, and Muhammad Syauqillah. "Strengthening Cooperation among Intelligence Agencies in the Enforcement of Law on Terrorism: The Case of Indonesia." JISPO Jurnal Ilmu Sosial dan Ilmu Politik 12, no. 1 (2022): 23–38. http://dx.doi.org/10.15575/jispo.v12i1.14370.
Full textJanaki Sivakumar. "Ai-Driven Cyber Threat Detection: Enhancing Security Through Intelligent Engineering Systems." Journal of Information Systems Engineering and Management 10, no. 19s (2025): 790–98. https://doi.org/10.52783/jisem.v10i19s.3116.
Full textOLEKSIEWICZ, Izabela. "SPECIAL CHARACTER OF THE POLISH COUNTERTERRORISM POLICY AS COMPARED TO THE EUROPEAN UNION." Humanities and Social Sciences quarterly 29, no. 3 (2022): 107–21. http://dx.doi.org/10.7862/rz.2022.hss.21.
Full textPiercy, Nigel F., and Neil A. Morgan. "The impact of lean thinking and the lean enterprise on marketing: Threat or synergy?" Journal of Marketing Management 13, no. 7 (1997): 679–93. http://dx.doi.org/10.1080/0267257x.1997.9964504.
Full textCuny, Jacqui. "Exploring musical theatre performance synergy: Accessing seven performative processes." Studies in Musical Theatre 16, no. 2 (2022): 133–50. http://dx.doi.org/10.1386/smt_00094_1.
Full textVaibhav Anil Vora. "Serverless computing and container synergy in network architectures." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3429–38. https://doi.org/10.30574/wjarr.2025.26.1.1472.
Full textBA, Denue, and Akawu C. "Africa Through the Eyes of Emerging and Re-emerging Pathogens: A Call for Global Synergy." Journal of the Nigerian Infectious Diseases Society 01, no. 02 (2022): 08–18. http://dx.doi.org/10.58539/jnids.2022.1203.
Full textPadmapriya, V., V. Kaviyaa, B. Kaviya, and S. Rubini. "Securing Generative AI: A Survey on the Role of Secure Access Service Edge (SASE) in Mitigating Exploitability." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2025): 1630–43. https://doi.org/10.5281/zenodo.14575878.
Full textMa, Shijie, Tong Tang, Chang Du, Zheng Yang, and Binjie Gan. "Engineering Oilseed Microbiome Synergy for Saline Alkaline Soil Restoration." Plants 14, no. 14 (2025): 2197. https://doi.org/10.3390/plants14142197.
Full textSirenko, Olena, and Roman Yakovenko. "SYNERGY OF ACCOUNTING POLICY AND DIAGNOSTIC PROCEDURES IN ENSURING ENTERPRISE ECONOMIC SECURITY." Economic scope, no. 201 (June 10, 2025): 167–74. https://doi.org/10.30838/ep.201.167-174.
Full textAlex Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. http://dx.doi.org/10.30574/wjarr.2024.22.1.1305.
Full textAlex, Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. https://doi.org/10.5281/zenodo.14244163.
Full textUgwu Nneka Chinwe. "Innovative strategies led by pharmacists to counter the escalating threat of antimicrobial resistance." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 1827–29. https://doi.org/10.30574/wjarr.2025.27.1.2696.
Full textAshcraft, Deborah S., Royanne H. Vortisch, and George A. Pankey. "1292. Evaluation of Synergy with Piperacillin/Tazobactam plus Meropenem Against Carbapenemase-Producing Klebsiella pneumoniae and Enterobacter cloacae Using ETEST." Open Forum Infectious Diseases 8, Supplement_1 (2021): S735. http://dx.doi.org/10.1093/ofid/ofab466.1484.
Full textBorgohain, A., A. Rangaiah, and KG Rangappa. "In Vitro Effect of Ceftazidime-Avibactam by Synergy Testing with Aztreonam using Disc E Strip Method - Contribution of Promising Combination in the Era of Antibiotic Resistance." International Journal of Pharmaceutical and Clinical Research 16, no. 6 (2024): 1249–55. https://doi.org/10.5281/zenodo.12740408.
Full textZamila, Ailla, and Ai Nurlaila. "STRATEGI PENGEMBANGAN SISTEM PENGELOLAAN AGROFORESTRI DI DESA KARANGSARI KECAMATAN DARMA KABUPATEN KUNINGAN." Wanaraksa 17, no. 02 (2024): 60–73. http://dx.doi.org/10.25134/wanaraksa.v17i02.9159.
Full textPeter, Fedor, Sigmund Jakub, Zvaríková Martina, et al. "The most northern record of the alien composite thrips Microcephalothrips abdominalis in Europe – short communication." Plant Protection Science 54, No. 1 (2017): 43–47. http://dx.doi.org/10.17221/42/2017-pps.
Full textMoise, Daniel, Diana Mihaela Negescu Oancea, Amelia Diaconu, and Silviu Diaconu. "CoVid19, a Threat or a Blessing to Globalization?" SHS Web of Conferences 92 (2021): 01033. http://dx.doi.org/10.1051/shsconf/20219201033.
Full textSairaj Kommera. "Enhancing Zero Trust Architecture with AI-Driven Threat Intelligence in Cloud Environments." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1524–33. https://doi.org/10.32628/cseit251112163.
Full textFraser, Veronica, Rita Marcella, and Iain Middleton. "Employee perceptions of knowledge sharing: Employment threat or synergy for the greater good? A case study." Competitive Intelligence Review 11, no. 2 (2000): 39–52. http://dx.doi.org/10.1002/(sici)1520-6386(200032)11:2<39::aid-cir7>3.0.co;2-j.
