To see the other types of publications on this topic, follow the link: Threat synergy.

Journal articles on the topic 'Threat synergy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Threat synergy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rizki, Aththaariq, and Fauzia Gustarina Cempaka Timur. "SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS." Journal of Social Political Sciences 2, no. 4 (2021): 342–54. http://dx.doi.org/10.52166/jsps.v2i4.80.

Full text
Abstract:
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake holders to jointly face cyber threats that come to attack Indonesia. The purpose of this research is to answer the existing problem formulations, namely first to find out which state multi-stake holders are in synergy in defending cyber-attacks in Indonesia; and to analyze how the synergy of state multi-stake holders in dealing with cyber-attacks
APA, Harvard, Vancouver, ISO, and other styles
2

Rijal, Najamuddin Khairur. "Local Governance dalam Merespons Isu dan Ancaman ISIS: Kasus di Kota Malang." JURNAL SOSIAL POLITIK 2, no. 1 (2017): 85. http://dx.doi.org/10.22219/sospol.v2i1.4758.

Full text
Abstract:
AbstrakTulisan ini mengkaji mengenai bagaimana sinergitas multi aktor di Kota Malang dalam merespons isu dan ancaman ISIS di level lokal. Sebagaimana dipahami bahwa ISIS merupakan ancaman global di mana ideologinya telah menyebar, bahkan hingga di Kota Malang. Untuk itu, keterlibatan dan sinergitas multiaktor dalam kerangka local governance menjadi penting. Penelitian ini menggunakan metode kualitatif dengan tujuan deskriptif. Data difokuskan pada temuan di lapangan yang dikumpulkan secara langsung melalui wawancara. Penelitian menemukan bahwa aktor publik dan aktor non-publik di level Kota Ma
APA, Harvard, Vancouver, ISO, and other styles
3

Putri Ulfa, Syariefful Ikhwan, and Dwi Harini. "Strategi Marketing Mix Dalam Meningkatkan Volume Penjualan Menggunakan Analisis Swot Olahan Bawang Merah Pada PT. Sinergi Brebes Inovatif." E-Bisnis : Jurnal Ilmiah Ekonomi dan Bisnis 15, no. 2 (2022): 346–57. http://dx.doi.org/10.51903/e-bisnis.v15i2.870.

Full text
Abstract:
This study aims to find out how to apply the marketing mix strategy and to find out the strengths, weaknesses, opportunities and threats in implementing the marketing mix strategy at PT. Innovative Brebes Synergy. Another goal is also to find out how the strategy at PT. Brebes Innovative Synergy in dealing with competitors with other companies that have the same product. This study used descriptive qualitative method. Data collection techniques using interview and documentation techniques. Data analysis using SWOT analysis. The place and its location at PT. The synergy of Innovative Brebes wit
APA, Harvard, Vancouver, ISO, and other styles
4

Cipta, Hendra, and Hatamar Hatamar. "The Potential Synergy of Halal Industry and Islamic Banking in Bangka Belitung Province: SWOT Analysis." Integrated Journal of Business and Economics 7, no. 1 (2023): 309. http://dx.doi.org/10.33019/ijbe.v7i1.510.

Full text
Abstract:
The synergy between the halal industry and sharia banking is essential to creating a halal ecosystem in Bangka Belitung Province. Meanwhile, this synergy has not been seen at this time. This qualitative research was conducted through a SWOT analysis to answer the causes of the lack of synergy between Islamic banking and the halal industry. The findings of this research show that the strength of this synergy is the majority Muslim population and religious harmony, abundant natural resources. The weakness of this synergy is that national regulations are not evenly distributed to support the hala
APA, Harvard, Vancouver, ISO, and other styles
5

Zabotkina, V. I., O. V. Pavlenko, E. L. Boyarskaya, and E. Yu Moiseeva. "Communication of Covid-19 consequences in the Baltic States inforsphere." Baltic Region 12, no. 4 (2020): 147–64. http://dx.doi.org/10.5922/2079-8555-2020-4-8.

Full text
Abstract:
This article seeks to describe the dynamics of Covid-19 in the Baltic States and to analyse the ways of communicating the threat and its consequences. Particular attention is paid to the media strategies pursued in the study area. The research is based on Russian and English texts from the Baltic media, WHO official documents and datasets, as well as initiatives of the Baltic Sea region organisations (2020) counteracting Covid-19. A combination of these sources builds up an objective view of the situation and demonstrates how the pandemic and its consequences are represented in public consciou
APA, Harvard, Vancouver, ISO, and other styles
6

Zabotkina, V. I., O. V. Pavlenko, E. L. Boyarskaya, and E. Yu Moiseeva. "Communication of Covid-19 consequences in the Baltic States inforsphere." Baltic Region 12, no. 4 (2020): 147–64. http://dx.doi.org/10.5922/2079-8555-2020-4-8.

