Journal articles on the topic 'Improving Defence and Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Improving Defence and Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Saragih, Herlina JR, Rayanda Barnas, and Purwanto Purwanto. "Defense Management concepts improving Indonesian Maritime Security." Jurnal Pertahanan 2, no. 3 (September 29, 2016): 257. http://dx.doi.org/10.33172/jp.v2i3.104.
Full textDorosh, Lesia, and Vasyl Romanyk. "PESCO, CARD, EDF: Strategy, Analysis, and Financing in the European Union Security Guaratee." Humanitarian vision 6, no. 2 (November 25, 2020): 1–7. http://dx.doi.org/10.23939/shv2020.02.001.
Full textZaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 5 (November 17, 2021): 42–68. http://dx.doi.org/10.33731/52021.244518.
Full textZaikivskyi, Oleksandr, and Oleksandr Onistrat. "The role of intellectual property in security defense capacity of the state." Theory and Practice of Intellectual Property, no. 4 (October 25, 2021): 33–53. http://dx.doi.org/10.33731/42021.243120.
Full textFiott, Daniel. "Improving CSDP Planning and Capability Development: Could there be a Frontex Formula?" European Foreign Affairs Review 18, Issue 1 (February 1, 2013): 47–62. http://dx.doi.org/10.54648/eerr2013003.
Full textBROŽIČ, LILIANA. "SECURITY AS AN IMPERATIVE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 11–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.00.
Full textPOPIEL, Henryk, Bogusław ROGOWSKI, and Krzysztof WALCZAK. "POLISH DEFENSE STANDARDS WITHIN THE EUROPEAN RANGE." National Security Studies 5, no. 1 (May 15, 2014): 311–20. http://dx.doi.org/10.37055/sbn/135200.
Full textNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Full textZaikivskyi, Oleksandr, and Oleksandr Onistrat. "Regulatory and legal support of intellectual property protection in the defense sphere (in the development of armaments and military equipment; in the implementation of international military- technical cooperation)." Theory and Practice of Intellectual Property, no. 6 (December 27, 2021): 49–67. http://dx.doi.org/10.33731/62021.248981.
Full textKosmacz-chorodowska, Anna. "Improving management in favour of defence and security on the basis of e-economy tools." Scientific Papers of Silesian University of Technology. Organization and Management Series 2018, no. 128 (2018): 231–42. http://dx.doi.org/10.29119/1641-3466.2018.128.19.
Full textDavis Cross, Mai’a K. "The European Defence Agency and the Member States: Public and Hidden Transcripts." European Foreign Affairs Review 20, Special Issue (July 1, 2015): 83–102. http://dx.doi.org/10.54648/eerr2015026.
Full textBogdanov, Plamen. "Perspectives and development of the Bulgarian military-educational system." Scientific Journal of the Military University of Land Forces 197, no. 3 (September 11, 2020): 489–500. http://dx.doi.org/10.5604/01.3001.0014.3921.
Full textD'Almeida, Irina Bratosin, Rebekka Haffner, and Corinna Hörst. "Women in the CSDP: Strengthening the EU's Effectiveness as an International Player." European View 16, no. 2 (December 2017): 313–24. http://dx.doi.org/10.1007/s12290-017-0467-1.
Full textThomson, Catarina P., and David Blagden. "A Very British National Security State: Formal and informal institutions in the design of UK security policy." British Journal of Politics and International Relations 20, no. 3 (July 6, 2018): 573–93. http://dx.doi.org/10.1177/1369148118784722.
Full textGabrielyan, Hakob. "Gender-Sensitive Approaches in Confidence- and Security-Building Measures." Journal of Political Science: Bulletin of Yerevan University 1, no. 3 (December 29, 2022): 51–59. http://dx.doi.org/10.46991/jops/2022.1.3.051.
Full textBROŽIČ, LILIANA. "VARNOST KOT IMPERATIV." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2017, ISSUE 19/1 (May 15, 2017): 7–9. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.19.1.0.
Full textDumić, Aleksandar, and Mitar Kovač. "The impact of the common security and defence policy of the European Union on the security of the Republic of Serbia." Vojno delo 73, no. 2 (2021): 18–30. http://dx.doi.org/10.5937/vojdelo2102018d.
Full textLipka, Mirosław. "Civilian CSPD Missions as European Union's Response to International Crises: Selected Aspects of Crisis Management." Security Dimensions 36, no. 36 (July 19, 2021): 64–93. http://dx.doi.org/10.5604/01.3001.0015.0487.
