Segui questo link per vedere altri tipi di pubblicazioni sul tema: Defence and security contracts.

Articoli di riviste sul tema "Defence and security contracts"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Defence and security contracts".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Heuninckx, Baudouin. "Defence procurement: The most effective way to grant illegal State Aid and get away with it... or is it?" Common Market Law Review 46, Issue 1 (2009): 191–211. http://dx.doi.org/10.54648/cola2009007.

Testo completo
Abstract (sommario):
This article examines the ways in which the EC State aid rules apply to defence procurement in the EU and identifies the issues raised by the interplay between these two areas of the law. The award of a public contract can be found to be State aid if it is not in the form of a “normal commercial transaction”. However, even though defence procurement generally has to comply with EC public procurement law, it can be subject to a number of exemptions for reasons of public security. This raises the issue of cross–subsidization from the military to the civil sector, which could be found to constitu
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Zervos, Vasilis. "European Policies and the Space Industry Value Chain (Note 1)." Journal of Economics and Public Finance 4, no. 1 (2018): 101. http://dx.doi.org/10.22158/jepf.v4n1p101.

Testo completo
Abstract (sommario):
<p><em>The economics of contracting have received rather limited attention insofar as the implications for efficiency from the selection of types of contracts employed in the aerospace and defence sector are involved. The paper analyzes the challenges confronting the cost-plus/cost-reimbursement type of contracts of European Commission and intergovernmental organizations like the European Space Agency (ESA), who are involved in security and defence projects with significant multiplier effects within defence and security networks. The analysis indicates how institutional limitations
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Chernysheva, Galina N., Nikolay V. Rogov, and Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders." Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, no. 3 (September 30, 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.

Testo completo
Abstract (sommario):
Introduction. The national security of the Russian Federation, both within the country and externally, is ensured by the development of its military-technical potential. The military-technical potential is viewed as an ability of the state to maintain the armed forces and to provide the army with modern and competitive military equipment. This is performed through state defence orders (SDOs). Taking into account both internal and external factors, it is impossible to fulfil SDOs without a reliable system of contract liabilities. To ensure proper fulfilment of SDOs, it is necessary to consider
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Hasnaoui, Inas, Maria Zrikem, and Rajaa Elassali. "Block-AD: Blockchain Attack-Defense CTF Competition for Next-Web3 Security." International Journal of Computer Science, Engineering and Information Technology 13, no. 5 (2023): 30–37. http://dx.doi.org/10.5121/ijcseit.2023.13503.

Testo completo
Abstract (sommario):
The rapid growth of blockchain technology hasintroduced newsecurity challengesin decentralized systems.In this paper, we present Block-AD, a Blockchain Attack-Defense Capture The Flag (CTF) competition aimed at improving smart contract security skills and addressing evolving security threats in Next-Web3 environments. Unlike traditional CTF competitions, participants engage in attack and defense actions to exploit vulnerabilities and protect their smart contract services. This game-based approach concludes with rewards distributed from the competition’s vault and the allocation of non-fungible
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Sarkawi, Azizi Ahmad, Mohamad Ghozali Hassan, and Mustakim Melan. "THE SIGNIFICANCE OF LEADERSHIP SUPPORT TOWARDS EFFECTIVE CONTRACT MANAGEMENT." Journal of Technology and Operations Management 18, no. 2 (2023): 1–8. http://dx.doi.org/10.32890/jtom2023.18.2.1.

Testo completo
Abstract (sommario):
This study examines the role of leadership support in contract management within the Ministry of Defence, focusing on the asset and equipment maintenance crucial for national security. It aims to assess the current level of leadership support among Supply & Secretariate Officers in the Royal Malaysian Navy and their understanding of its importance. By addressing this gap, this study intends to improve contract management practices for enhanced national security within the ministry. A quantitative survey was used to obtain data through stratified random sampling. The survey was initiated in
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Novruzova, Oksana B., Ilya A. Klevtsov, and Elizaveta R. Shikova. "Methods and Conditions of Conclusion of State Contracts." Court administrator 1 (February 8, 2024): 12–15. http://dx.doi.org/10.18572/2072-3636-2024-1-12-15.