Full text
Abstract:
This article seeks to describe the dynamics of Covid-19 in the Baltic States and to analyse the ways of communicating the threat and its consequences. Particular attention is paid to the media strategies pursued in the study area. The research is based on Russian and English texts from the Baltic media, WHO official documents and datasets, as well as initiatives of the Baltic Sea region organisations (2020) counteracting Covid-19. A combination of these sources builds up an objective view of the situation and demonstrates how the pandemic and its consequences are represented in public consciou
APA, Harvard, Vancouver, ISO, and other styles
7

Apriliani, Dewi. "Policy and Guide for Dealing with Nuclear Disaster Threat in Indonesia." JKAP (Jurnal Kebijakan dan Administrasi Publik) 24, no. 1 (2020): 1. http://dx.doi.org/10.22146/jkap.54913.

Full text
Abstract:
The research analyzed policies and guidelines for dealing with nuclear disaster threat in Indonesia within a collaborative approach. A case study qualitative method was used to explore and analyze the nuclear disaster threat policy and guidelines in Indonesia. The research was based on LIPI-UNESCO/ ISDR indicators on natural disaster preparedness and IAEA parameters on nuclear emergency preparedness requirements). Results showed that policies and guidelines on dealing with nuclear disaster threat in Indonesia are still deficient (34.1%); and there is no synergy and integration of policies and
APA, Harvard, Vancouver, ISO, and other styles
8

Lomeyko, A. "Factors Affecting the Corporate Security of Companies." Scientific Research and Development. Economics of the Firm 13, no. 2 (2024): 22–28. http://dx.doi.org/10.12737/2306-627x-2024-13-2-22-28.

Full text
Abstract:
Corporate security is a comprehensive system of measures designed to protect an organization's assets, data, employees, and reputation from potential threats. This article discusses various factors that can increase an organization's vulnerability to security threats. The independent and combined effects of internal controls, such as training programs and data protection protocols, as well as external threats such as cyber-attacks, physical intrusions and economic espionage, are being investigated. A key aspect of the analysis is the idea of synergy in the field of security. The article argues
APA, Harvard, Vancouver, ISO, and other styles
9

Amarachi F. Ndubuisi. "Strengthening national cybersecurity policies through coordinated threat intelligence sharing and real-time public-private collaboration frameworks." International Journal of Science and Research Archive 8, no. 2 (2023): 812–31. https://doi.org/10.30574/ijsra.2023.8.2.0299.

Full text
Abstract:
In an era of escalating cyber threats, the imperative to strengthen national cybersecurity policies has grown more urgent, particularly as state and non-state actors exploit digital vulnerabilities to target critical infrastructure, financial systems, and democratic institutions. Modern cyber threats are increasingly transnational, adaptive, and asymmetric—demanding a shift from siloed, reactive defense mechanisms to proactive, intelligence-driven frameworks. This paper examines the evolution of national cybersecurity policies through the lens of coordinated threat intelligence sharing and rea
APA, Harvard, Vancouver, ISO, and other styles
10

Sarjito, Aris. "Formation of the TNI Cyber Force: A Strategic and Policy Analysis." Defense and Security Studies 5 (November 12, 2024): 74–83. http://dx.doi.org/10.37868/dss.v5.id272.

Full text
Abstract:
The increasing cyber threats in Indonesia require strengthening the country's defense strategy. This study focuses on the formation of the Indonesian National Army (TNI) Cyber Force as part of efforts to strengthen the country's cyber security in facing increasingly complex threats. The purpose of this study is to analyze the policy and strategy for the formation of the TNI Cyber Force and evaluate the synergy between institutions, especially with the National Cyber ​​and Crypto Agency (BSSN). This study uses a qualitative method with a secondary data analysis approach, including reports from
APA, Harvard, Vancouver, ISO, and other styles
11

Rahul Kumar Jha. "Strengthening Smart Grid Cybersecurity: An In-Depth Investigation into the Fusion of Machine Learning and Natural Language Processing." Journal of Trends in Computer Science and Smart Technology 5, no. 3 (2023): 284–301. http://dx.doi.org/10.36548/jtcsst.2023.3.005.

Full text
Abstract:
Smart grid technology has transformed electricity distribution and management, but it also exposes critical infrastructures to cybersecurity threats. To mitigate these risks, the integration of machine learning (ML) and natural language processing (NLP) techniques has emerged as a promising approach. This survey paper analyses current research and applications related to ML and NLP integration, exploring methods for risk assessment, log analysis, threat analysis, intrusion detection, and anomaly detection. It also explores challenges, potential opportunities, and future research directions for
APA, Harvard, Vancouver, ISO, and other styles
12

Sotardodo, Siahaan, and Risman Helda. "Contemporary Irregular Warfare: Defense Strategy." Journal of Social and Political Sciences 4, no. 1 (2021): 55–63. https://doi.org/10.31014/aior.1991.04.01.249.

