Academic literature on the topic 'Improving Defence and Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Improving Defence and Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Improving Defence and Security"

1

Saragih, Herlina JR, Rayanda Barnas, and Purwanto Purwanto. "Defense Management concepts improving Indonesian Maritime Security." Jurnal Pertahanan 2, no. 3 (September 29, 2016): 257. http://dx.doi.org/10.33172/jp.v2i3.104.

Full text
Abstract:
This study aimed to analyze the concept of Indonesian Defence Management in the 21st century in the context of Indonesian Maritime Security and to determine the readiness of defence management capabilities in facing threats. Research method used is descriptive qualitative with data collection methods through in-depth interview and documentation. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management such as the management and alutsista availability owned Indonesia
APA, Harvard, Vancouver, ISO, and other styles
2

Dorosh, Lesia, and Vasyl Romanyk. "PESCO, CARD, EDF: Strategy, Analysis, and Financing in the European Union Security Guaratee." Humanitarian vision 6, no. 2 (November 25, 2020): 1–7. http://dx.doi.org/10.23939/shv2020.02.001.

Full text
Abstract:
In the article the authors analyze the institutional basis for strengthening the EU security and the implementation of specific projects designed to expand cooperation between the Member States in the defence and security sectors. The point at issue is about Permanent Structured Cooperation (PESCO); the Coordinated Annual Review on Defence (CARD) and the European Defence Fund (EDF). The relevance of the comprehensive study of PESCO, CARD, EDF, which activities are aimed at ensuring the strategic component of cooperation, the analysis of the defence sector and funding priorities in the security sphere of the Union have been proved. The authors claim that PESCO has become a key strategic initiative of the EU, CARD allows coordinating the development of military capabilities in the Member States; the EDF was created to coordinate, increase investment and improve defence interoperability between EU member states. The challenges faced within the functioning of these initiatives have been analyzed. It is alleged that a key challenge for the CARD is the unwillingness of Member countries to share national defence plans, as well as the available and potential coordination and harmonization of defence planning within NATO’s Defence Planning. The peculiarities of specific projects financed within the European Defense Fund (“Ocean 2020”, “Eurodrone”, “SPIDER”, “EuroSWARM”, “TRAWA”, “ACAMSII”, “Gossra”, “Vestlife”) have been analyzed. There is continued progress in the field of the EU security and defence: numerous defence projects have been initiated under PESCO; there is a synchronization of defence planning through the CARD; the investments in defence are stimulated by financing the defence research projects through the EDF, the improving military mobility is continuing; coordination of the EU-NATO cooperation is improving, etc.
APA, Harvard, Vancouver, ISO, and other styles
3

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 42–68. http://dx.doi.org/10.33731/52021.244518.

Full text
Abstract:
Keywords: defense capability, intellectual property, regulatory support The conceptual issues of the legislation of Ukraine,which determine the state policy in the field of national security and defence, regardingthe settlement of issues related to ensuring the state defence capabilities are considered.The scientific publications on actual questions in this sphere concerningproblems and prospects of increase of defence capability of Ukraine are analysed.The role of intellectual property in all components of Ukraine's defence system hasbeen studied, and it has been noted that unresolved problems in the field of intellectualproperty management pose an increasing threat to Ukraine's national security.The importance of ensuring the protection of intellectual property in the process ofimplementing measures to improve the defence capabilities of the state and the needto improve legislation in this area is defined. Recommendations for improving the regulatory framework for national securityand defence in order to address the problematic issues of intellectual property in thisarea are submitted.State defence capability is the ability of state to defend itself in the event of armedaggression or armed conflict. It consists of material and immaterial elements and is aset of military, economic, social and moral and political potential in the field of defenceand appropriate conditions for its implementation.Resolving the issues of reforming not only the Armed Forces of Ukraine, but firstthe entire state, modernization and rearmament of the Ukrainian army has become avital necessity. Only the solution of this issue will allow to raise the defence capabilityof our state to the proper level for the preservation of independent Ukraine.Ensuring the military security of Ukraine largely depends on equipping the ArmedForces of Ukraine with modern types and models of weapons and military equipment,developed on the basis of intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make claims impossible for anyone in the mass productionof weapons and military equipment for their own needs and for exports, which directlyaffects defence capabilities.And this requires proper protection of intellectual property rights both in theprocess of own production of weapons and military equipment, as well as in militarytechnicalcooperation.
APA, Harvard, Vancouver, ISO, and other styles
4

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 4 (October 25, 2021): 33–53. http://dx.doi.org/10.33731/42021.243120.

