Academic literature on the topic 'Traditional Security Approach'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Traditional Security Approach.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Traditional Security Approach"
Polcumpally, Arun Teja. "Non –Traditional Security Approach in International relations :." Jindal Journal of International Affairs 2, no. 5 (2021): 44–52. http://dx.doi.org/10.54945/jjia.v2i5.73.
Full textHama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Full textZainol Abidin, Zahimi, and Mohd Faizal Mohd Jais. "NON-TRADITIONAL SECURITY THREAT: IMPACT AND CHALLENGE ON MALAYSIAN SECURITY." International Journal of Law, Government and Communication 9, no. 37 (2024): 176–88. https://doi.org/10.35631/ijlgc.937015.
Full textOpeoluwa, Adisa Oluyemi. "Religion and Military Security: The Military Still Matters." Journal of Social and Political Sciences 4, no. 2 (2021): 41–52. https://doi.org/10.31014/aior.1991.04.02.274.
Full textWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Full textFarneubun, Petrus. "Feminist Critiques against Traditional Approaches to Security." Jurnal Global & Strategis 9, no. 1 (2018): 19. http://dx.doi.org/10.20473/jgs.9.1.2015.19-36.
Full textTetmeyer, Annette, Daniel Hein, and Hossein Saiedian. "A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes." International Journal of Secure Software Engineering 5, no. 4 (2014): 31–47. http://dx.doi.org/10.4018/ijsse.2014100102.
Full textResearcher. "SECURING CLOUD-NATIVE APPLICATIONS: A HOLISTIC APPROACH." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 692–702. https://doi.org/10.5281/zenodo.13364065.
Full textHeriamsal, Krisman, Rivelda Pricilia Heatubun, Heyna Jekaisa, and Andi Ira Tenri Adikusuma. "Water Diplomacy and Non-Traditional Security." Nation State: Journal of International Studies 7, no. 2 (2025): 162–79. https://doi.org/10.24076/nsjis.v7i2.1387.
Full textSyed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Full textDissertations / Theses on the topic "Traditional Security Approach"
Malec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.
Full textMéthot, Josée. "A multidimensional approach to food security and non-traditional export agriculture: a case study in Guatemala." Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121470.
Full textAbadio, Finco Fernanda [Verfasser], and Lutz [Akademischer Betreuer] Graeve. "Health enhancing traditional foods in Brazil : an interdisciplinary approach to food and nutritional security / Fernanda Abadio Finco. Betreuer: Lutz Graeve." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2012. http://d-nb.info/102856709X/34.
Full textFinco, Fernanda Abadio [Verfasser], and Lutz [Akademischer Betreuer] Graeve. "Health enhancing traditional foods in Brazil : an interdisciplinary approach to food and nutritional security / Fernanda Abadio Finco. Betreuer: Lutz Graeve." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2012. http://d-nb.info/102856709X/34.
Full textFukumi, Sayaka. "A non-traditional security threat : contending EU and US approaches to cocaine trafficking from the Andes." Thesis, University of Nottingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421548.
Full textDagne, Teshager Worku. "INTELLECTUAL PROPERTY, TRADITIONAL KNOWLEDGE AND BIODIVERSITY IN THE GLOBAL ECONOMY: THE POTENTIAL OF GEOGRAPHICAL INDICATIONS FOR PROTECTING TRADITIONAL KNOWLEDGE-BASED AGRICULTURAL PRODUCTS." Thesis, 2012. http://hdl.handle.net/10222/14535.
Full textBooks on the topic "Traditional Security Approach"
Caballero-Anthony, Mely. An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.
Full textHunter, Steven. Breaching barriers: A comprehensive approach to Special Operations Forces decision-making in non-traditional security environments. Canadian Defence Academy Press, 2013.
Find full textMallavarapu, Siddharth. International relations theory and non-traditional approaches to security. WISCOMP, 2008.
Find full textMallavarapu, Siddharth. International relations theory and non-traditional approaches to security. WISCOMP, 2008.
Find full textMallavarapu, Siddharth. International relations theory and non-traditional approaches to security. WISCOMP, 2008.
Find full textSecurity Perception: Within and Beyond the Traditional Approach. Storming Media, 2003.
Find full textRamon Pacheco E. T. Al PARDO. Non-Traditional Security in East Asia: A Regime Approach. Imperial College Press, 2015.
Find full textCaballero-Anthony, Mely. Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications, Limited, 2016.
Find full textPardo, Ramon Pacheco. Non-Traditional Security in East Asia: A Regime Approach. World Scientific Publishing Co Pte Ltd, 2015.
Find full textCaballero-Anthony, Mely. Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications, Limited, 2016.
Find full textBook chapters on the topic "Traditional Security Approach"
Caballero-Anthony, Mely. "Understanding Non-traditional Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n1.
Full textRushton, Simon. "Health Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n10.
Full textCaballero-Anthony, Mely. "On Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n2.
Full textEwing, J. Jackson. "Environmental Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n6.
Full textTeng, Paul, and Jonatan Lassa. "Food Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n7.
Full textZha, Daojiong. "Energy Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n8.
Full textKing, Marcus DuBois. "Water Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n9.
Full textCaballero-Anthony, Mely. "Conflict and Community Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n4.