Full text
Abstract:
Globalization influenced by the development of science and technology has brought the world into the era of industrial revolution 4.0. It led to an unstable and confusing situation, which implies the emergence of VUCA (Volatility, Uncertainty, Complexity, Ambiguity) conditions. VUCA created the term Irregular Warfare as a new form of war, which is defined as a violent struggle between state and non-state actors to gain legitimate influence on the people relevant in the form of terrorist attacks, subversion, and rebellion or separatism. Irregular Warfare in Indonesia is known as a non-military
APA, Harvard, Vancouver, ISO, and other styles
13

Kingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Proactive cyber threat mitigation: Integrating data-driven insights with user-centric security protocols." Computer Science & IT Research Journal 5, no. 8 (2024): 2083–106. http://dx.doi.org/10.51594/csitrj.v5i8.1493.

Full text
Abstract:
In the rapidly evolving cybersecurity landscape, proactive threat mitigation has become essential for protecting sensitive data and systems from increasingly sophisticated attacks. The paper explores a holistic approach to enhancing cybersecurity by merging data-driven insights with user-centric security practices. This study highlights the limitations of traditional reactive security measures and advocates for a shift towards a proactive strategy that anticipates and addresses potential threats before they materialize. The research emphasizes the importance of leveraging data analytics to gai
APA, Harvard, Vancouver, ISO, and other styles
14

Wahyudi, Rizki, and Muhammad Syauqillah. "Strengthening Cooperation among Intelligence Agencies in the Enforcement of Law on Terrorism: The Case of Indonesia." JISPO Jurnal Ilmu Sosial dan Ilmu Politik 12, no. 1 (2022): 23–38. http://dx.doi.org/10.15575/jispo.v12i1.14370.

Full text
Abstract:
The development of global, regional and national situations related to terrorism is dynamic and complex affecting national stability and security. It requires optimal and effective action from the government. The complexity of counter-terrorism requires the synergy of all parties. Strengthening cooperation between intelligence agencies can solve the current threat of terrorism. This article aims to propose intelligence cooperation and present the concept of intelligence synergy within the framework of law enforcement in combating terrorism in Indonesia. The article is descriptive qualitative r
APA, Harvard, Vancouver, ISO, and other styles
15

Janaki Sivakumar. "Ai-Driven Cyber Threat Detection: Enhancing Security Through Intelligent Engineering Systems." Journal of Information Systems Engineering and Management 10, no. 19s (2025): 790–98. https://doi.org/10.52783/jisem.v10i19s.3116.

Full text
Abstract:
The rapid proliferation of digital technologies has significantly expanded the attack surface for cyber threats, making traditional security measures increasingly inadequate. Artificial Intelligence (AI)-driven cyber threat detection is emerging as a transformative approach to safeguarding digital ecosystems through intelligent engineering systems. This paper explores the integration of AI and machine learning (ML) techniques in cyber threat detection, focusing on how these advanced technologies enhance security, automate threat intelligence, and mitigate evolving cyber risks in real-time. AI-
APA, Harvard, Vancouver, ISO, and other styles
16

OLEKSIEWICZ, Izabela. "SPECIAL CHARACTER OF THE POLISH COUNTERTERRORISM POLICY AS COMPARED TO THE EUROPEAN UNION." Humanities and Social Sciences quarterly 29, no. 3 (2022): 107–21. http://dx.doi.org/10.7862/rz.2022.hss.21.

Full text
Abstract:
The intensity of the threat of terrorism, previously considered only as a potential event, is now increasing. The greatest consequence of the impact of terrorism as an asymmetric threat is its psychological dimension. Its negative impact manifests itself in the reduction of the sense of security in society, rather than in society’s actual deterioration. This often leads to a change in voting preferences in subsequent elections in a given country, and in the long run, can also lead to a reallocation of resources in a given state, changing its development prospects. The article categorizes terro
APA, Harvard, Vancouver, ISO, and other styles
17

Piercy, Nigel F., and Neil A. Morgan. "The impact of lean thinking and the lean enterprise on marketing: Threat or synergy?" Journal of Marketing Management 13, no. 7 (1997): 679–93. http://dx.doi.org/10.1080/0267257x.1997.9964504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Cuny, Jacqui. "Exploring musical theatre performance synergy: Accessing seven performative processes." Studies in Musical Theatre 16, no. 2 (2022): 133–50. http://dx.doi.org/10.1386/smt_00094_1.

Full text
Abstract:
To meet the demands of the ever-evolving musical theatre industry, performers are expected to craft inspiring performances across eight shows a week, seamlessly integrating their triple-threat expertise. Most actors undertake intensive training to achieve the complex skillset required to execute this art form, yet professional success can be elusive. It appears that a key element to building and maintaining a musical theatre career is performance synergy. This phenomenon is described colloquially as stage presence or X-factor. Whilst the literature regarding the field of musical theatre traini
APA, Harvard, Vancouver, ISO, and other styles
19

Vaibhav Anil Vora. "Serverless computing and container synergy in network architectures." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3429–38. https://doi.org/10.30574/wjarr.2025.26.1.1472.