Testo completo
Abstract (sommario):
The article reveals the concept of a state contract, discusses the features and specific features of a state contract, as well as the methods and conditions for its conclusion. In addition, the work comments on the latest changes in the field of government contracts, which are aimed at increasing the efficiency of procurement for defense and national security.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Derrick Lim Kin Yeap, Jason Jong Sheng Tat, Jason Ng Yong Xing, Joan Sia Yuk Ting, Mildred Lim Pei Chin, and Muhammad Faisa. "Securing Industrial IoT: Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency." International Journal of Computer Technology and Science 1, no. 3 (2024): 01–19. http://dx.doi.org/10.62951/ijcts.v1i3.18.

Testo completo
Abstract (sommario):
The Industrial Internet of Things (IIoT) enhances the connectivity and efficiency of living lifestyles. However, it also comes with significant security vulnerabilities. Traditional authentication methods are often inadequate, leading to IIoT devices opened to security threats. This paper proposes a comprehensive security framework integrating blockchain, cryptographic techniques, smart contracts, and deep learning-based Intrusion Detection Systems (IDS) to tackle the mentioned issue. Blockchain ensures data integrity and prevents tampering through a decentralized ledger. A decentralized devic
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Mateaş, Florian. "GENERAL CHARACTERIZATION OF SECURITY SYSTEMS FOR OBJECTIVES, GOODS, VALUABLES AND PROTECTION OF INDIVIDUALS." Agora International Journal of Juridical Sciences 9, no. 3 (2015): 21–28. http://dx.doi.org/10.15837/aijjs.v9i3.2113.

Testo completo
Abstract (sommario):
The local police operate as a public institution with legal personality for the interest of citizens, which provides services for the security of goods, participates in the defence of public order and peace, of the life and integrity of individuals, and other rights and legitimate interests of the community.The organization and carrying out of the guarding of the goods and valuables of any kind owned, their transportation and other security services, and participation in the defence of public order and peace are done on the basis of contracts concluded between the local Police and mayors, publ
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Ahmad Sarkawi, Azizi, Mohamad Ghozali Hassan, and Mustakim Melan. "Navigating Contract Compliance in Maritime Procurement for National Security: A Study on the Ministry of Defense." Compendium by PaperASIA 39, no. 5(b) (2023): 34–39. http://dx.doi.org/10.59953/cpa.v39i5(b).33.

Testo completo
Abstract (sommario):
Public procurement involves government spending for the well-being of the people. This study was carried out to observe the management of contracts implemented by procurement officers at the Ministry of Defense (Royal Malaysian Navy) for expenses related to asset and equipment maintenance used to maintain national maritime security for the well-being of the people. This study also attempts to examine the level of understanding of the procurement officers on pre-planning of asset maintenance contract procurement planning and financial planning, as well as whether or not the mechanism used is su
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Kim, Yong Woon, and Trevor Brown. "Autonomy versus control in procurement and contracting: the use of cost-reimbursement contracts in three US federal departments." International Review of Administrative Sciences 83, no. 1_suppl (2016): 41–58. http://dx.doi.org/10.1177/0020852315619477.

Testo completo
Abstract (sommario):
This article examines the efficacy of central attempts to influence the use of specific types of contracts, namely, cost-reimbursement versus fixed-price contracts, by individual departments within a decentralized procurement system. We draw five years of data (Fiscal Years 2004–2008) from the Federal Procurement Data System to examine the contract type decisions of three US federal agencies: the Department of Health and Human Services, the Department of Defense, and the Department of Homeland Security. The results of our analysis suggest that while departments have discretion to purchase prod
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Irenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel, and Muhammad Faisal. "Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability." International Journal of Computer Technology and Science 1, no. 3 (2024): 41–55. http://dx.doi.org/10.62951/ijcts.v1i3.24.

Testo completo
Abstract (sommario):
In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unc
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Setia, Prashant, and Sandosh S. "Enhancing Cybersecurity Defense of IoT Ecosystem Using Blockchain." Suranaree Journal of Science and Technology 30, no. 4 (2023): 010238(1–14). http://dx.doi.org/10.55766/sujst-2023-04-e01071.

Testo completo
Abstract (sommario):
The expansion of IoT devices over the past years has led to the development of smart ecosystems susceptible to cyberattacks. These ecosystems include smart industries and smart home security systems. However, when these devices are widely deployed and generate significant amounts of data, this data must be securely stored on the cloud to prevent it from being compromised by serious cyber attacks. Although traditional security methods partly meet the need to protect the privacy and security of smart IoT ecosystems, their centralized structure and limited computing power make them inefficient. H
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Princess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.