Full text
Abstract:
Keywords: defense capability, intellectual property, regulatory support The conceptual issues of the legislation of Ukraine,which determine the state policy in the field of national security and defence, regardingthe settlement of issues related to ensuring the state defence capabilities are considered.The scientific publications on actual questions in this sphere concerningproblems and prospects of increase of defence capability of Ukraine are analysed.The role of intellectual property in all components of Ukraine's defence system hasbeen studied, and it has been noted that unresolved problems in the field of intellectualproperty management pose an increasing threat to Ukraine's national security.The importance of ensuring the protection of intellectual property in the process ofimplementing measures to improve the defence capabilities of the state and the needto improve legislation in this area is defined.Recommendations for improving the regulatory framework for national securityand defence in order to address the problematic issues of intellectual property in thisarea are submitted.State defence capability is the ability of state to defend itself in the event of armedaggression or armed conflict. It consists of material and immaterial elements and is aset of military, economic, social and moral and political potential in the field of defenceand appropriate conditions for its implementation.Resolving the issues of reforming not only the Armed Forces of Ukraine, but firstthe entire state, modernization and rearmament of the Ukrainian army has become avital necessity. Only the solution of this issue will allow to raise the defence capabilityof our state to the proper level for the preservation of independent Ukraine.Ensuring the military security of Ukraine largely depends on equipping the ArmedForces of Ukraine with modern types and models of weapons and military equipment,developed on the basis of intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make claims impossible for anyone in the mass productionof weapons and military equipment for their own needs and for exports, which directlyaffects defence capabilities.And this requires proper protection of intellectual property rights both in theprocess of own production of weapons and military equipment, as well as in militarytechnicalcooperation.
APA, Harvard, Vancouver, ISO, and other styles
5

Fiott, Daniel. "Improving CSDP Planning and Capability Development: Could there be a ‘Frontex Formula’?" European Foreign Affairs Review 18, Issue 1 (February 1, 2013): 47–62. http://dx.doi.org/10.54648/eerr2013003.

Full text
Abstract:
The newly agreed operational rules for Frontex allows the Agency to, among other things, buy or lease its own equipment for missions and/or to do so in co-ownership with the Member States and to request national seconded staff for its operations. The new rules are a major step forward in further developing Frontex's resources. Yet this progress has not been matched, despite the Lisbon treaty's protocol on Permanent Structured Cooperation, and in light of the defence budget cuts being made in many European Union (EU) Member States, when it comes to the Common Security and Defence Policy (CSDP). This article asks why, given that each policy area is ultimately aimed at the defence and security of the EU, are the innovations that have been agreed for Frontex not equally applicable to CSDP? Why have Member States increased cooperation under Frontex without equivalent or similar progress under the CSDP? This article aims to shed light on the differences and similarities of the two policy domains in order to see if a 'Frontex formula' could be applicable to the CSDP
APA, Harvard, Vancouver, ISO, and other styles
6

BROŽIČ, LILIANA. "SECURITY AS AN IMPERATIVE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.00.

Full text
Abstract:
In 2017, the publication Contemporary Military Challenges entered its nineteenth year of existence, which reminds us of an important anniversary coming up in 2018. The first issue was published in September 1999 under the name of Bulletin of the Slovenian Armed Forces. From then until the end of last year, 18 volumes of the publication included 438 articles by 564 authors. There were 289 authors from the Slovenian Armed Forces and 48 authors from the administrative part of the Ministry of Defence; 161 authors were from different institutions and 66 authors from abroad. This year, we will focus on topical issues, which will, hopefully, be of interest to our readers and will motivate you to open discussions, reflect upon and perhaps even write about your views on the emergence of new security as an imperative for the future. This year's second issue titled Veteran organizations – are they even needed will be released in English. Since this topic has never before been discussed in our publication, it is perhaps time that we speak about it and share experiences of different countries. This year’s third issue titled Migrations and security on the Old Continent will also be published in English. It will be dedicated to the unstable Middle East, terrorism in Europe and national experiences with migration. Special focus will be put on the migration flows from autumn 2015 to spring 2016 as well as to the Europe's response to them. The title of the fourth issue will be Security forces of the future. It will focus on the way forward in ensuring safety. Some of the topical issues will certainly include the new old ways of manning the armed forces, achieving capability targets and international operations and missions. This year also marks 20 years since members of the Slovenian Armed Forces have joined an international operation for the first time. It was Operation Alba in Albania. Since then, they have participated in numerous operations and missions throughout the world. The 2017 will undoubtedly also be marked by the findings of the 2016 Strategic Defence Review, and the tasks arising from it. The chapter referring to the strengthening of the defence capability and resilience defines the primary objective of further development of the defence system and defence capacity of the Republic of Slovenia, which arises from the findings of the strategic review. The authors of the document classified them as follows: provision of the country’s defence capabilities, enhancing the resilience of the state and society to security threats, improving the preparedness and sustainability of the Slovenian Armed Forces, and achieving of common goals and commitments in the framework of the EU and NATO. It is our firm belief that the articles in this issue of the Contemporary Military Challenges titled Security as an imperative can contribute to the goals set out in the Strategic Defence Review.
APA, Harvard, Vancouver, ISO, and other styles
7