Full textLisovenko, D., and G. Belous. "MILITARY FORCES OF THE ARMED FORCES OF UKRAINE AND NATO AS THE BASIS OF SECURITY AND STABILITY IN THE BLACK SEA REGION." Collection of scientific works of Odesa Military Academy 2, no. 14 (January 25, 2021): 51–58. http://dx.doi.org/10.37129/2313-7509.2020.14.2.51-58.
Full textKárász, Balázs, and Imre Négyesi. "Information Security Responsibilities of Critical (Information) Infrastructures in the Aspect of Human Risk Factors." Hadtudományi Szemle 13, no. 3 (2020): 71–86. http://dx.doi.org/10.32563/hsz.2020.3.6.
Full textSokurenko, V. V. "Personnel training for the security and defense sector as a prerequisite for ensuring the national security of Ukraine." Law and Safety 82, no. 3 (September 29, 2021): 209–18. http://dx.doi.org/10.32631/pb.2021.3.24.
Full textOkhrimenko, Ivan M., Nina V. Lyhun, Viktoriia P. Pryimak, Yaroslav I. Korol, and Mykhailo S. Myroshnychenko. "NEGATIVE FACTORS OF MANAGEMENT ACTIVITIES OF THE SECURITY AND DEFENCE SECTOR REPRESENTATIVES AND DIRECTIONS OF THEIR OVERCOMING." Wiadomości Lekarskie 74, no. 4 (2021): 891–95. http://dx.doi.org/10.36740/wlek202104115.
Full textZaikivskyi, Oleksandr, and Oleksandr Onistrat. "State national security policy and intellectual property issues." Theory and Practice of Intellectual Property, no. 3 (September 7, 2021): 19–33. http://dx.doi.org/10.33731/32021.239573.
Full textVatamanyuk-Zelinska, Uliana, Victoria Bednarchuk, and Alina Mlintsova. "Financing the needs of the defence sector in Ukraine." INNOVATIVE ECONOMY, no. 7-8 (November 2020): 22–27. http://dx.doi.org/10.37332/2309-1533.2020.7-8.3.
Full textGupta, Sanjay Mohan, Vandana Pandey, Ankur Agarwal, Basant Ballabh, and Madhu Bala. "Role of DIBER DRDO Technologies in Improving Livelihood Opportunities and Curtailing Migration in Uttarakhand." Defence Life Science Journal 6, no. 2 (June 3, 2021): 187–95. http://dx.doi.org/10.14429/dlsj.6.16229.
Full textChernysheva, Galina N., Nikolay V. Rogov, and Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders." Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, no. 3 (September 30, 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.
Full textZhuravel, Valery. "NORWAY’s ARCTIC STRATEGY AND SECURITY ISSUES." Scientific and Analytical Herald of IE RAS 23, no. 5 (October 31, 2021): 23–30. http://dx.doi.org/10.15211/vestnikieran520212330.
Full textWang, Ping, Maurice Dawson, and Kenneth L. Williams. "Improving Cyber Defense Education through National Standard Alignment." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (January 2018): 12–28. http://dx.doi.org/10.4018/ijhiot.2018010102.
Full textMiraglia, Armando, and Matteo Casenove. "Fight fire with fire: the ultimate active defence." Information & Computer Security 24, no. 3 (July 11, 2016): 288–96. http://dx.doi.org/10.1108/ics-01-2015-0004.
Full textM., Raymond, and Ibyingibo S. "National Defence Expenditure and Its Implications on Economic Development in Nigeria." African Journal of Economics and Sustainable Development 4, no. 1 (May 7, 2021): 17–31. http://dx.doi.org/10.52589/ajesd-4iwkvnsi.
Full textHoury, M. P., and O. Faucon. "Defense plans: Economic solutions for improving the security of power systems." Control Engineering Practice 7, no. 5 (May 1999): 635–40. http://dx.doi.org/10.1016/s0967-0661(98)00179-8.
Full textHoury, M. P., and O. Faucon. "Defense Plans: Economic Solutions for Improving the Security of Power Systems." IFAC Proceedings Volumes 30, no. 17 (August 1997): 621–26. http://dx.doi.org/10.1016/s1474-6670(17)46474-3.
Full textGrover, Atul, Lekha Charan Meher, Ranjit Singh, Abhinav Singh, Sudhanshu Tiwari, Sanjai Kumar Dwivedi, and Madhu Bala. "Biofuels for Defence Use: Past, Present And Future." Defence Life Science Journal 4, no. 1 (December 31, 2018): 3–11. http://dx.doi.org/10.14429/dlsj.4.12366.