Testo completo
Abstract (sommario):
The rapid growth of the fintech industry has led to an increased reliance on digital financial transactions, which simultaneously presents significant cybersecurity risks. This abstract explores the potential of combining blockchain technology with advanced cybersecurity protocols to create a dual-layered approach to securing financial transactions and protecting customer data in fintech applications. Blockchain, with its decentralized and immutable nature, offers inherent security benefits, making it an ideal foundation for enhancing the integrity of financial transactions. Each transaction r
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Belova, Iryna, Andrii Homotiuk, and Oleksiy Yaroshchuk. "Digital transformation of administrative and business processes in Ukraine during marital state." Economic Analysis, no. 34(1) (2024): 42–52. http://dx.doi.org/10.35774/econa2024.01.042.

Testo completo
Abstract (sommario):
The article is devoted to the analysis of the digital transformation of management and business processes in Ukraine during martial law, with an emphasis on the development and application of digital tools, such as the Diya platform, chatbots and other digital services that provide important services for citizens and support state initiatives. The main focus is on the role of blockchain technologies and smart contracts in the modernization of the financial, administrative and social spheres, as well as on the potential of these technologies to increase the transparency, efficiency and security
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Ruggieri, Lynn. "Michael Bianco Inc. Immigrant Workers To Save Costs." Journal of Business Case Studies (JBCS) 7, no. 4 (2011): 91–104. http://dx.doi.org/10.19030/jbcs.v7i4.4687.

Testo completo
Abstract (sommario):
Michael Bianco Inc. was a relatively small manufacturing firm employing 85 people in 2001. By 2004, the company was awarded several multimillion dollar government contracts from the Department of Defense making backpacks for troops serving in Iraq. The company increased its work force to over 500 to accommodate the contracts. The workers, however, were illegal aliens. The Department of Homeland Security raided the manufacturing facility, found and detained over 300 illegal workers for deportation. Further investigation revealed deplorable and unfair working conditions, including lack of heat a
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Azreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya, and Muhammad Faisal. "Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme." International Journal of Computer Technology and Science 1, no. 3 (2024): 20–40. http://dx.doi.org/10.62951/ijcts.v1i3.19.

Testo completo
Abstract (sommario):
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contract
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Krichen, Moez. "Strengthening the Security of Smart Contracts through the Power of Artificial Intelligence." Computers 12, no. 5 (2023): 107. http://dx.doi.org/10.3390/computers12050107.

Testo completo
Abstract (sommario):
Smart contracts (SCs) are digital agreements that execute themselves and are stored on a blockchain. Despite the fact that they offer numerous advantages, such as automation and transparency, they are susceptible to a variety of assaults due to their complexity and lack of standardization. In this paper, we investigate the use of artificial intelligence (AI) to improve SC security. We provide an overview of Smart Contracts (SCs) and blockchain technology, as well as a discussion of possible SC-based attacks. Then, we introduce various AI categories and their applications in cybersecurity, foll
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Seetharam kakaraparthi, Durganjaneyulu immadisetty, and Maranco M. "Enhanced honeypot security for intrusion detection and prevention systems using blockchain." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 751–58. http://dx.doi.org/10.30574/wjarr.2024.22.1.1065.

Testo completo
Abstract (sommario):
The project aims to enhance honeypot security through the integration of blockchain technology into an intrusion detection and prevention system (IDPS). Honeypots are decoy systems deployed to detect, deflect, or study unauthorized use of information systems. By leveraging blockchain, a decentralized and tamper-proof ledger, the project ensures the integrity and immutability of honeypot data, providing robust security against cyber threats.The system employs a blockchain-based architecture where each honeypot event is recorded as a block in the chain, ensuring the integrity of the data. Additi
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Bayani, Samir Vinayak, Sanjeev Prakash, and Lavanya Shanmugam. "Data Guardianship: Safeguarding Compliance in AI/ML Cloud Ecosystems." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 436–56. http://dx.doi.org/10.60087/jklst.vol2.n3.p456.

Testo completo
Abstract (sommario):
AI has found widespread application across various sectors, including security, healthcare, finance, and national defense. However, alongside its transformative advancements, there has been an unfortunate trend of malicious exploitation of AI capabilities. Concurrently, the rapid evolution of cloud computing technology has introduced cloud-based AI systems. Regrettably, vulnerabilities inherent in cloud computing infrastructure also pose risks to the security of AI services. We observe that the integrity of training data is pivotal, as any compromise therein directly impacts the efficacy of AI
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Yachna, I., O. Kuvshynova, D. Shabanov, Ye Porуnos, and M. Kostashchuk. "BLOCKCHAIN AND ITS APPLICATION IN THE DEFENCE SECTOR." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки 20, no. 3 (2024): 139–45. http://dx.doi.org/10.37701/dndivsovt.21.2024.17.