POPIEL, Henryk, Bogusław ROGOWSKI, and Krzysztof WALCZAK. "POLISH DEFENSE STANDARDS WITHIN THE EUROPEAN RANGE." National Security Studies 5, no. 1 (May 15, 2014): 311–20. http://dx.doi.org/10.37055/sbn/135200.

Full text
Abstract:
The article is an account of activities conducted in the field of standardization related to State defence and security for the development of military standards in the area of water supply for forces in field conditions. This adheres to the level of European defence standardization procesess. Thus, a type of summary has been presented of this not so popular case, when – for the very first time in the history of Polish military standardization – national defence standards have become the standards within the European range. What has been pointed out in this aspect is the importance and the need to promote – in a similar way – the achievements of military standardization in other areas of social and economic life, especially in the field of State defence and security, as well as anywhere where Poland has a potential and considerable achievements on a global scale. Such actions – except for a considerable contribution to improving a positive image of Poland in international relations – may be one of the ways to gain a more effective access to information and markets, education and development.
APA, Harvard, Vancouver, ISO, and other styles
8

NEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.

Full text
Abstract:
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. Software analysis has been successful in tackling many such concerns, albeit on other platforms, such as desktop and server. To fill this gap, he have developed infrastructural tools that permit a wide range of software analyses for the Android smartphone platform. Developing these tools has required surmounting many challenges unique to the smartphone platform: dealing with input non-determinism in sensor-oriented apps, non-standard control ow, low-overhead yet high-fidelity record-and-replay. Our tools can analyze substantial, widely-popular apps running directly on smartphones, and do not require access to the app’s source code. We will first present two tools (automated exploration, record-and-replay) that increase Android app reliability by allowing apps to be explored automatically, and bugs replayed or isolated. Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious apps; app profiling to summarize app behavior; and Moving Target Defense for thwarting attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Zaikivskyi, Oleksandr, and Oleksandr Onistrat. "Regulatory and legal support of intellectual property protection in the defense sphere (in the development of armaments and military equipment; in the implementation of international military- technical cooperation)." Theory and Practice of Intellectual Property, no. 6 (December 27, 2021): 49–67. http://dx.doi.org/10.33731/62021.248981.

Full text
Abstract:
Keywords: defence capability, intellectual property, regulatory and legal support,armament and military equipment, military-technical cooperation The condition of regulatory and legal support of defencecapability of Ukraine and problems concerning protection of intellectual propertyand protection of state interests in this sphere are investigated. The importance ofprotection of intellectual property rights to ensure the enhancement of the state's defencecapabilities is noted.Ensuring Ukraine’s defence capability largely depends on equipping the ArmedForces of Ukraine with modern types and models of armaments and military equipmentdeveloped on the basis of the intellectual property rights.It is the military-technical sphere where the objects of intellectual property rightsbelonging to the sphere of national security and defence are created, and the state isobliged to ensure their protection. This will increase the competitiveness of the domesticdefence industry and make it impossible for anyone in the mass production ofarmaments and military equipment for their own needs and for exports, that directlyaffects defence capabilities.This requires proper protection of intellectual property rights both in the processof own production of weapons and military equipment, and in military-technical cooperation.The legislation of Ukraine on national security and defence determines the need touse scientific and technical achievements and the introduction of new technologies toincrease the state's defence capabilities. However, the issue of intellectual property,which is the basis of these achievements and technologies, is not raised. It is notedonly that the acquisition, security, protection of intellectual property rights to scientificand technical (applied) results are carried out in accordance with the law, and incase of infringement of intellectual property rights is protected in the manner prescribedby administrative, civil and criminal law.Thus, all issues related to the defence and protection of intellectual property rightsmust be resolved within the framework of special legislation on intellectual property.Recommendations for improving the regulatory and legal support of Ukraine's defencecapabilities with a purpose of solution of intellectual property issues in this areaand compliance with national interests and security of the state on intellectual propertyrights in the development of armaments and military equipment, as well as internationalmilitary-technical cooperation were submitted.
APA, Harvard, Vancouver, ISO, and other styles
10

Kosmacz-chorodowska, Anna. "Improving management in favour of defence and security on the basis of e-economy tools." Scientific Papers of Silesian University of Technology. Organization and Management Series 2018, no. 128 (2018): 231–42. http://dx.doi.org/10.29119/1641-3466.2018.128.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Improving Defence and Security"

1

Opasinov, Aleksandar, and Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances." Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.