Full text
Abstract:
This article explores the transformative integration of serverless computing with container technologies in modern network architectures, examining how this convergence creates unprecedented flexibility, efficiency, and scalability. The article provides a comprehensive analysis of the theoretical frameworks underpinning this integration, including serverless computing paradigms, container orchestration principles, and their architectural convergence models. The article systematically investigates dynamic resource allocation mechanisms, highlighting traffic-based scaling algorithms, predictive
APA, Harvard, Vancouver, ISO, and other styles
20

BA, Denue, and Akawu C. "Africa Through the Eyes of Emerging and Re-emerging Pathogens: A Call for Global Synergy." Journal of the Nigerian Infectious Diseases Society 01, no. 02 (2022): 08–18. http://dx.doi.org/10.58539/jnids.2022.1203.

Full text
Abstract:
Africa and Asia have a high burden of infectious pathogens of high consequence. Unfortunately, Africa ’s epidemic preparedness and outbreak response lags behind those of other regions of the world. This article highlights the burden and negative consequences of infectious pathogen on the continent, and its risk to the global community. Estimated 15 million (25%) of the 57 million global annual death is attributable to infectious diseases, majority of which occurs in Africa. Approximately 50% of deaths in Africa are due to infectious diseases, compared to only 2% in Europe. Infectious diseases
APA, Harvard, Vancouver, ISO, and other styles
21

Padmapriya, V., V. Kaviyaa, B. Kaviya, and S. Rubini. "Securing Generative AI: A Survey on the Role of Secure Access Service Edge (SASE) in Mitigating Exploitability." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2025): 1630–43. https://doi.org/10.5281/zenodo.14575878.

Full text
Abstract:
This survey paper explores the intersection of generative AI and network security, emphasizing the role of Secure Access Service Edge (SASE) in addressing challenges. Generative AI’s transformative impact on content creation, analytics, and automation introduces risks like adversarial attacks (e.g., DeepFool), JSON Web Token (JWT) vulnerabilities, and data breaches. Existing security measures struggle with AI’s dynamic nature, highlighting SASE as a unified framework integrating Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), and real-time threat detection. T
APA, Harvard, Vancouver, ISO, and other styles
22

Ma, Shijie, Tong Tang, Chang Du, Zheng Yang, and Binjie Gan. "Engineering Oilseed Microbiome Synergy for Saline Alkaline Soil Restoration." Plants 14, no. 14 (2025): 2197. https://doi.org/10.3390/plants14142197.

Full text
Abstract:
Soil salinization poses a critical threat to global agriculture, necessitating innovative strategies for sustainable remediation. This review synthesizes advances in leveraging plant–microbe interactions to remediate saline–alkali soils, focusing on oilseed crops—Brassica napus, Glycine max, Arachis hypogaea, Helianthus annuus, and Sesamum indicum—as keystone species for ecosystem restoration. These crops exhibit unique adaptive strategies, including root architectural plasticity and exudate-mediated recruitment of stress-resilient microbiomes (Proteobacteria, Actinobacteria, and Ascomycota),
APA, Harvard, Vancouver, ISO, and other styles
23

Sirenko, Olena, and Roman Yakovenko. "SYNERGY OF ACCOUNTING POLICY AND DIAGNOSTIC PROCEDURES IN ENSURING ENTERPRISE ECONOMIC SECURITY." Economic scope, no. 201 (June 10, 2025): 167–74. https://doi.org/10.30838/ep.201.167-174.

Full text
Abstract:
The article highlights the relevance of ensuring the economic security of enterprises under growing regulatory, financial, informational, and military risks. Particular attention is given to the need for aligning managerial instruments, in particular accounting policy and diagnostic procedures, for the timely identification of threats and enhancing enterprise resilience. The aim of the study is to substantiate the synergy between accounting policy and the risk diagnostics system as key factors in strengthening the economic security of the enterprise. The methodological basis of the study inclu
APA, Harvard, Vancouver, ISO, and other styles
24

Alex Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. http://dx.doi.org/10.30574/wjarr.2024.22.1.1305.

Full text
Abstract:
This paper will delve into the integration of Artificial Intelligence (AI) and extended Berkeley Packet Filter (eBPF) technology to enhance cyber defense capability. The most important aspect of AI is detection of threats where it employs sophisticated algorithms in the analysis of large data sets to identify any form of pattern which signals a threat in cyberspace. It enhances behavioral analysis in the monitoring of user and system behavior to identify suspicious activities. AI also helps to instantly react against the threats by automatically taking actions like isolating an infected machin
APA, Harvard, Vancouver, ISO, and other styles
25

Alex, Mathew. "AI Cyber Defense and eBPF." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 1983–89. https://doi.org/10.5281/zenodo.14244163.

Full text
Abstract:
This paper will delve into the integration of Artificial Intelligence (AI) and extended Berkeley Packet Filter (eBPF) technology to enhance cyber defense capability. The most important aspect of AI is detection of threats where it employs sophisticated algorithms in the analysis of large data sets to identify any form of pattern which signals a threat in cyberspace. It enhances behavioral analysis in the monitoring of user and system behavior to identify suspicious activities. AI also helps to instantly react against the threats by automatically taking actions like isolating an infected machin
APA, Harvard, Vancouver, ISO, and other styles
26

Ugwu Nneka Chinwe. "Innovative strategies led by pharmacists to counter the escalating threat of antimicrobial resistance." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 1827–29. https://doi.org/10.30574/wjarr.2025.27.1.2696.