Testo completo
Abstract (sommario):
The digital transformation of the economy affects many sectors, including the defence sector, which is sensitive from both a national and international perspective. The digitalisation of the economy is based on technologies such as robotics, autonomy, additive manufacturing technologies (3D printing), augmented reality, big data, quantum computers, artificial intelligence and blockchains. In this article, we will take a closer look at the latter, namely blockchain technology. We will briefly outline its main properties and advantages, which make it particularly attractive for use in the defenc
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Kostopoulos, Nikos, Yannis C. Stamatiou, Constantinos Halkiopoulos, and Hera Antonopoulou. "Blockchain Applications in the Military Domain: A Systematic Review." Technologies 13, no. 1 (2025): 23. https://doi.org/10.3390/technologies13010023.

Testo completo
Abstract (sommario):
Background: Blockchain technology can transform military operations, increasing security and transparency and gaining efficiency. It addresses many problems related to data security, privacy, communication, and supply chain management. The most researched aspects are its integration with emerging technologies, such as artificial intelligence, the IoT, application in uncrewed aerial vehicles, and secure communications. Methods: A systematic review of 43 peer-reviewed articles was performed to discover the applications of blockchain in defense. Key areas analyzed include the role of blockchain i
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Rautio, Samu, Timo Tuomi, and Jan Akmal. "Legal Aspects of Additive Manufacturing in the Military Logistics." Security Dimensions 40, no. 40 (2022): 154–95. http://dx.doi.org/10.5604/01.3001.0015.8153.

Testo completo
Abstract (sommario):
Background: The use of Additive Manufacturing (AM) in military logistics is limited by the uncertainty about the legal risks of using the method. Objectives: The purpose of this study was to identify the potential legal risks associated with AM of military materiel and its effects. The study was conducted as a case study, where AM is considered in military logistics. Methods: Legal issues were approached from the normative point of view in the context of potential legal dispute situations in four different cases. The topic was studied by reviewing and analyzing literature sources, official sou
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Romas, Maria. "Procedure for Concluding Civil Law Contracts with the Participation of the State of Ukraine under Martial Law." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi 2, no. 15(27) (2023): 187–94. http://dx.doi.org/10.33098/2078-6670.2023.15.27.2.187-194.

Testo completo
Abstract (sommario):
Purpose. The purpose of the article is to establish the peculiarities of the participation of the state of Ukraine in contractual obligations, to analyze the legal regulation of the procedure for concluding civil law contracts with the participation of the state of Ukraine, in particular, in the conditions of martial law, to make relevant theoretical conclusions. Methodology. The methodology includes a comprehensive analysis and generalization of the available scientific and theoretical material and the formulation of relevant conclusions and recommendations. The following methods of scientifi
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Chen, Yongle, Xiaojian Wang, Yuli Yang, and Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract." Sensors 20, no. 4 (2020): 1062. http://dx.doi.org/10.3390/s20041062.

Testo completo
Abstract (sommario):
Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. In this paper, we propose a location-aware authentication scheme using smart contracts to ensure that IoT devices can securely perform Wi-Fi network au
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Wyszomirska, Monika. "Tax and Legal Issues Related to the Implementation of Research and Development Projects in the Area of "Security and Defense"." Safety & Fire Technology 58, no. 2 (2021): 22–36. http://dx.doi.org/10.12845/sft.58.2.2021.2.

Testo completo
Abstract (sommario):
Purpose: The aim of the article is to discuss tax issues related to the settlement of subsidies for the implementation of projects in the area of"Security and Defense". The grant beneficiaries face numerous problems with the interpretation of the provisions of the VAT Act, which may result in serious financial consequences in the event of incorrect application of the VAT Act. This publication analyses and indicates solutions to these problems, which are most often raised by consortia, both in applications for tax interpretations and in complaints to administrative courts of both instances. Int
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Terpstra, J. "Particuliere beveiligers als publieke handhavers." Justitiële verkenningen 38, no. 8 (2012): 35–50. https://doi.org/10.5553/jv/016758502012038008004.