Full text
Abstract:
As advancement and usage of data communication has increased exponentially on a global scale, with a devastating exposure to attacks and varying security threats to home offices as well as to large enterprises, there is always a need for enhanced network protection. The IT department of the company OneDefence, located in western Sweden, was chosen for the thesis and based on the stated information from the organisation, aims were set on how to improve their network defence capabilities. The aim of this thesis is to list ten countries posing the most serious IT threats, and to limit the attack surface of OneDefence’s IT network as much as possible while still providing the necessary services to users abroad. After researching the countries, a prototype was set up to mimic OneDefence’s topology of interest and test attacks were conducted as detailed in the Methodology chapter. The results of the investigations showed the countries posing most serious cyber threats included China, Russia and North Korea among others which were statistically calculated based on the total number of recognised cyberwarfare attacks. The results obtained from the different DoS attacks in the prototype showed that an IPS should be at the heart of an organisation's network defence for combating these intrusions, as well as potentially other types. With the help of a prototype built based on the organisation's topology, several attacks were somewhat successfully mitigated with the equipment used on hand, with only a low percentage of packets allowed to pass through the security unit. Lastly, to explore further enhancements of defence capabilities of OneDefence, a comparison between different products and devices were performed. This resulted in products from the Fortinet brand such as FortiGate NGFW and UTM capabilities as they are offering several advantages compared to competitors.
Då stora framsteg och användning av datakommunikation har ökat exponentiellt på en global skala, med en förödande exponering av attacker och säkerhetshot mot hemanvändare såväl som stora företag, finns detalltid ett behov av förbättrad nätverksskydd. IT-avdelningen hos företaget OneDefence, valdes för att utföra examensprojektet och baserade sig på organisationens angivna information för att förbättra deras nätverksförsvar. Syftet med denna rapport är att sammanställa en lista på tio länder som utgör de allvarligaste IT-hoten i världen, samt begränsa attackytan för organisationens nätverk så mycket som möjligt medan man behåller alla nödvändiga tjänster till användare utomlands. Efter att ha undersökt länderna, anordnades en prototyp för att efterlikna delar av OneDefences topologi av intresse och testattacker utfördes enligt metodologikapitlet. Resultaten av utredningarna visade att från de länder som utfört de allra allvarliga cyberhoten inkluderade bland annat Kina, Ryssland och Nordkorea, som har beräknats statistiskt baserat på antalet igenkända cyberwarfare attacker. Resultaten från de olika DoS-attackerna visade att en IPS bör vara kärnan i en organisations nätverksförsvar för att kunna bekämpa dessa intrång, samt potentiellt andra typer. Med hjälp av den prototyp som byggdes baserad på organisationens topologi, blockerades flera attacker rätt framgångsrikt, med en låg procentandel av paketen som gick genom säkerhetsenheten. Slutligen utforskades ytterligare förbättringar av försvarsförmågan hos organisationen genom att jämföra olika produkter och enheter. Detta resulterade i produkter från Fortinet-varumärket såsom FortiGate NGFW med UTM förmåga, då de erbjuder flera fördelar jämfört med konkurrenter.
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Xuan. "Improving Electric Grid Security: Defense Planning and Security Constrained ACOPF via Robust Optimization." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1543563463428344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Caudle, Sharon L. "Homeland security and capabilities-based planning : improving national preparedness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCaudle.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.
Thesis Advisor(s): C.J. LaCivita, Kathryn E. Newcomer. Includes bibliographical references (p. 87-94). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Morrell, Christopher Frank. "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/79791.

Full text
Abstract:
The amount of data that is shared on the Internet is growing at an alarming rate. Current estimates state that approximately 2.5 exabytes of data were generated every day in 2012. This rate is only growing as people continue to increase their on-line presence. As the amount of data grows, so too do the number of people who are attempting to gain access to the data. Attackers try many methods to gain access to information, including a number of attacks that occur at the network layer. A network-based moving target defense is a technique that obfuscates the location of a machine on the Internet by arbitrarily changing its IP address periodically. MT6D is one of these techniques that leverages the size of the IPv6 address space to make it statistically impossible for an attacker to find a specific target machine. MT6D was designed with a number of limitations that include manually generated static configurations and support for only peer to peer networks. This work presents extensions to MT6D that provide dynamically generated configurations, a secure and dynamic means of exchanging configurations, and with these new features, an ability to function as a server supporting a large number of clients. This work makes three primary contributions to the field of network-based moving target defense systems. First, it provides a means to exchange arbitrary information in a way that provides network anonymity, authentication, and security. Second, it demonstrates a technique that gives MT6D the capability to exchange configuration information by only sharing public keys. Finally, it introduces a session establishment protocol that clients can use to establish concurrent connections with an MT6D server.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
5

Navas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.