Full textJin, Wengong, Jonathan M. Stokes, Richard T. Eastman, et al. "Deep learning identifies synergistic drug combinations for treating COVID-19." Proceedings of the National Academy of Sciences 118, no. 39 (2021): e2105070118. http://dx.doi.org/10.1073/pnas.2105070118.
Full textSemenov, Iouri, and Marianna Jacyna. "The synthesis model as a planning tool for effective supply chains resistant to adverse events." Eksploatacja i Niezawodnosc - Maintenance and Reliability 24, no. 1 (2022): 140–52. http://dx.doi.org/10.17531/ein.2022.1.16.
Full textHilmansyah, Hilmansyah. "Analysis of the Threat of Social Conflict on The Arrival of the Rohingya Ethnicity in The Aceh Province Region." Security Intelligence Terrorism Journal (SITJ) 2, no. 1 (2025): 99–111. https://doi.org/10.70710/sitj.v2i1.38.
Full textYevseiev, Serhii, Yevgen Melenti, Oleksandr Voitko, et al. "Development of a concept for building a critical infrastructure facilities security system." Eastern-European Journal of Enterprise Technologies 3, no. 9(111) (2021): 63–83. http://dx.doi.org/10.15587/1729-4061.2021.233533.
Full textMäkká, Katarína, and Eva Sventeková. "The Assessment of Population Safety in the Vicinity of Unclassified Risk Sources." Advanced Materials Research 1001 (August 2014): 498–503. http://dx.doi.org/10.4028/www.scientific.net/amr.1001.498.
Full textRaveendran, Sreejith, Deepashree Rajshekar, Sujatha S R, and Krishna Karthik M V S. "Evaluation of phenotypic carbapenem inactivation methods among carbapenem resistant gram-negative bacteria isolated from blood culture specimens and their synergy testing." Indian Journal of Microbiology Research 11, no. 3 (2024): 175–79. http://dx.doi.org/10.18231/j.ijmr.2024.032.
Full textUlly, Ngesti Pratiwi, and Nugroho Adi. "Synergy of Local Government Institutions in Dealing with Forest and Land Fires as A Non-Military Threat at Border Regions in Indonesia." International Journal of Business Management and Technology 5, no. 5 (2023): 90–95. https://doi.org/10.5281/zenodo.7672753.
Full textIsmayil Ismayilov, Ismayil Ismayilov, and Izzet Orujov Izzet Orujov. "BASIC PRINCIPLES OF BUILDING INTELLIGENT SYSTEMS FLIGHT CONTROL." ETM - Equipment, Technologies, Materials 16, no. 04 (2023): 14–19. http://dx.doi.org/10.36962/etm16042023-14.
Full textYevseiev, Serhii, Serhii Pohasii, Stanislav Milevskyi, et al. "Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model." Eastern-European Journal of Enterprise Technologies 5, no. 9 (113) (2021): 30–47. http://dx.doi.org/10.15587/1729-4061.2021.241638.
Full textElrafey, Asmaa, Ahmed A. Farghali, W. Kamal, et al. "Cost-effective eggshell-modified LDH composite for caffeine adsorption, cytotoxicity and antimicrobial activity: exploring the synergy and economic viability in search processes." RSC Advances 14, no. 45 (2024): 33281–300. http://dx.doi.org/10.1039/d4ra04558k.
Full textTsimonis, Konstantinos, Igor Rogelja, Ioana Ciută, Anastasia Frantzeskaki, Elena Nikolovska, and Besjan Pesha. "A Synergy of Failures: Environmental Protection and Chinese Capital in Southeast Europe." Journal of Current Chinese Affairs 48, no. 2 (2019): 171–200. http://dx.doi.org/10.1177/1868102620919861.
Full textFeriadi Feriadi, Jasmine Damayanti, and Muhammad Yasin. "Analisis Struktur Kekuatan Persaingan Dan Cluster Industri." JURNAL MANAJEMEN DAN BISNIS EKONOMI 2, no. 3 (2024): 166–73. http://dx.doi.org/10.54066/jmbe-itb.v2i3.1980.
Full textKanellopoulos, Anastasios Nikolaos. "Counterintelligence, Artificial Intelligence and National Security: Synergy and Challenges." Journal of Politics and Ethics in New Technologies and AI 3, no. 1 (2024): e35617. http://dx.doi.org/10.12681/jpentai.35617.
Full textMachica, Jr, Apolonio, Stephanie Belonias, Agnesia Machica, Maricel Garcia, Eliza Cabugawan, and Jenalyn Gonzaga. "Narrowing the threat of poverty through entrepreneurial empowerment: the experience of rural women entrepreneurs." International Forum Journal 21, no. 2 (2018): 32. https://doi.org/10.63201/oaau3825.
Full textGuan, Zhiwei. "Artificial Intelligence-Driven Cybersecurity Visualization and Animation Technology: From Threat Perception to Decision Support." Applied and Computational Engineering 145, no. 1 (2025): 113–17. https://doi.org/10.54254/2755-2721/2025.21899.
Full textAsogwa, Chika Euphemia. "Internet-Based Communications: A Threat or Strength to National Security?" SAGE Open 10, no. 2 (2020): 215824402091458. http://dx.doi.org/10.1177/2158244020914580.
Full textMazaraki, Anatolii, Nataliya Kalyuzhna, and Larysa Sarkisian. "MULTIPLICATIVE EFFECTS OF HYBRID THREATS*." Baltic Journal of Economic Studies 7, no. 4 (2021): 136–44. http://dx.doi.org/10.30525/2256-0742/2021-7-4-136-144.
Full text