Testo completo
Abstract (sommario):
Private security officers as public enforcers Dutch local governments increasingly decide to contract private security officers for surveillance and enforcement tasks in the public space. This article presents an analysis of the daily work of these private security officers. Local governments contract these private workers because they are faced with problems of social disorder and crime. Although the police should formally manage the work of these private security workers, in practice this task is hardly realized. These private workers are faced with four problems: their work is boring, they
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Soroka, Larysa, Anna Danylenko, Maksym Sokiran, Diana Levchenko, and Oksana Zubko. "Public-private collaboration for national security: challenges and opportunities." Revista Amazonia Investiga 12, no. 70 (2023): 43–50. http://dx.doi.org/10.34069/ai/2023.70.10.4.

Testo completo
Abstract (sommario):
The purpose of the article is to study public-private collaboration as the main tool to guarantee national security and the sustainability of the State. Research results. The article examines the content, characteristics, and development prospects of public-private collaboration. The system of legal instruments of Ukraine regulating this issue is analyzed. The principles of implementation of the public-private partnership are characterized, as well as the key requirements for its effectiveness. It is summarized that the public-private partnership in the field of national security and defense i
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Papanikolaou, Alexandros, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, and Konstantinos Rantos. "A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection." Electronics 12, no. 6 (2023): 1484. http://dx.doi.org/10.3390/electronics12061484.

Testo completo
Abstract (sommario):
Network traffic analysis can raise privacy concerns due to its ability to reveal sensitive information about individuals and organizations. This paper proposes a privacy-preserving Block-chained AutoML Network Traffic Analyzer (BANTA). The system securely stores network traffic logs in a decentralized manner, providing transparency and security. Differential privacy algorithms protect sensitive information in the network flow logs while allowing administrators to analyze network traffic without the risk of leakages. The BANTA uses blockchain technology, where smart contracts automate the proce
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Xu, Ziqiang, Ahmad Salehi Shahraki, and Carsten Rudolph. "Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids." Smart Cities 6, no. 5 (2023): 3005–31. http://dx.doi.org/10.3390/smartcities6050135.

Testo completo
Abstract (sommario):
The smart grid optimises energy transmission efficiency and provides practical solutions for energy saving and life convenience. Along with a decentralised, transparent and fair trading model, the smart grid attracts many users to participate. In recent years, many researchers have contributed to the development of smart grids in terms of network and information security so that the security, reliability and stability of smart grid systems can be guaranteed. However, our investigation reveals various malicious behaviours during smart grid transactions and operations, such as electricity theft,
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Ghosh, Samadrita. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 303–22. http://dx.doi.org/10.60087/jaigs.v3i1.122.

Testo completo
Abstract (sommario):
Artificial intelligence (AI) has become ubiquitous across various industries, including security, healthcare, finance, and national defense. However, alongside its transformative potential, there has been a concerning rise in malicious exploitation of AI capabilities. Simultaneously, the rapid advancement of cloud computing technology has led to the emergence of cloud-based AI systems. Unfortunately, vulnerabilities inherent in cloud infrastructure also pose security risks to AI services. We recognize the critical role of maintaining the integrity of training data, as any compromise therein di
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Rana, Sohel. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 161–78. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p178.

Testo completo
Abstract (sommario):
Artificial intelligence (AI) has become ubiquitous across various industries, including security, healthcare, finance, and national defense. However, alongside its transformative potential, there has been a concerning rise in malicious exploitation of AI capabilities. Simultaneously, the rapid advancement of cloud computing technology has led to the emergence of cloud-based AI systems. Unfortunately, vulnerabilities inherent in cloud infrastructure also pose security risks to AI services. We recognize the critical role of maintaining the integrity of training data, as any compromise therein di
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Adegbite, Olusola Babatunde. "War Profiteering and Armed Conflicts: Examining Applicable Aspects of International Law." Groningen Journal of International Law 10, no. 1 (2023): 21–42. http://dx.doi.org/10.21827/grojil.10.1.21-42.

Testo completo
Abstract (sommario):
The proliferation of armed conflicts is perhaps the biggest challenge of the 21st Century international system. These conflicts have become a monumental lucrative industry, where parties external to the fighting, i.e., third parties, smile to the bank, from proceeds made on major deals in defence contracts and arms sales. In the process, they leave behind a trail of civilian fatalities. Notwithstanding the extensive literature on armed conflicts, the scholarly focus on the accountability framework related to war profiteering remains limited. This article examines the applicability of certain a
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Yasa, Abdul Rahman. "From Security Sector Reform to Endemic Corruption: The Case of Afghanistan." Journal of Strategic Security 13, no. 3 (2020): 99–119. http://dx.doi.org/10.5038/1944-0472.13.3.1755.