Full text
Abstract:
Les systèmes de l’Internet des Objets (IoT) sont de plus en plus déployés dans le monde réel, mais leur sécurité est en retard par rapport à l’état de l’art des systèmes non IoT. La Défense par Cible Mouvante (MTD) est un paradigme de cyberdéfense qui propose de randomiser les composants des systèmes, dans l’intention de faire échec aux cyberattaquants qui s’appuyaient auparavant sur la nature statique des systèmes. Les attaquants sont désormais limités par le temps. Le MTD a été mis en œuvre avec succès dans les systèmes conventionnels, mais son utilisation pour améliorer la sécurité des IoT fait encore défaut dans la littérature. Au cours de cette thèse, nous avons validé le MTD comme paradigme de cybersécurité adapté aux systèmes IoT. Nous avons identifié et synthétisé les techniques MTD existantes pour l’IoT en utilisant une méthode d’examen systématique de la littérature, et nous avons défini et utilisé quatre nouvelles mesures liées à l’entropie pour mesurer les propriétés qualitatives des techniques MTD. Ensuite, nous avons proposé un framework générique de MTD distribué qui permet l’instanciation de stratégies MTD concrètes adaptées aux contraintes de l’IoT. Enfin, nous avons avons conçu un protocole de synchronisation du temps authentifié, et instancié trois techniques MTD particulières : deux dans les couches supérieures du réseau (portant sur le saut de port et sur des interfaces RESTful d’applications) -et validé l’une d’entre elles dans du matériel réel-, et la troisième dans la couche physique pour obtenir des systèmes IoT résistants aux brouillages par des nœuds internes en utilisant des techniques d’étalement du spectre par séquence directe avec des séquences pseudo aléatoires cryptographiquement fortes
Internet of Things (IoT) systems are increasingly being deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving Target Defense (MTD) is a cyberdefense paradigm that proposes to randomize components of systems, with the intention of thwarting cyberattacks that previously relied in the static nature of systems. Attackers are now constrained by time. MTD has been successfully implemented in conventional systems, but its use to improve IoT security is still lacking in the literature. Over the course of this thesis, we validated MTD as a cybersecurity paradigm suitable for IoT systems. We identified and synthesized existing MTD techniques for IoT using a systematic literature review method,and defined and used four novel entropy related metrics to measure MTD techniques qualitative properties. Secondly, we proposed a generic distributed MTD framework that allows the instantiation of concrete MTD strategies suitable for the constraints of the IoT. Finally, we designed an secure time synchronization protocol, and instantiated three particular MTD techniques: two at the upper network layers (e.g. port-hopping, and application RESTful interfaces) -and validated one of them in real hardware-, and the third one at the physical layer to achieve IoT systems resilient to insider attacks/jamming by using Direct Sequence Spread-Spectrum techniques with cryptographically-strong pseudo-random sequences
APA, Harvard, Vancouver, ISO, and other styles
6

Pohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Young, Christopher J. "The European security and defence identity debate." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ56151.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frey, Stefanie. "Swiss defence and security policy 1945-73." Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.

Full text
Abstract:
L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati. Il lavoro è stato svolto in un contesto aziendale come parte di un tirocinio. Come incipit, ho effettuato un attacco mirato contro l’azienda in questione per valutare la validità dei sistemi di difesa. L’attacco ha avuto successo, dimostrando l’inefficacia di moderni sistemi di difesa. Analizzando i motivi del fallimento nel rilevare l’attacco, sono giunto a formulare una strategia di difesa contro attacchi mirati sotto forma di servizio piuttosto che di prodotto. La mia proposta è un framework concettuale, chiamato WASTE (Warning Automatic System for Targeted Events) il cui scopo è fornire warnings ad un team di analisti a partire da eventi non sospetti, ed un business process che ho nominato HAZARD (Hacking Approach for Zealot Attack Response and Detection), che modella il servizio completo di difesa contro i targeted attack. Infine ho applicato il processo all’interno dell’azienda per mitigare minacce ed attacchi informatici.
APA, Harvard, Vancouver, ISO, and other styles
10

Wing, Ian Politics Australian Defence Force Academy UNSW. "Australian Defence in transition: responding to new security challenges." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Politics, 2002. http://handle.unsw.edu.au/1959.4/38662.