Full text
Abstract:
The global health landscape is increasingly challenged by antimicrobial resistance (AMR), which threatens the effectiveness of existing treatments and complicates infection management. Pharmacists, leveraging their accessibility and specialized expertise, are stepping into pivotal roles by pioneering innovative approaches to fight this threat. This article examines various forward-thinking strategies pharmacists are implementing, including harnessing advanced data analysis tools, spearheading stewardship initiatives, engaging communities through education, and influencing policy reforms. Empha
APA, Harvard, Vancouver, ISO, and other styles
27

Ashcraft, Deborah S., Royanne H. Vortisch, and George A. Pankey. "1292. Evaluation of Synergy with Piperacillin/Tazobactam plus Meropenem Against Carbapenemase-Producing Klebsiella pneumoniae and Enterobacter cloacae Using ETEST." Open Forum Infectious Diseases 8, Supplement_1 (2021): S735. http://dx.doi.org/10.1093/ofid/ofab466.1484.

Full text
Abstract:
Abstract Background Carbapenem-resistant Enterobacterales are considered an urgent threat for patients in healthcare facilities, causing infections with significant morbidity and mortality. Most isolates are multidrug resistant with limited treatment options, so combination therapy is an alternative. Recently, synergy with piperacillin/tazobactam (P/T) + meropenem (MP) was demonstrated against 7/10 (70%) KPC-producing Escherichia coli and 9/10 (90%) OXA-48-producing K. pneumoniae using time-kill assay (Lawandi et al, 2021). The aim of the present study was to further evaluate the combination o
APA, Harvard, Vancouver, ISO, and other styles
28

Borgohain, A., A. Rangaiah, and KG Rangappa. "In Vitro Effect of Ceftazidime-Avibactam by Synergy Testing with Aztreonam using Disc E Strip Method - Contribution of Promising Combination in the Era of Antibiotic Resistance." International Journal of Pharmaceutical and Clinical Research 16, no. 6 (2024): 1249–55. https://doi.org/10.5281/zenodo.12740408.

Full text
Abstract:
<strong>Introduction:&nbsp;</strong>Carbapenem resistant Enterobacterales (CRE) is a rapidly unfolding concern in the realm of public health. Ceftazidime-Avibactam combination has excellent in vitro activity against Gram negative pathogens showing promising results with Aztreonam.&nbsp;<strong>Objective:</strong>&nbsp;To determine the phenotypic synergy of Ceftazidime-Avibactam with Aztreonam in Carbapenem resistant Enterobacterales.&nbsp;<strong>Methodology:&nbsp;</strong>100 Carbapenem resistant Enterobacterales were included in the study and tested for Ceftazidime-Avibactam (CZA) sensitivit
APA, Harvard, Vancouver, ISO, and other styles
29

Zamila, Ailla, and Ai Nurlaila. "STRATEGI PENGEMBANGAN SISTEM PENGELOLAAN AGROFORESTRI DI DESA KARANGSARI KECAMATAN DARMA KABUPATEN KUNINGAN." Wanaraksa 17, no. 02 (2024): 60–73. http://dx.doi.org/10.25134/wanaraksa.v17i02.9159.

Full text
Abstract:
Karangsari Village is one of the villages that applies agroforestry in land management. Around 204 ha or 74% of the village area is agroforestry land and about 500 people of the total population are farmers. However, in its management there are various obstacles such as fluctuating prices or tending to fall during the harvest, pest and disease attacks and capital procurement. Some of these problems are common, but by conducting a SWOT analysis based on the strengths, weaknesses, opportunities and threats contained in the management of agroforestry in Karangsari Village, it is found that the ST
APA, Harvard, Vancouver, ISO, and other styles
30

Peter, Fedor, Sigmund Jakub, Zvaríková Martina, et al. "The most northern record of the alien composite thrips Microcephalothrips abdominalis in Europe – short communication." Plant Protection Science 54, No. 1 (2017): 43–47. http://dx.doi.org/10.17221/42/2017-pps.

Full text
Abstract:
The most northern record of Microcephalothrips abdominalis (Crawford, 1910) (Thysanoptera, Thripidae) in Europe and the first record in Slovakia was described. The climate change induced introduction in synergy with biological commodity trade globalisation may support the ability of exotic elements to establish adequate populations with suitable fitness. The main threat consists in at least temporary survival in mild climate ecosystems dispersing from artificially heated interiors with the potential to transmit economically important viruses, such as Tobacco streak virus.
APA, Harvard, Vancouver, ISO, and other styles
31

Moise, Daniel, Diana Mihaela Negescu Oancea, Amelia Diaconu, and Silviu Diaconu. "CoVid19, a Threat or a Blessing to Globalization?" SHS Web of Conferences 92 (2021): 01033. http://dx.doi.org/10.1051/shsconf/20219201033.