Testo completo
Abstract (sommario):
Corruption and insecurity are reinforcing each other. It can hinder the democratic processes and jeopardize the security sector through creating corrupt administrative systems, manipulation of contracts and procurement. After the decomposition of the Taliban in 2001, the U.S.-led coalition carried out Security Sector Reform (SSR) to (re) construct the Afghan National Police (ANP) and Afghan National Army (ANA) together known as Afghan National Defense and Security Forces (ANDSF). Over critical literature, there are serious critiques concerning the U.S. and its allies’ scrimmage for their role
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Pinheiro, Alexandre, Edna Dias Canedo, Robson de Oliveira Albuquerque, and Rafael Timóteo de Sousa Júnior. "Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts." Sensors 21, no. 13 (2021): 4440. http://dx.doi.org/10.3390/s21134440.

Testo completo
Abstract (sommario):
The management practicality and economy offered by the various technological solutions based on cloud computing have attracted many organizations, which have chosen to migrate services to the cloud, despite the numerous challenges arising from this migration. Cloud storage services are emerging as a relevant solution to meet the legal requirements of maintaining custody of electronic documents for long periods. However, the possibility of losses and the consequent financial damage require the permanent monitoring of this information. In a previous work named “Monitoring File Integrity Using Bl
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Silva, Mário Herbert Souza da, and Prof Me Dênis Márcio Jesus Oliveira. "Responsabilidade Civil por vício oculto na venda de veículos usados." RCMOS - Revista Científica Multidisciplinar O Saber 3, no. 1 (2024): 1–8. http://dx.doi.org/10.51473/ed.al.v3i1.516.

Testo completo
Abstract (sommario):
With the advancement of business modalities in current times, platforms and applications have streamlined business. It is up to legal operators to monitor social demands in order to guarantee legal security in these relationships. Contracts for the purchase and sale of used vehicles by private individuals are an important vector of trade, therefore requiring an investigation of the legal framework that will protect this specifi c business. This work, therefore, analyzes the possibilities of application of the Consumer Defense Code and the Civil Code.
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Witanto, Elizabeth Nathania, Yustus Eko Oktian, and Sang-Gon Lee. "Toward Data Integrity Architecture for Cloud-Based AI Systems." Symmetry 14, no. 2 (2022): 273. http://dx.doi.org/10.3390/sym14020273.

Testo completo
Abstract (sommario):
AI has been implemented in many sectors such as security, health, finance, national defense, etc. However, together with AI’s groundbreaking improvement, some people exploit AI to do harmful things. In parallel, there is rapid development in cloud computing technology, introducing a cloud-based AI system. Unfortunately, the vulnerabilities in cloud computing will also affect the security of AI services. We observe that compromising the training data integrity means compromising the results in the AI system itself. From this background, we argue that it is essential to keep the data integrity i
Gli stili APA, Harvard, Vancouver, ISO e altri
37

van Meegdenburg, Hilde. "‘We don’t do that’: A constructivist perspective on the use and non-use of private military contractors by Denmark." Cooperation and Conflict 54, no. 1 (2018): 25–43. http://dx.doi.org/10.1177/0010836718765901.

Testo completo
Abstract (sommario):
In this article I put forward a social constructivist perspective on state use of Private Military and Security Contractors (PMSCs). I will argue that state outsourcing decisions are, to a large extent, shaped by nationally shared values, understandings and dispositions. Concretely, I first provide a detailed overview of the extent of domestic and deployed contracting by the Danish Defence and, thereafter, based on a number of semi-structured interviews, I expose the dominant understandings that shaped how PMSCs have come to be understood in Denmark. By so doing I can show that the employment
Gli stili APA, Harvard, Vancouver, ISO e altri
38

ADEYINKA, Tajudeen Yusuf, Musediq Olufemi LAWAL, Olawale Olufemi AKINRINDE, and Remi Kasali ALATIS. "Nigeria’s Development Trajectory, Security Conundrum and the State-Citizens Relations." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (2024): 194–211. http://dx.doi.org/10.53477/2284-9378-24-13.

Testo completo
Abstract (sommario):
Crime represents a profound threat to societal well-being, generating misery and disorder. Understanding its nature, causes, patterns, and consequences is vital for its effective prevention and control. In Nigeria, the past two decades have witnessed a steady rise in criminal activities, straining resources and impeding national development. Relying on the Social Contract thesis, this study examines how the preponderance of criminality and insecurity has systematically hindered Nigeria’s developmental aspirations. In this study, we contend that the state’s primary duty is to safeguard citizens
Gli stili APA, Harvard, Vancouver, ISO e altri
39

GACEK, Józef, Bronisław MARCINIAK, and Ryszard WOŹNIAK. "Major Conditions of Shooting Range Operation in Poland." Problems of Mechatronics Armament Aviation Safety Engineering 9, no. 3 (2018): 89–104. http://dx.doi.org/10.5604/01.3001.0012.2741.

Testo completo
Abstract (sommario):
Under the "Authorisations of the Minister of National Defence" (latest - No. 57/MON dated 22 December 2014), a Permanent Expert Team operates at the Institute of Armament Technology of the Faculty of Mechatronics and Aerospace of the Military University of Technology (Warsaw, Poland), performing test shootings for the purpose of verifying the fulfilment of technical requirements to be met by garrison shooting ranges and their locations. During almost 20 years of its activity, the Team has conducted research studies under more than 325 civil law contracts concluded with operators of shooting ra
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Hum, Derek. "Tenure, Faculty Contracts and Bargaining Conflict." Canadian Journal of Higher Education 28, no. 3 (2017): 47–70. http://dx.doi.org/10.47678/cjhe.v28i3.183320.

Testo completo
Abstract (sommario):
Tenure is sometimes charged as giving faculty lifetime job security, with little accountability and sporadic monitoring of performance. Scholars have traditionally defended tenure as necessary for academic freedom. This paper takes a different approach by examining the academic "employment contract relationship," and explaining how tenure can lead to bargaining conflict. Tenure is costly to the university but extremely valued by the faculty member. The opportunity cost of granting tenure to someone is the lost teaching and research output of younger people who cannot be hired in future. Tenure
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Vladu, Mircea, and Stelian Popescu. "Considerations on the Impact of Emerging and Disruptive Technologies on Security Policies." Scientific Bulletin 26, no. 2 (2021): 211–16. http://dx.doi.org/10.2478/bsaft-2021-0026.

Testo completo
Abstract (sommario):
Abstract The issue of the impact of emerging and disruptive technologies on security policy is a major concern of the North Atlantic Treaty Alliance. This is also demonstrated by the meeting between the Board members and the newly-established Advisory Group for Emerging and Disruptive Technologies, consisting of top experts in the fields of Cyber, Artificial Intelligence, Quantum Computing, Big Data, Space, Robotics and Autonomous or Biotechnological Systems, to find new synergies between NATO, the private, governmental and academic sectors and to maintain the technological supremacy of the Al
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Kobroń-Gąsiorowska, Łucja. "The employee and their social security in flexible forms of employment on the example of Poland – selected issues. Part I." Kwartalnik Prawa Międzynarodowego IV, no. IV (2024): 187–206. http://dx.doi.org/10.5604/01.3001.0054.4285.

Testo completo
Abstract (sommario):
The regulation of employment and social policy – with safe and secure conditions of employment in terms of remuneration, safe employment conditions, protection in the event of dismissal, social dialogue, personal data protection, work-life balance, and finally a healthy, safe and well-adjusted work environment – constitutes the foundations of decent working conditions. At the same time, the task of a democratic state is to adjust the dynamically changing economic and market realities to ensure the maximum level of protection in the areas mentioned above relevant to each employee. This situatio
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Polychronaki, Maria, Dimitrios G. Kogias, Helen C. Leligkou, and Panagiotis A. Karkazis. "Blockchain Technology for Access and Authorization Management in the Internet of Things." Electronics 12, no. 22 (2023): 4606. http://dx.doi.org/10.3390/electronics12224606.

Testo completo
Abstract (sommario):
The Internet of Things (IoT) continues to suffer from security issues, even after 20 years of technological evolution and continuing efforts. While the decentralization of the IoT seems to be a solution for improved resource management and scalability, most of the services remain centralized, exposing IoT systems to malicious attacks. As a result, this leads to functionality failures and endangers user and data integrity. Identity and Access Management (IAM) has the ability to provide defense against a great number of security threats. Additionally, blockchain is a technology which can nativel
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Fleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.