Full text
Abstract:
The conceptual understanding of security and the practicalities of national defence are interdependent. In many countries both are undergoing significant change. This work provides an international context but focuses on Australian defence, arguing that a transition is underway from old security thinking to new, and that this is evidenced by changes in policies and practical activities. The aim of this work is to demonstrate the interdependence between the current reconceptualisation of security and the practicalities of national defence. Old security thinking concerns military power relationships between states, in contrast with new security thinking, which uses a broader conceptual framework. These are described, providing benchmarks for the subsequent analysis. While it is acknowledged that change has occurred in security thinking throughout history, those developments observed since the end of the Cold War and the rise of globalisation signify a fundamental shift. To explore this shift, recent developments in the defence policies and military activities of four relevant nations are examined, providing an international context for the consideration of the primary case study of Australian defence. This case study draws on historical descriptions and empirical data to analyse developments in four spheres - Australian defence policy, current Australian Defence Force activities, recent military developments and contemporary Australian public debate. The weight of evidence supports the thesis of a transition in both security thinking, described as transitional security thinking, and ADF activities. Tensions are observed between the requirements of defending a nation against attack, and contributing to the expanding requirements of the broadened security agenda. Despite these tensions, the expansion in both security thinking and the associated activities of armed forces, is likely to continue. This expansion has important implications for Australia???s defence capabilities which are increasingly required to meet the demands of refocused national security. These demands contribute to the pressing challenges of convergence and overstretch. A strategy of integration is recommended to address these challenges and it follows the principles of whole-of-government security and sustainable partnerships. The application of these principles will require the ADF to emphasise capabilities with versatility and adaptability.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Improving Defence and Security"

1

1944-, Johnson Stuart E., and Larrabee F. Stephen, eds. Persian Gulf security--improving allied military contributions. Santa Monica, CA: Rand, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Global Maritime Information Sharing Symposium (2nd 2009 National Defense University). Streamlining information sharing: Improving efficiency, security, safety and the environment : Global Maritime Information Sharing Symposium 2009, September 15-17, National Defense University; Fort Lesley J. McNair, Washington, D.C. [Washington, DC: Office of Global Maritime Situational Awareness], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Conahan, Frank C. Contract pricing: Improving Defense management and oversight : statement of Frank C. Conahan, Assistant Comptroller General, National Security and International Affairs Division, before the Committee on Governmental Affairs, United States Senate. Washington, D.C: The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Nuclear nonproliferation: Limited progress in improving nuclear material security in Russia and the newly independent states : report to Congressional requesters. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Borg-Neervoort, Marlies ter. Defence technology assessment: Improving defence decision-making. Amsterdam: Nederlandse Organisatie voor Technologisch Aspectenonderzoek, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Improving financial accountability at the Department of Defense: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, of the One Hundred Eleventh Congress, second session, September 29, 2010. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Democrats, Liberal. Defence and security. Dorchester: Liberal Democrat Pubns., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Improving financial and business management at the Department of Defense: Hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, October 16, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Great Britain. Museums and Galleries Commission. Improving museum security. London: Museums & Galleries Commission, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Needle, Jerome A. Improving transit security. Washington, D.C: National Academy Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Improving Defence and Security"

1

Kanturska, Urszula, Jan-Dirk Schmöcker, Achille Fonzone, and Michael G. H. Bell. "Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport." In Game Theoretic Risk Analysis of Security Threats, 199–227. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohaisen, Aziz, and Scott Hollenbeck. "Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs." In Information Security Applications, 65–80. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05149-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cheung, Catherine, Julio J. Valdés, and Jobin Puthuparampil. "Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques." In Recent Advances in Computational Intelligence in Defense and Security, 605–34. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26450-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Nianyu, Mingyue Zhang, Eunsuk Kang, and David Garlan. "Engineering Secure Self-Adaptive Systems with Bayesian Games." In Fundamental Approaches to Software Engineering, 130–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_7.

Full text
Abstract:
AbstractSecurity attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. Game theory approaches have been explored in security to model malicious behaviors and design reliable defense for the system in a mathematically grounded manner. However, modeling the system as a single player, as done in prior works, is insufficient for the system under partial compromise and for the design of fine-grained defensive strategies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To deal with such issues, we propose a new self-adaptive framework incorporating Bayesian game theory and model the defender (i.e., the system) at the granularity ofcomponents. Under security attacks, the architecture model of the system is translated into aBayesian multi-player game, where each component is explicitly modeled as an independent player while security attacks are encoded as variant types for the components. The optimal defensive strategy for the system is dynamically computed by solving the pure equilibrium (i.e., adaptation response) to achieve the best possible system utility, improving the resiliency of the system against security attacks. We illustrate our approach using an example involving load balancing and a case study on inter-domain routing.
APA, Harvard, Vancouver, ISO, and other styles
5