Full text
Abstract:
Research background:The new CoVid19 took by surprise almost all the countries were not aware that encountered the virus. It is most likely that many countries did not even know, realize or were not aware that the virus was already spreading in their homeland. We can consider that it was like a “tornado” or even worse like a “Geo-Storm” that affected almost each country in the World.Purpose of the article:The healthcare system in each country was caught unprotected to such a large scale of need of medical supplies and devices. The lack of medical supplies showed the dependence of many countries
APA, Harvard, Vancouver, ISO, and other styles
32

Sairaj Kommera. "Enhancing Zero Trust Architecture with AI-Driven Threat Intelligence in Cloud Environments." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1524–33. https://doi.org/10.32628/cseit251112163.

Full text
Abstract:
This article explores the integration of Artificial Intelligence (AI) with Zero Trust Architecture (ZTA) in cloud environments, presenting a comprehensive framework for enhancing cybersecurity in modern digital ecosystems. It begins by examining the core principles of Zero Trust Architecture, including micro-segmentation, identity-based access controls, and continuous verification. The role of AI in cybersecurity is then discussed, focusing on its capabilities in analyzing large-scale datasets, identifying anomalous behaviors, and predictive threat detection. The synergy between AI and ZTA is
APA, Harvard, Vancouver, ISO, and other styles
33

Fraser, Veronica, Rita Marcella, and Iain Middleton. "Employee perceptions of knowledge sharing: Employment threat or synergy for the greater good? A case study." Competitive Intelligence Review 11, no. 2 (2000): 39–52. http://dx.doi.org/10.1002/(sici)1520-6386(200032)11:2<39::aid-cir7>3.0.co;2-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Jin, Wengong, Jonathan M. Stokes, Richard T. Eastman, et al. "Deep learning identifies synergistic drug combinations for treating COVID-19." Proceedings of the National Academy of Sciences 118, no. 39 (2021): e2105070118. http://dx.doi.org/10.1073/pnas.2105070118.

Full text
Abstract:
Effective treatments for COVID-19 are urgently needed. However, discovering single-agent therapies with activity against severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) has been challenging. Combination therapies play an important role in antiviral therapies, due to their improved efficacy and reduced toxicity. Recent approaches have applied deep learning to identify synergistic drug combinations for diseases with vast preexisting datasets, but these are not applicable to new diseases with limited combination data, such as COVID-19. Given that drug synergy often occurs through inh
APA, Harvard, Vancouver, ISO, and other styles
35

Semenov, Iouri, and Marianna Jacyna. "The synthesis model as a planning tool for effective supply chains resistant to adverse events." Eksploatacja i Niezawodnosc - Maintenance and Reliability 24, no. 1 (2022): 140–52. http://dx.doi.org/10.17531/ein.2022.1.16.

Full text
Abstract:
The article presents the problem of planning effective modular supply chains to resist adverse events. The lack of effective models for planning such supply chains based on the synergy of individual links widens the knowledge gap in this area. The analyses confirm the legitimacy of forming effective and reliable supply chains ready for fitting supplies to specific orders, adaptation to flexible and innovative transformations, and minimization of time losses and costs of restoring supply capacity in case of a threat. The authors provide a theoretical analysis of the problem and present a propri
APA, Harvard, Vancouver, ISO, and other styles
36

Hilmansyah, Hilmansyah. "Analysis of the Threat of Social Conflict on The Arrival of the Rohingya Ethnicity in The Aceh Province Region." Security Intelligence Terrorism Journal (SITJ) 2, no. 1 (2025): 99–111. https://doi.org/10.70710/sitj.v2i1.38.

Full text
Abstract:
The arrival of the Rohingya ethnic group in the Aceh Province region received a reaction of rejection from the local Aceh community. Changes in the perception of local Acehnese people regarding the existence of Rohingya refugees have led to various demonstrations of rejection and expulsion of refugees from temporary shelters. The increasing wave of refugee arrivals landing in various areas of Aceh has had an impact on the escalation of social conflict between the local Acehnese community and the Rohingya ethnic group. This research examines the causes of social conflict, analysis of the threat
APA, Harvard, Vancouver, ISO, and other styles
37

Yevseiev, Serhii, Yevgen Melenti, Oleksandr Voitko, et al. "Development of a concept for building a critical infrastructure facilities security system." Eastern-European Journal of Enterprise Technologies 3, no. 9(111) (2021): 63–83. http://dx.doi.org/10.15587/1729-4061.2021.233533.

Full text
Abstract:
To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible
APA, Harvard, Vancouver, ISO, and other styles
38

Mäkká, Katarína, and Eva Sventeková. "The Assessment of Population Safety in the Vicinity of Unclassified Risk Sources." Advanced Materials Research 1001 (August 2014): 498–503. http://dx.doi.org/10.4028/www.scientific.net/amr.1001.498.