Full textHadiwinata, Bob S. "Poverty and Economic Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n5.
Full textShweta, S., B. Subramaniam, Manoj K. Rai, Shagun Danda, Anil Kurmi, and Sandeep Kaushik. "Traditional Agriculture: A Sustainable Approach Toward Attaining Food Security." In Crop Sustainability and Intellectual Property Rights. Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003383024-3.
Full textConference papers on the topic "Traditional Security Approach"
Varbanov, Velizar, Kalin Kopanov, and Tatiana Atanasova. "A MULTIDISCIPLINARY APPROACH TO TELEGRAM DATA ANALYSIS." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/2.1/s07.01.
Full textGabštur, Peter, Martin Pollák, Marek Kočiško, and Jakub Kaščak. "Modification of Components Using Generative Design Tools." In Materials and Technologies for Defense and Security. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-7tgpug.
Full textGupta, Sajal, John Alexander, Kanchan Bartwal, Harshit Narang, Daksh Rawat, and Manisha Aeri. "Securing Cyberspace: Traditional vs. IoT Botnets-A Machine Learning Classification Approach." In 2024 1st International Conference on Advanced Computing and Emerging Technologies (ACET). IEEE, 2024. http://dx.doi.org/10.1109/acet61898.2024.10730487.
Full textShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Full textSayeed, Sayed Abu, Naresh Kshetri, Mir Mehedi Rahman, Samiul Alam, and Abdur Rahman. "dataLDA: Analyzing Data Quality in Big Data Using Traditional Approaches vs. Latent Dirichlet Allocation - Systematic Review." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012074.
Full textNahhas, Safia, Omaimah Bamasag, Maher Khemakhem, and Nada Bajnaid. "Linked Data Approach to Mutually Enrich Traditional Education Resources with Global Open Education." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8441941.
Full textAl Alawi, N. "Evergreen OT Security Assurance: A Sustainable Approach to OT Cybersecurity Risk Management." In SPE Conference at Oman Petroleum & Energy Show. SPE, 2025. https://doi.org/10.2118/224964-ms.
Full textPeshev, Aleksandar. "BEYOND PROPAGANDA AND FAKE NEWS: ELEMENTS OF PSYCHOLOGICAL OPERATIONS AND INFORMATION WARFARE." In SECURITY HORIZONS. Faculty of Security- Skopje, 2023. http://dx.doi.org/10.20544/icp.8.1.23.p22.
Full textMycek, Andrzej, and Maryna Lukaczyk. "Multi-Layered Security Of Web Applications In Cloud Environments Using WAF, Zero Trust, AI-Driven Threat Detection, And RASP." In 39th ECMS International Conference on Modelling and Simulation. ECMS, 2025. https://doi.org/10.7148/2025-0262.
Full textCiuperca, Ella magdalena. "SECURING COMMUNITY, SECURING BUSINESS! MANAGERS SECURITY AWARENESS THROUGH ELEARNING." In eLSE 2012. Editura Universitara, 2012. http://dx.doi.org/10.12753/2066-026x-12-169.
Full textReports on the topic "Traditional Security Approach"
Brzoska, Michael, Wuyi Omitoogun, and Elisabeth Sköns. The Human Security Case for Military Expenditure Reductions. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/tmrz9944.
Full textBaldwin, Gretchen. Considering the Future of Gender and Peace Operations: Strategic Debates and Operational Challenges. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/lcsv1618.
Full textMangrulkar, Amol, Archita S, Elizabeth Shilpa Abraham, and Pooja Sagar. Flowing Towards Sustainability: Innovations in Campus Water Management. Indian Institute for Human Settlements, 2024. http://dx.doi.org/10.24943/9788195847372.
Full textSoramäki, Kimmo, and Florian Loecker. Preserving Data Sovereignty in National Fraud Portals- a Distributed Data Architecture. FNA, 2024. https://doi.org/10.69701/dhmk3850.
Full textVuksanović, Vuk. Between Emotions and Realism: Two Faces of Turkish Foreign Policy in the Balkans. Belgrade Centre for Security Policy, 2023. http://dx.doi.org/10.55042/wzvw6831.
Full textDe Man, Philip, Gustavo Müller, Marie Vandendriessche, Carlota Moreno Villar, Ana Aguilera Raga, and Jan Wouters. The Evolution of Global Governance. EsadeGeo. Center for Global Economy and Geopolitics, 2022. https://doi.org/10.56269/202209/pdm.
Full textLehotay, Steven J., and Aviv Amirav. Ultra-Fast Methods and Instrumentation for the Analysis of Hazardous Chemicals in the Food Supply. United States Department of Agriculture, 2012. http://dx.doi.org/10.32747/2012.7699852.bard.
Full textIffat, Idris. Approaches to Youth Violence in Jordan. Institute of Development Studies, 2020. http://dx.doi.org/10.19088/k4d.2021.121.
Full textHenderson, Heath, and Nancy McCarthy. The Role of Renewable Energy Laws in Expanding Energy from Non-Traditional Renewables. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0011659.
Full textBunse, Simone, and Caroline Delgado. Promoting Peace through Climate-resilient Food Security Initiatives. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/nfax5143.
Full text