McCormack, John, and Tim Burnett. "Defence acquisition." In Managing Security, 160–76. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003137061-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Leuffen, Dirk, Berthold Rittberger, and Frank Schimmelfennig. "Security and Defence." In Differentiated Integration, 184–220. London: Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-28501-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Doran, Susan. "Security and Defence." In England and Europe in the Sixteenth Century, 42–79. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-26990-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bluth, Christoph. "Defence and Security." In Khrushchev and Khrushchevism, 194–214. London: Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18646-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rice, Condoleezza. "Defence and Security." In The Soviet Union Under Gorbachev, 192–209. London: Palgrave Macmillan UK, 1987. http://dx.doi.org/10.1007/978-1-349-18648-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dönges, Hannah E., and Stephanie C. Hofmann. "Defence As Security." In Routledge Handbook Of Defence Studies, 29–39. Abingdon, Oxon: New York, NY: Routledge, [2018]: Routledge, 2018. http://dx.doi.org/10.4324/9781315650463-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Improving Defence and Security"

1

Barrat, Catherine, and Gildas Chauvel. "Improving cooling of cavity blackbodies." In SPIE Security + Defence, edited by David A. Huckridge and Reinhard Ebert. SPIE, 2013. http://dx.doi.org/10.1117/12.2028874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ottaviani, Carlo, Riccardo Laurenza, Thomas P. W. Cope, Gaetana Spedalieri, Samuel L. Braunstein, and Stefano Pirandola. "Secret key capacity of the thermal-loss channel: improving the lower bound." In SPIE Security + Defence, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2244899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, D., and D. G. Thomson. "Improving rotorcraft survivability to RPG attack using inverse methods." In SPIE Europe Security + Defence, edited by David H. Titterton and Mark A. Richardson. SPIE, 2009. http://dx.doi.org/10.1117/12.832298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Heineman, William R., Carl J. Seliskar, Laura K. Morris, and Samuel A. Bryan. "Spectroelectrochemistry as a strategy for improving selectivity of sensors for security and defense applications." In SPIE Security + Defence, edited by Roberto Zamboni, François Kajzar, and Attila A. Szep. SPIE, 2012. http://dx.doi.org/10.1117/12.965308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Trofimov, Vyacheslav A., and Vladislav V. Trofimov. "Real-time computer processing of image from THz passive imaging device for improving of images." In SPIE Security + Defence, edited by Neil A. Salmon and Eddie L. Jacobs. SPIE, 2012. http://dx.doi.org/10.1117/12.965546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harder, James A., and Michaelene Sprague. "Improving transmission and image contrast in medium and high performance optical systems using weighted average angle of incidence techniques to optimize coatings." In SPIE Europe Security and Defence, edited by Gari Owen. SPIE, 2008. http://dx.doi.org/10.1117/12.797531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Simulation for Education: Improving Personal Responsiveness in Case of Violent Attack." In The 11th International Defence and Homeland Security Simulation Worskhop. CAL-TEK srl, 2021. http://dx.doi.org/10.46354/i3m.2021.dhss.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Whitman, Lucy S., Colin Lewis, and John P. Oakley. "Improving human object recognition performance using video enhancement techniques." In European Symposium on Optics and Photonics for Defence and Security, edited by Tim P. Donaldson and Colin Lewis. SPIE, 2004. http://dx.doi.org/10.1117/12.581827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Filiberti, Daniel P., and Robert A. Schowengerdt. "Improving multisource image fusion using thematic content." In Defense and Security, edited by Zia-ur Rahman, Robert A. Schowengerdt, and Stephen E. Reichenbach. SPIE, 2004. http://dx.doi.org/10.1117/12.541678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lanzagorta, Marco, Jeffrey Uhlmann, Truc Le, Oliverio Jitrik, and Salvador E. Venegas-Andraca. "Improving quantum sensing efficiency with virtual modes." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2016. http://dx.doi.org/10.1117/12.2223981.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Improving Defence and Security"

1

Davies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135010.