Full textShopina, І. "Problems of improving the activities of public administrations in the security and defense sector." Visnyk Taras Shevchenko National University of Kyiv. Military-Special Sciences, no. 2(50) (2022): 104–7. http://dx.doi.org/10.17721/1728-2217.2022.50.104-107.
Full textGajic, Dejan. "Development of armed forces in the European Union." Medjunarodni problemi 55, no. 3-4 (2003): 339–53. http://dx.doi.org/10.2298/medjp0304339g.
Full textBaker, Brenda M. "Improving our Practice of Sentencing." Utilitas 9, no. 1 (March 1997): 99–114. http://dx.doi.org/10.1017/s095382080000515x.
Full textXing, Jingyu, and Zheng Zhang. "Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments." Security and Communication Networks 2022 (March 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/6783223.
Full textRZAYEVA, GULNAZ AYDIN, and AYTAKIN NAZIM IBRAHIMOVA. "Organization of Information Security in E-Goverment as Means of Information Rights Protection." Право України, no. 2020/04 (2020): 225. http://dx.doi.org/10.33498/louu-2020-04-225.
Full textRogatin, S. I. "Directions for improving the economic regulation of the State Defense Order." Administrative Consulting, no. 7 (October 11, 2022): 128–36. http://dx.doi.org/10.22394/1726-1139-2022-7-128-136.
Full textMarkina, Iryna, Valeriya Lenʹ, and Vitaly Shapka. "Cost management as a factor for improving enterprise economic security." Actual problems of innovative economy, no. 3 (May 30, 2019): 83–88. http://dx.doi.org/10.36887/2524-0455-2019-3-12.
Full textWang, Cheng Jiong. "The Study of Access Mechanism for the Security of Linux." Applied Mechanics and Materials 422 (September 2013): 176–80. http://dx.doi.org/10.4028/www.scientific.net/amm.422.176.
Full textSanthosh Kumar, S. V. N., M. Selvi, and A. Kannan. "A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things." Computational Intelligence and Neuroscience 2023 (January 27, 2023): 1–24. http://dx.doi.org/10.1155/2023/8981988.
Full textVergolyas, O. O. "Directions for improving the legal support of special information operations." Uzhhorod National University Herald. Series: Law, no. 65 (October 25, 2021): 215–21. http://dx.doi.org/10.24144/2307-3322.2021.65.39.
Full textStankin, Alexey. "Military security: problems of legal regulation." Legal Science and Practice: Journal of Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia 2022, no. 1 (March 30, 2022): 109–12. http://dx.doi.org/10.36511/2078-5356-2022-1-109-112.
Full textRisal, Semuel, Irawanto Irawanto, Putri Hergianasari, Anita Ade Rahma, and Ika Devy Pramudiana. "Border Development Model on the Human Development Aspects for Sustainable Community." Jurnal Borneo Administrator 18, no. 2 (August 25, 2022): 125–38. http://dx.doi.org/10.24258/jba.v18i2.971.
Full textLiu, Yongli, Weifang Zhai, and Song Ji. "Research on Campus Network Security Problem and Protection Strategy." International Journal of Advanced Pervasive and Ubiquitous Computing 9, no. 3 (July 2017): 15–31. http://dx.doi.org/10.4018/ijapuc.2017070102.
Full textThomas, Jason Earl, and Gordon C. Galligher. "Improving Backup System Evaluations in Information Security Risk Assessments to Combat Ransomware." Computer and Information Science 11, no. 1 (January 2, 2018): 14. http://dx.doi.org/10.5539/cis.v11n1p14.
Full textBabiński, Aleksander, and Janusz Falecki. "Joint Operations of the Polish Armed Forces and the Police." Internal Security 9, no. 1 (December 29, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7464.
Full textUshakova, K. O., and V. G. Isaev. "The influence of the state policy of import substitution on improving the quality of products of the military-industrial complex." Voprosy regionalnoj ekonomiki 40, no. 3 (September 30, 2019): 131–38. http://dx.doi.org/10.21499/2078-4023-2019-40-3-131-138.
Full textRazqi, Afrizal. "AIR DEFENCE IDENTIFICATION ZONE: UPAYA MENJAGA KEDAULATAN WILAYAH UDARA INDONESIA." Media Keadilan: Jurnal Ilmu Hukum 12, no. 1 (April 29, 2021): 76. http://dx.doi.org/10.31764/jmk.v12i1.4265.
Full text