Journal articles on the topic 'Maintenance of security order and defense of possessions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 journal articles for your research on the topic 'Maintenance of security order and defense of possessions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Чернышева, Г. Н., Г. А. Лавренова, Ю. А. Савич, and Э. Б. Лубянская. "ENSURING ECONOMIC SECURITY IN THE LOGISTICS OF THE STATE DEFENSE ORDER." Organizer of Production, no. 3 (February 9, 2022): 171–84. http://dx.doi.org/10.36622/vstu.2021.47.14.015.
Full textZvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.
Full textIrianto, Dwi Wahyu, Sovian Aritonang, and Ansori Ansori. "PEMELIHARAAN RUDAL AIR TO GROUND DALAM RANGKA MENDUKUNG TUGAS TNI AU." Strategi dan Kampanye Militer (SKM) 9, no. 2 (December 25, 2023): 17–39. http://dx.doi.org/10.33172/skm.v9i2.14562.
Full textKorniyenko, Dmytro, and Yuriy Pavlyutin. "The essence of the mechanism of administrative and legal support of service and combat activity of security forces (on the example of the National Guard of Ukraine)." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 4, no. 4 (December 29, 2020): 35–41. http://dx.doi.org/10.31733/2078-3566-2020-4-35-41.
Full textSantoso, Dewi, and Fadhillah Nafisah. "Indonesia’s Global Maritime Axis Doctrine: Security Concerns and Recommendations." Jurnal Hubungan Internasional 10, no. 2 (January 9, 2018): 191. http://dx.doi.org/10.20473/jhi.v10i2.7306.
Full textMeleshin, K. Yu, and A. Ye Shabalina. "From the Concept of National Security to the Concept of Civilizational Security as the Basis of Eurasian Integration." EURASIAN INTEGRATION: economics, law, politics 17, no. 2 (July 6, 2023): 143–52. http://dx.doi.org/10.22394/2073-2929-2023-02-143-152.
Full textTolstonosov, Yu, D. Tolstonosov, and S. Kravchenko. "PROBLEM ISSUES OF THE ORGANIZATION OF INTERACTION BETWEEN THE NATIONAL GUARD OF UKRAINE AND SUBJECTS OF THE DEFENSE FORCES OF UKRAINE DURING THE PERFORMANCE OF STATE SECURITY TASKS UNDER THE CONDITIONS OF THE STATE OF MARTIAL." STATE SECURITY 1, no. 1 (2023): 75–79. http://dx.doi.org/10.33405/2786-8613/2023/1/1/288277.
Full textBespalko, I. A., L. D. Hrekov, D. V. Pekariev, and D. L. Fedorchuk. "The concept of information system for providing monitoring of space in order to increase military security." Kosmìčna nauka ì tehnologìâ 28, no. 4 (August 9, 2022): 03–17. http://dx.doi.org/10.15407/knit2022.04.003.
Full textKim, Sang Jin. "The Role of Private Security for a Quarantine and Social Safety Net after the COVID-19 Pandemic: Consensus Control and Reorganization of Safe Society." Forum of Public Safety and Culture 20 (January 30, 2023): 139–58. http://dx.doi.org/10.52902/kjsc.2023.20.139.
Full textMamlyuk, Boris N. "Uniting for “Peace” in the Second Cold War: A Response to Larry Johnson." AJIL Unbound 108 (2014): 129–34. http://dx.doi.org/10.1017/s2398772300002014.
Full textSulistiyanto, Siswo Pujiatmoko, Much Mualim, and Nugroho Adi Sasongko. "PT PAL Empowerment Strategy as a Lead Integrator at ALPALHANKAM KCR 60 to Support State Defense at Sea." IOP Conference Series: Earth and Environmental Science 972, no. 1 (January 1, 2022): 012059. http://dx.doi.org/10.1088/1755-1315/972/1/012059.
Full textObadeyi, Juliana A., and Felicia S. Adeyemo. "Excellent Customer Services and Tax Revenue Generation: A Theoretical and Conceptual Review." Advances in Multidisciplinary and scientific Research Journal Publication 9, no. 3 (September 30, 2023): 9–20. http://dx.doi.org/10.22624/aims/sij/v9n3p2.
Full textChitak, V. V., and Yu I. Usmanov. "International and national legal analysis of the state of information security of Ukraine in conditions of armed conflict." Uzhhorod National University Herald. Series: Law 2, no. 76 (June 14, 2023): 271–77. http://dx.doi.org/10.24144/2307-3322.2022.76.2.43.