Full text
Abstract:
Act on the Prevention of Major Industrial Accidents defines the threshold quantities of hazardous substances in companies. Businesses that have exceeded their limits assess risks under this act. For smaller establishments where dangerous substances are present in quantities subliminal, risk assessment in terms of the occurrence and effects of the accident is not required. Nevertheless, these objects can represent a source of danger of a major accident, especially given its location, nature of the threat and synergy due to several adverse circumstances. Aim of this paper is to design a model fo
APA, Harvard, Vancouver, ISO, and other styles
39

Raveendran, Sreejith, Deepashree Rajshekar, Sujatha S R, and Krishna Karthik M V S. "Evaluation of phenotypic carbapenem inactivation methods among carbapenem resistant gram-negative bacteria isolated from blood culture specimens and their synergy testing." Indian Journal of Microbiology Research 11, no. 3 (2024): 175–79. http://dx.doi.org/10.18231/j.ijmr.2024.032.

Full text
Abstract:
: Carbapenem-resistant Enterobacterales (CRE) are a significant public health threat due to their resistance to antibiotics, leading to serious infections, increased healthcare expenses, and higher mortality rates. Accurate identification of CRE is essential for effective treatment and infection control. Phenotypic methods like the modified Carbapenemase Inactivation Method (mCIM) and the EDTA-Carbapenem Inactivation Method (eCIM) are practical approaches for identifying production carbapenemase. As a result, the current study aims to analyse the efficacy of phenotypic carbapenem inactivation
APA, Harvard, Vancouver, ISO, and other styles
40

Ully, Ngesti Pratiwi, and Nugroho Adi. "Synergy of Local Government Institutions in Dealing with Forest and Land Fires as A Non-Military Threat at Border Regions in Indonesia." International Journal of Business Management and Technology 5, no. 5 (2023): 90–95. https://doi.org/10.5281/zenodo.7672753.

Full text
Abstract:
Forest and land fires that regularly occur in West Kalimantan, which is located in the border regions, are a non-military threat that can cause losses for Indonesia and neighboring countries. This study aims to analyze the synergies between the local government, West Kalimantan BPBD, and other relevant agencies in dealing with forest and land fires in West Kalimantan as a non-military threat. In this research, the writer used a qualitative research method with a descriptive analytical approach. The results of this study are synergy is carried out in designing collaborative programs or activiti
APA, Harvard, Vancouver, ISO, and other styles
41

Ismayil Ismayilov, Ismayil Ismayilov, and Izzet Orujov Izzet Orujov. "BASIC PRINCIPLES OF BUILDING INTELLIGENT SYSTEMS FLIGHT CONTROL." ETM - Equipment, Technologies, Materials 16, no. 04 (2023): 14–19. http://dx.doi.org/10.36962/etm16042023-14.

Full text
Abstract:
The issues of creating intelligent control systems in a dynamically changing flight environment are considered and the principle of constructing an onboard intelligent flight control system is proposed. The implementation of the proposed system is based on the pilot's situational awareness of the flight progress in real time, which allows avoiding errors and maintaining enhanced synergy between human and avionics systems. Constant adaptation of the cockpit, as well as onboard. automation successfully maintains the pilot's workload within an optimal range, mitigating the occurrence of dangerous
APA, Harvard, Vancouver, ISO, and other styles
42

Yevseiev, Serhii, Serhii Pohasii, Stanislav Milevskyi, et al. "Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model." Eastern-European Journal of Enterprise Technologies 5, no. 9 (113) (2021): 30–47. http://dx.doi.org/10.15587/1729-4061.2021.241638.

Full text
Abstract:
The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Security models of cyber-physical systems are proposed: “predator–prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator–prey” taking into account the possible competition of attackers in relation to the “prey”, “predator–prey” taking into account the relationships between “prey species” and “predator species”, “predator–prey” taking into account the relationship between “prey species” and “predator spe
APA, Harvard, Vancouver, ISO, and other styles
43

Elrafey, Asmaa, Ahmed A. Farghali, W. Kamal, et al. "Cost-effective eggshell-modified LDH composite for caffeine adsorption, cytotoxicity and antimicrobial activity: exploring the synergy and economic viability in search processes." RSC Advances 14, no. 45 (2024): 33281–300. http://dx.doi.org/10.1039/d4ra04558k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tsimonis, Konstantinos, Igor Rogelja, Ioana Ciută, Anastasia Frantzeskaki, Elena Nikolovska, and Besjan Pesha. "A Synergy of Failures: Environmental Protection and Chinese Capital in Southeast Europe." Journal of Current Chinese Affairs 48, no. 2 (2019): 171–200. http://dx.doi.org/10.1177/1868102620919861.

Full text
Abstract:
Chinese economic presence in Europe is primarily discussed as a security threat with its impact on sustainability remaining a rather marginal issue. This article investigates the repercussions of Chinese capital’s surge in Europe for environmental protection and analyses the reasons behind its poor performance. We examine five key Chinese projects in Southeast Europe, a sub-region that includes countries with different forms of association with European institutions and with varying levels of development and state capacity. We find that the negative environmental impact of these projects canno
APA, Harvard, Vancouver, ISO, and other styles
45

Feriadi Feriadi, Jasmine Damayanti, and Muhammad Yasin. "Analisis Struktur Kekuatan Persaingan Dan Cluster Industri." JURNAL MANAJEMEN DAN BISNIS EKONOMI 2, no. 3 (2024): 166–73. http://dx.doi.org/10.54066/jmbe-itb.v2i3.1980.

Full text
Abstract:
This research aims to analyze the structure of competitive forces and industrial clusters. Using Porter's five forces model framework, this research evaluates the key elements that influence competitiveness in a particular industry. This study also utilizes an industrial cluster approach to understand the dynamics of groups of companies operating in the same or related sectors. The research results show that factors such as the threat of new entrants, the bargaining power of suppliers, the bargaining power of buyers, the threat of substitute products, and competition between companies have a s
APA, Harvard, Vancouver, ISO, and other styles
46

Kanellopoulos, Anastasios Nikolaos. "Counterintelligence, Artificial Intelligence and National Security: Synergy and Challenges." Journal of Politics and Ethics in New Technologies and AI 3, no. 1 (2024): e35617. http://dx.doi.org/10.12681/jpentai.35617.

Full text
Abstract:
Counterintelligence (CI) and Artificial Intelligence (AI) represent two distinct yet interconnected domains that play pivotal roles in safeguarding National and International Security. On the first hand, CI involves activities and measures taken to identify, prevent and counter any Intelligence activities of hostile entities, such as spying, sabotage and information gathering. On the other hand, AI refers to the development and use of computer systems that can perform tasks that typically require human intelligence, such as learning, reasoning and problem-solving. Subsequently, in the ever-evo
APA, Harvard, Vancouver, ISO, and other styles
47

Machica, Jr, Apolonio, Stephanie Belonias, Agnesia Machica, Maricel Garcia, Eliza Cabugawan, and Jenalyn Gonzaga. "Narrowing the threat of poverty through entrepreneurial empowerment: the experience of rural women entrepreneurs." International Forum Journal 21, no. 2 (2018): 32. https://doi.org/10.63201/oaau3825.

Full text
Abstract:
Poverty is a world-wide social problem which has always threatened human life. It is structural or man-made; and as such, its threatening effect can be mitigated through empowerment efforts. Anchored on the theories of capacity approach, reinforcement, pathgoal leadership, learned needs, and self-determination, this case study explored the consequences of the entrepreneurial empowerment interventions of government and non-government agencies, which worked in synergy to provide capability trainings, materials, and technical support to rural women entrepreneurs. Based on the information generate
APA, Harvard, Vancouver, ISO, and other styles
48

Guan, Zhiwei. "Artificial Intelligence-Driven Cybersecurity Visualization and Animation Technology: From Threat Perception to Decision Support." Applied and Computational Engineering 145, no. 1 (2025): 113–17. https://doi.org/10.54254/2755-2721/2025.21899.

Full text
Abstract:
In the face of escalating complexity and scale of cyber attacks, traditional cybersecurity analysis methods are overwhelmed by the volume, dynamism, and complexity of data. Artificial Intelligence (AI), with its prowess in threat detection, behavioral analysis, and automated response, offers a beacon of hope. However, the black box nature of AI complicates trust in its decision-making. Concurrently, computer animation and data visualization emerge as powerful tools for intuitive and interactive data interpretation. This paper explores the synergy between AI and animation in cybersecurity, aimi
APA, Harvard, Vancouver, ISO, and other styles
49

Asogwa, Chika Euphemia. "Internet-Based Communications: A Threat or Strength to National Security?" SAGE Open 10, no. 2 (2020): 215824402091458. http://dx.doi.org/10.1177/2158244020914580.

Full text
Abstract:
This study examined how internet-based communication channels impact on national security in Nigeria. The study was conducted in Enugu State, South East Nigeria. Three research questions guided the study and three null hypotheses were tested at .05 level of significance. A total of 385 internet users were selected using a combination of purposive and snow ball sampling techniques. In the analysis of data for the study, correlation analysis and multiple regression were used. The result of the analysis showed that internet-based media of communication like the Facebook, Gmail, YouTube, Yahoo mai
APA, Harvard, Vancouver, ISO, and other styles
50

Mazaraki, Anatolii, Nataliya Kalyuzhna, and Larysa Sarkisian. "MULTIPLICATIVE EFFECTS OF HYBRID THREATS*." Baltic Journal of Economic Studies 7, no. 4 (2021): 136–44. http://dx.doi.org/10.30525/2256-0742/2021-7-4-136-144.

Full text
Abstract:
The purpose of this article is to develop methodological approaches to assess the likelihood of multiplicative effects of hybrid threat combinations based on their systematization according to the key areas of hybrid confrontation. Methodology. Methods of analysis and synthesis are used to identify the key areas of hybrid confrontation; methods of abstraction and generalization - to justify the multiplicative effects of implementing combinations of hybrid threats; method of mathematical modeling – to formalize the criterion of effectiveness of various hybrid aggression tools. The research is b
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!