Full text
Abstract:
The UK government’s Integrated Review of security, defence, development and foreign policy, published in March 2021 alongside a supporting defence command paper, set a new course for UK national security and highlighted opportunities for an innovative approach to international engagement activity. The Integrated Review focused principally on the state threats posed by China’s increasing power and by competitors – including Russia – armed with nuclear, conventional and hybrid capabilities. It also stressed the continuing risks to global security and resilience due to conflict and instability in weakened and failed states. These threats have the potential to increase poverty and inequality, violent extremism, climate degradation and the forced displacement of people, while presenting authoritarian competitors with opportunities to enhance their geopolitical influence. There are moral, security and economic motives to foster durable peace in conflict-prone and weakened regions through a peacebuilding approach that promotes good governance, addresses the root causes of conflict and prevents violence, while denying opportunities to state competitors. The recent withdrawal from Afghanistan serves to emphasize the complexities and potential pitfalls associated with intervention operations in complex, unstable regions. Success in the future will require the full, sustained and coordinated integration of national, allied and regional levers of power underpinned by a sophisticated understanding of the operating environment. The UK armed forces, with their considerable resources and global network, will contribute to this effort through ‘persistent engagement’. This is a new approach to overseas operations below the threshold of conflict, designed as a pre-emptive complement to warfighting. To achieve this, the UK Ministry of Defence (MOD) must develop a capability that can operate effectively in weak, unstable and complex regions prone to violent conflict and crises, not least in the regions on the eastern and southern flanks of the Euro-Atlantic area. The first step must be the development of a cohort of military personnel with enhanced, tailored levels of knowledge, skills and experience. Engagement roles must be filled by operators with specialist knowledge, skills and experience forged beyond the mainstream discipline of combat and warfighting. Only then will individuals develop a genuinely sophisticated understanding of complex, politically driven and sensitive operating environments and be able to infuse the design and delivery of international activities with practical wisdom and insight. Engagement personnel need to be equipped with: An inherent understanding of the human and political dimensions of conflict, the underlying drivers such as inequality and scarcity, and the exacerbating factors such as climate change and migration; - A grounding in social sciences and conflict modelling in order to understand complex human terrain; - Regional expertise enabled by language skills, cultural intelligence and human networks; - Familiarity with a diverse range of partners, allies and local actors and their approaches; - Expertise in building partner capacity and applying defence capabilities to deliver stability and peace; - A grasp of emerging artificial intelligence technology as a tool to understand human terrain; - Reach and insight developed through ‘knowledge networks’ of external experts in academia, think-tanks and NGOs. Successful change will be dependent on strong and overt advocacy by the MOD’s senior leadership and a revised set of personnel policies and procedures for this cohort’s selection, education, training, career management, incentivization, sustainability and support.
APA, Harvard, Vancouver, ISO, and other styles
2

Wing, Ian. The Australian Defence Force: Broadened Concepts of Security Operations. Fort Belvoir, VA: Defense Technical Information Center, October 1998. http://dx.doi.org/10.21236/ada386066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alt, Josef. The Future of the European Security and Defence Policy. Fort Belvoir, VA: Defense Technical Information Center, April 2006. http://dx.doi.org/10.21236/ada475658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tagarev, Todor. Methodology for Defence Planning in the Context of Security Strategy Planning. Procon, 2007. http://dx.doi.org/10.11610/it4sec.0016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Millar, Katharine, James Shires, and Tatiana Tropina. Gender Approaches to Cybersecurity: Design, Defence and Response. The United Nations Institute for Disarmament Research, January 2021. http://dx.doi.org/10.37559/gen/21/01.

Full text
Abstract:
Gender approaches to cybersecurity explores how gender norms shape specific activities pertaining to cybersecurity design, defence and response. In each of these three pillars, the research identifies distinct dimensions of cyber-related activities that have gendered implications and, thus, need to be considered from a gender perspective. The report proposes recommendations for the incorporation of gender considerations throughout international cybersecurity policy and practice, so as to ensure that cybersecurity improves the security of people of all gender identities and expressions, as well as international peace and security. The ultimate conclusion is that these two levels of security cannot be separated.
APA, Harvard, Vancouver, ISO, and other styles
6

Estevens, João. Migration crisis in the EU: developing a framework for analysis of national security and defence strategies. IPRI-NOVA, May 2018. http://dx.doi.org/10.23906/wp57/2018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Markets, Policies Institutions. Improving tenure security for pastoralists in East Africa. Washington, DC: International Food Policy Research Institute, 2020. http://dx.doi.org/10.2499/p15738coll2.134136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Linquist, Daniel A. Assessing Security Cooperation: Improving Methods to Maximize Effects. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada589336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Duben, Andey Kirillovich. IMPROVING THE INFORMATION SECURITY SYSTEM: COMPARATIVE LEGAL ANALYSIS. DOI СODE, 2022. http://dx.doi.org/10.18411/3673_2022_2_197_203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manzoor, Ahmad. Improving the International Governance of Food Security and Trade. Geneva, Switzerland: International Centre for Trade and Sustainable Development, 2011. http://dx.doi.org/10.7215/ag_ip_20110923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography