Journal articles on the topic 'Defence and security contracts'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Defence and security contracts.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Heuninckx, Baudouin. "Defence procurement: The most effective way to grant illegal State Aid and get away with it... or is it?" Common Market Law Review 46, Issue 1 (February 1, 2009): 191–211. http://dx.doi.org/10.54648/cola2009007.
Full textZervos, Vasilis. "European Policies and the Space Industry Value Chain (Note 1)." Journal of Economics and Public Finance 4, no. 1 (February 28, 2018): 101. http://dx.doi.org/10.22158/jepf.v4n1p101.
Full textChernysheva, Galina N., Nikolay V. Rogov, and Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders." Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, no. 3 (September 30, 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.
Full textHasnaoui, Inas, Maria Zrikem, and Rajaa Elassali. "Block-AD: Blockchain Attack-Defense CTF Competition for Next-Web3 Security." International Journal of Computer Science, Engineering and Information Technology 13, no. 5 (October 27, 2023): 30–37. http://dx.doi.org/10.5121/ijcseit.2023.13503.
Full textSarkawi, Azizi Ahmad, Mohamad Ghozali Hassan, and Mustakim Melan. "THE SIGNIFICANCE OF LEADERSHIP SUPPORT TOWARDS EFFECTIVE CONTRACT MANAGEMENT." Journal of Technology and Operations Management 18, no. 2 (December 30, 2023): 1–8. http://dx.doi.org/10.32890/jtom2023.18.2.1.
Full textNovruzova, Oksana B., Ilya A. Klevtsov, and Elizaveta R. Shikova. "Methods and Conditions of Conclusion of State Contracts." Court administrator 1 (February 8, 2024): 12–15. http://dx.doi.org/10.18572/2072-3636-2024-1-12-15.
Full textDerrick Lim Kin Yeap, Jason Jong Sheng Tat, Jason Ng Yong Xing, Joan Sia Yuk Ting, Mildred Lim Pei Chin, and Muhammad Faisa. "Securing Industrial IoT: Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency." International Journal of Computer Technology and Science 1, no. 3 (July 17, 2024): 01–19. http://dx.doi.org/10.62951/ijcts.v1i3.18.
Full textMateaş, Florian. "GENERAL CHARACTERIZATION OF SECURITY SYSTEMS FOR OBJECTIVES, GOODS, VALUABLES AND PROTECTION OF INDIVIDUALS." Agora International Journal of Juridical Sciences 9, no. 3 (October 9, 2015): 21–28. http://dx.doi.org/10.15837/aijjs.v9i3.2113.
Full textAhmad Sarkawi, Azizi, Mohamad Ghozali Hassan, and Mustakim Melan. "Navigating Contract Compliance in Maritime Procurement for National Security: A Study on the Ministry of Defense." Compendium by PaperASIA 39, no. 5(b) (October 22, 2023): 34–39. http://dx.doi.org/10.59953/cpa.v39i5(b).33.
Full textKim, Yong Woon, and Trevor Brown. "Autonomy versus control in procurement and contracting: the use of cost-reimbursement contracts in three US federal departments." International Review of Administrative Sciences 83, no. 1_suppl (July 9, 2016): 41–58. http://dx.doi.org/10.1177/0020852315619477.
Full textIrenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel, and Muhammad Faisal. "Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability." International Journal of Computer Technology and Science 1, no. 3 (July 18, 2024): 41–55. http://dx.doi.org/10.62951/ijcts.v1i3.24.
Full textSetia, Prashant, and Sandosh S. "Enhancing Cybersecurity Defense of IoT Ecosystem Using Blockchain." Suranaree Journal of Science and Technology 30, no. 4 (October 9, 2023): 010238(1–14). http://dx.doi.org/10.55766/sujst-2023-04-e01071.
Full textPrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (February 9, 2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.
Full textBelova, Iryna, Andrii Homotiuk, and Oleksiy Yaroshchuk. "Digital transformation of administrative and business processes in Ukraine during marital state." Economic Analysis, no. 34(1) (2024): 42–52. http://dx.doi.org/10.35774/econa2024.01.042.
Full textRuggieri, Lynn. "Michael Bianco Inc. Immigrant Workers To Save Costs." Journal of Business Case Studies (JBCS) 7, no. 4 (June 24, 2011): 91–104. http://dx.doi.org/10.19030/jbcs.v7i4.4687.
Full textAzreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya, and Muhammad Faisal. "Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme." International Journal of Computer Technology and Science 1, no. 3 (July 17, 2024): 20–40. http://dx.doi.org/10.62951/ijcts.v1i3.19.
Full textKrichen, Moez. "Strengthening the Security of Smart Contracts through the Power of Artificial Intelligence." Computers 12, no. 5 (May 18, 2023): 107. http://dx.doi.org/10.3390/computers12050107.
Full textSeetharam kakaraparthi, Durganjaneyulu immadisetty, and Maranco M. "Enhanced honeypot security for intrusion detection and prevention systems using blockchain." World Journal of Advanced Research and Reviews 22, no. 1 (April 30, 2024): 751–58. http://dx.doi.org/10.30574/wjarr.2024.22.1.1065.
Full textBayani, Samir Vinayak, Sanjeev Prakash, and Lavanya Shanmugam. "Data Guardianship: Safeguarding Compliance in AI/ML Cloud Ecosystems." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (September 29, 2023): 436–56. http://dx.doi.org/10.60087/jklst.vol2.n3.p456.
Full textYachna, I., O. Kuvshynova, D. Shabanov, Ye Porуnos, and M. Kostashchuk. "BLOCKCHAIN AND ITS APPLICATION IN THE DEFENCE SECTOR." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки 20, no. 3 (October 9, 2024): 139–45. http://dx.doi.org/10.37701/dndivsovt.21.2024.17.
Full textKostopoulos, Nikos, Yannis C. Stamatiou, Constantinos Halkiopoulos, and Hera Antonopoulou. "Blockchain Applications in the Military Domain: A Systematic Review." Technologies 13, no. 1 (January 6, 2025): 23. https://doi.org/10.3390/technologies13010023.
Full textRautio, Samu, Timo Tuomi, and Jan Akmal. "Legal Aspects of Additive Manufacturing in the Military Logistics." Security Dimensions 40, no. 40 (March 31, 2022): 154–95. http://dx.doi.org/10.5604/01.3001.0015.8153.
Full textRomas, Maria. "Procedure for Concluding Civil Law Contracts with the Participation of the State of Ukraine under Martial Law." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi 2, no. 15(27) (June 16, 2023): 187–94. http://dx.doi.org/10.33098/2078-6670.2023.15.27.2.187-194.
Full textChen, Yongle, Xiaojian Wang, Yuli Yang, and Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract." Sensors 20, no. 4 (February 15, 2020): 1062. http://dx.doi.org/10.3390/s20041062.
Full textWyszomirska, Monika. "Tax and Legal Issues Related to the Implementation of Research and Development Projects in the Area of "Security and Defense"." Safety & Fire Technology 58, no. 2 (2021): 22–36. http://dx.doi.org/10.12845/sft.58.2.2021.2.
Full textTerpstra, J. "Particuliere beveiligers als publieke handhavers." Justitiële verkenningen 38, no. 8 (December 2012): 35–50. https://doi.org/10.5553/jv/016758502012038008004.
Full textSoroka, Larysa, Anna Danylenko, Maksym Sokiran, Diana Levchenko, and Oksana Zubko. "Public-private collaboration for national security: challenges and opportunities." Revista Amazonia Investiga 12, no. 70 (October 30, 2023): 43–50. http://dx.doi.org/10.34069/ai/2023.70.10.4.
Full textPapanikolaou, Alexandros, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, and Konstantinos Rantos. "A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection." Electronics 12, no. 6 (March 21, 2023): 1484. http://dx.doi.org/10.3390/electronics12061484.
Full textXu, Ziqiang, Ahmad Salehi Shahraki, and Carsten Rudolph. "Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids." Smart Cities 6, no. 5 (October 23, 2023): 3005–31. http://dx.doi.org/10.3390/smartcities6050135.
Full textGhosh, Samadrita. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 10, 2024): 303–22. http://dx.doi.org/10.60087/jaigs.v3i1.122.
Full textRana, Sohel. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 10, 2024): 161–78. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p178.
Full textAdegbite, Olusola Babatunde. "War Profiteering and Armed Conflicts: Examining Applicable Aspects of International Law." Groningen Journal of International Law 10, no. 1 (May 3, 2023): 21–42. http://dx.doi.org/10.21827/grojil.10.1.21-42.
Full textYasa, Abdul Rahman. "From Security Sector Reform to Endemic Corruption: The Case of Afghanistan." Journal of Strategic Security 13, no. 3 (October 2020): 99–119. http://dx.doi.org/10.5038/1944-0472.13.3.1755.
Full textPinheiro, Alexandre, Edna Dias Canedo, Robson de Oliveira Albuquerque, and Rafael Timóteo de Sousa Júnior. "Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts." Sensors 21, no. 13 (June 29, 2021): 4440. http://dx.doi.org/10.3390/s21134440.