Testo completo
Abstract (sommario):
The increased reliance on commercial satellites for military operations has made it essential for the Department of Defense (DoD) to adopt a supply chain framework to address cybersecurity threats in space. This paper presents a satellite supply chain framework, the Cybersecurity Supply Chain (CSSC) Framework, for the DoD in the evaluation and selection of commercial satellite contracts. The proposed strategy is informed by research on cybersecurity threats to commercial satellites, national security concerns, current DoD policy, and previous cybersecurity frameworks. This paper aims to provid
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Slepak, Vitaly Yu. "Legal Regulation of Financing of Scientific Studies by Means of Awarding State Contracts in the Area of Security and Defense." Jurist 8 (July 29, 2020): 2–9. http://dx.doi.org/10.18572/1812-3929-2020-8-2-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Tiverios, Nicholas. "A Uniform Hermeneutic Thesis." University of Queensland Law Journal 40, no. 2 (2021): 181–214. http://dx.doi.org/10.38127/uqlj.v40i2.5483.

Testo completo
Abstract (sommario):
At a broad level of generality, the orthodox approach to interpreting contracts, trusts, wills, security documents, company constitutions and so forth is the same: a search for the objective meaning to be attributed to the author or authors of the instrument (the ‘uniform hermeneutic thesis’). This article has two primary objectives. The first is to respond to a common criticism of this uniform objective approach. The criticism is that, as each species of legal obligation is different, different rules of interpretation should apply when the given legal context changes. For example, why not ask
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Zhang, Ying. "Increasing Cyber Defense in the Music Education Sector Using Blockchain Zero-Knowledge Proof Identification." Computational Intelligence and Neuroscience 2022 (June 28, 2022): 1–7. http://dx.doi.org/10.1155/2022/9922167.

Testo completo
Abstract (sommario):
Music creation and its promotion are encouraged both in music education and through activities organized in the context of artistic creation as part of the education in question. Although copyright registration is the primary way authors protect their rights, this is not feasible in most cases, as the processes take a long time to complete and incur high costs. We utilize modern innovative technologies and their developments in copyright protection matters to increase security and trust in music education. In particular, an advanced model of ensuring the methods and innovation produced in musi
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Manin, Iaroslav. "Defense of the Fatherland: Conscription for Military Service on Mobilization." Полицейская и следственная деятельность, no. 3 (March 2022): 42–63. http://dx.doi.org/10.25136/2409-7810.2022.3.38878.

Testo completo
Abstract (sommario):
The object of the study is constitutional legal relations for the protection of Russian citizens of their state in connection with conscription for military service in the Armed Forces of the Russian Federation, the subject of the study is normative legal acts regulating military duty. The author explains the legal meaning of the constitutional duty to protect the Fatherland, proposes an addition to the Russian concept of national security with a provision on preventive self-defense, amendments to the Federal Law "On Defense", the Federal Law "On Military Duty and Military Service", the Federa
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Ma, Xingbang, Dongsheng Yu, Yanhui Du, Lanting Li, Wenkai Ni, and Haibin Lv. "A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence." Electronics 12, no. 11 (2023): 2454. http://dx.doi.org/10.3390/electronics12112454.

Testo completo
Abstract (sommario):
With the development of the Internet, cyberattacks are becoming increasingly complex, sustained, and organized. Cyber threat intelligence sharing is one of the effective ways to alleviate the pressure on organizational or individual cyber security defense. However, the current cyber threat intelligence sharing lacks effective incentive mechanisms, resulting in mutual distrust and a lack of motivation to share among sharing members, making the security of sharing questionable. In this paper, we propose a blockchain-based cyber threat intelligence sharing mechanism (B-CTISM) to address the probl
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Varney, Eliza. "Redefining contractual capacity? the UN Convention on the Rights of Persons with Disabilities and the incapacity defence in English contract law." Legal Studies 37, no. 3 (2017): 493–519. http://dx.doi.org/10.1111/lest.12166.

Testo completo
Abstract (sommario):
How can the incapacity defence in contract law coexist with the concept of universal legal capacity advanced by the UN Convention on the Rights of Persons with Disabilities (CRPD)? In the absence of clear guidance from the CRPD on the link between legal capacity and mental capacity, and given the silence of this Convention on the concept of contractual capacity, this article stresses the need to redefine contractual capacity in a manner that responds not only to economic interests (eg upholding the security of transactions) but also to social interests (including the protection of values such
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!