Full textPan, Jeng-Shyang, Fang Fan, Shu-Chuan Chu, Hui-Qi Zhao, and Gao-Yuan Liu. "A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks." Security and Communication Networks 2021 (April 30, 2021): 1–15. http://dx.doi.org/10.1155/2021/5540895.
Full textGumilar, M., and Eka Apriansyah. "Stabilisasi Tanah Lempung Dengan Semen Dan Pasir Laut." JURNAL ILMIAH BERING'S 3, no. 02 (October 10, 2016): 49–55. http://dx.doi.org/10.36050/berings.v3i02.105.
Full textHermann Léopold, HOUESSOU. "THE " REPUBLICAN POLICEMAN" ACCORDING TO THE OTHER IN ABOMEYCALAVI (BENIN)." International Journal of Agriculture, Environment and Bioresearch 07, no. 04 (2022): 01–14. http://dx.doi.org/10.35410/ijaeb.2022.5739.
Full textShevchenko, O. "Environmental and food security as components of ensuring the economic security of Ukraine in a strategic format." Uzhhorod National University Herald. Series: Law, no. 68 (March 24, 2022): 110–17. http://dx.doi.org/10.24144/2307-3322.2021.68.18.
Full textRitu Dewan. "IoT based Efficient and Secure Building Architecture with Constrained Application Protocol (CoAP)." Journal of Electrical Systems 20, no. 7s (May 4, 2024): 1456–67. http://dx.doi.org/10.52783/jes.3717.
Full textAntoshkin, Vadim, and Lidia Antoshkina. "Conceptual provisions for preserving economic security in the conditions of war and martial law." University Economic Bulletin, no. 55 (December 29, 2022): 77–83. http://dx.doi.org/10.31470/2306-546x-2022-55-77-83.
Full textRADIONOV, Yurii. "THE STATE’S FINANCIAL RESOURCES MANAGEMENT UNDER MARTIAL LAW." Economy of Ukraine 2023, no. 1 (January 28, 2023): 20–43. http://dx.doi.org/10.15407/economyukr.2023.01.020.
Full textBarannik, D. "METHOD OF TWO-STAGE IMPLANTATION OF HIDDEN INFORMATION BASED ON STEGANOCOMPRESSION TRANSFORMATIONS." Information and communication technologies, electronic engineering 4, no. 1 (May 12, 2024): 31–38. http://dx.doi.org/10.23939/ictee2024.01.031.
Full textVolkov, I., and О. Batiuk. "CERTAIN ASPECTS OF THE LEGAL REGULATION OF THE PROCESS OF COMPENSATION BY PERSONS OF THE OFFICERS FOR COSTS RELATED TO THEIR KEEPING AT INSTITUTIONS OF HIGHER EDUCATION IN THE CONTEXT OF CONDUCTING CLAIMS." Scientific journal of the National Academy of National Guard "Honor and Law" 2, no. 85 (2023): 58–64. http://dx.doi.org/10.33405/2078-7480/2023/2/85/282542.
Full textChaikovska, Leonida, Liuda Panibratets, Serhii Stepanov, Vladyslava Hriniv, and Volodymyr Kaskiv. "STATE OF BRIDGE FACILITIES OF UKRAINE ON PUBLIC ROADS OF NATIONAL IMPORTANCE IN THE CONTROLLED TERRITORIES IN 2023." Dorogi i mosti 2024, no. 29 (May 17, 2024): 280–92. http://dx.doi.org/10.36100/dorogimosti2024.29.280.
Full textAndrusyshyn, B. I. "Continuity of legal traditions of Ukrainian legislation (Constitutional projects by George Andruzsky)." TRANSFORMATION LEGISLATION OF UKRAINE IN MODERN CONDITIONS DOCTRINAL APPROACHES AND MEASUREMENTS, no. 14 (September 1, 2023): 100–107. http://dx.doi.org/10.33663/2524-017x-2023-14-100-107.
Full textTeng, Zhijun, Sian Zhu, Mingzhe Li, Libo Yu, Jinliang Gu, and Liwen Guo. "Wireless sensor network security defense strategy based on Bayesian reputation evaluation model." IET Communications, December 14, 2023. http://dx.doi.org/10.1049/cmu2.12700.
Full textMasliy, Oleksandra, and Alona Buriak. "TRANSFORMATION OF THREATS FOR THE ECONOMIC SECURITY AND SECURITY OF THE INFORMATION ENVIRONMENT OF UKRAINE IN THE CONDITIONS OF A FULL-SCALE WAR." State and Regions. Series: Economics and Business, no. 3(129) (2023). http://dx.doi.org/10.32782/1814-1161/2023-3-5.
Full text