Full textSilva, Mário Herbert Souza da, and Prof Me Dênis Márcio Jesus Oliveira. "Responsabilidade Civil por vício oculto na venda de veículos usados." RCMOS - Revista Científica Multidisciplinar O Saber 3, no. 1 (January 22, 2024): 1–8. http://dx.doi.org/10.51473/ed.al.v3i1.516.
Full textWitanto, Elizabeth Nathania, Yustus Eko Oktian, and Sang-Gon Lee. "Toward Data Integrity Architecture for Cloud-Based AI Systems." Symmetry 14, no. 2 (January 29, 2022): 273. http://dx.doi.org/10.3390/sym14020273.
Full textvan Meegdenburg, Hilde. "‘We don’t do that’: A constructivist perspective on the use and non-use of private military contractors by Denmark." Cooperation and Conflict 54, no. 1 (April 10, 2018): 25–43. http://dx.doi.org/10.1177/0010836718765901.
Full textADEYINKA, Tajudeen Yusuf, Musediq Olufemi LAWAL, Olawale Olufemi AKINRINDE, and Remi Kasali ALATIS. "Nigeria’s Development Trajectory, Security Conundrum and the State-Citizens Relations." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (April 8, 2024): 194–211. http://dx.doi.org/10.53477/2284-9378-24-13.
Full textGACEK, Józef, Bronisław MARCINIAK, and Ryszard WOŹNIAK. "Major Conditions of Shooting Range Operation in Poland." Problems of Mechatronics Armament Aviation Safety Engineering 9, no. 3 (September 30, 2018): 89–104. http://dx.doi.org/10.5604/01.3001.0012.2741.
Full textHum, Derek. "Tenure, Faculty Contracts and Bargaining Conflict." Canadian Journal of Higher Education 28, no. 3 (May 3, 2017): 47–70. http://dx.doi.org/10.47678/cjhe.v28i3.183320.
Full textVladu, Mircea, and Stelian Popescu. "Considerations on the Impact of Emerging and Disruptive Technologies on Security Policies." Scientific Bulletin 26, no. 2 (December 1, 2021): 211–16. http://dx.doi.org/10.2478/bsaft-2021-0026.
Full textKobroń-Gąsiorowska, Łucja. "The employee and their social security in flexible forms of employment on the example of Poland – selected issues. Part I." Kwartalnik Prawa Międzynarodowego IV, no. IV (March 30, 2024): 187–206. http://dx.doi.org/10.5604/01.3001.0054.4285.
Full textPolychronaki, Maria, Dimitrios G. Kogias, Helen C. Leligkou, and Panagiotis A. Karkazis. "Blockchain Technology for Access and Authorization Management in the Internet of Things." Electronics 12, no. 22 (November 10, 2023): 4606. http://dx.doi.org/10.3390/electronics12224606.
Full textFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Full textSlepak, Vitaly Yu. "Legal Regulation of Financing of Scientific Studies by Means of Awarding State Contracts in the Area of Security and Defense." Jurist 8 (July 29, 2020): 2–9. http://dx.doi.org/10.18572/1812-3929-2020-8-2-9.
Full textTiverios, Nicholas. "A Uniform Hermeneutic Thesis." University of Queensland Law Journal 40, no. 2 (June 29, 2021): 181–214. http://dx.doi.org/10.38127/uqlj.v40i2.5483.
Full textZhang, Ying. "Increasing Cyber Defense in the Music Education Sector Using Blockchain Zero-Knowledge Proof Identification." Computational Intelligence and Neuroscience 2022 (June 28, 2022): 1–7. http://dx.doi.org/10.1155/2022/9922167.
Full textManin, Iaroslav. "Defense of the Fatherland: Conscription for Military Service on Mobilization." Полицейская и следственная деятельность, no. 3 (March 2022): 42–63. http://dx.doi.org/10.25136/2409-7810.2022.3.38878.
Full textMa, Xingbang, Dongsheng Yu, Yanhui Du, Lanting Li, Wenkai Ni, and Haibin Lv. "A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence." Electronics 12, no. 11 (May 29, 2023): 2454. http://dx.doi.org/10.3390/electronics12112454.
Full textVarney, Eliza. "Redefining contractual capacity? the UN Convention on the Rights of Persons with Disabilities and the incapacity defence in English contract law." Legal Studies 37, no. 3 (September 2017): 493–519. http://dx.doi.org/10.1111/lest.12166.
Full text