Academic literature on the topic 'Security complex'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security complex.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security complex"
Dhume, Sadanand. "Singapore's Security Complex." Foreign Policy, no. 127 (November 2001): 86. http://dx.doi.org/10.2307/3183303.
Full textDudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.
Full textBoyle, Philip, and Kevin D. Haggerty. "Spectacular Security: Mega-Events and the Security Complex." International Political Sociology 3, no. 3 (September 2009): 257–74. http://dx.doi.org/10.1111/j.1749-5687.2009.00075.x.
Full textCollinson, Helen. "Security: the complex crypto relationship." Computers & Security 14, no. 4 (January 1995): 299. http://dx.doi.org/10.1016/0167-4048(95)90039-x.
Full textBuzan, Barry. "The Southeast Asian Security Complex." Contemporary Southeast Asia 10, no. 1 (June 1988): 1–16. http://dx.doi.org/10.1355/cs10-1a.
Full textLai, Ying-Cheng, Adilson Motter, Takashi Nishikawa, Kwangho Park, and Liang Zhao. "Complex networks: Dynamics and security." Pramana 64, no. 4 (April 2005): 483–502. http://dx.doi.org/10.1007/bf02706197.
Full textVolevodz, A. G. "Legal security in fuel and energy complex: statement of problem." SOCAR Proceedings, no. 3 (September 30, 2019): 97–112. http://dx.doi.org/10.5510/ogp20190300403.
Full textKilroy, Richard, Abelardo Rodriguez, and Todd Hataley. "Security Inequalities in North America: Reassessing Regional Security Complex Theory." Journal of Strategic Security 10, no. 4 (December 2017): 1–28. http://dx.doi.org/10.5038/1944-0472.10.4.1613.
Full textM. Xheladini, Fatmir. "Regional Security Complex: The Macedonian Context." European Journal of Multidisciplinary Studies 3, no. 1 (December 1, 2016): 34. http://dx.doi.org/10.26417/ejms.v3i1.p34-37.
Full textAghazada, M. M., P. M. Pavlova, and G. A. Nikolova. "Great Mediterranean as a Security Complex." Herald of Omsk University. Series Historical studies 8, no. 3 (2021): 117–22. http://dx.doi.org/10.24147/2312-1300.2021.8(3).117-122.
Full textDissertations / Theses on the topic "Security complex"
Hamad, Mohammed Hassan Ahmed. "Regional security complex theory and IGAD's regime." Thesis, University of Reading, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422800.
Full textThompson, A. I. "Digital watermarking for multimedia security using complex wavelets." Thesis, Queen's University Belfast, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492336.
Full textMadia, James D. "Homeland security organizations design contingencies in complex environments." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5559.
Full textApproved for public release; distribution is unlimited
Protecting America from terrorism, natural disasters, and other threats has never been more important or as complex an endeavor as it is today. From asymmetrical warfare to economic meltdown, the environments are increasingly unstable, dynamic and complex, yet many U.S. homeland security organizations are designed around a 19th century model created for the Industrial Age. Information Age challenges demand new ideas for organizational design. Traditional mechanistic and hierarchical bureaucracies must be re-examined. This thesis explores case studies that include an intelligence organization fighting bioterrorism and a military unit battling insurgents in asymmetrical warfare. Case study research was selected to examine "how" and "why" questions related to organic organizational design in dynamic and complex environments. Organic designs provide a better fit because they leveraged three critical capabilities for these environments: communication dissemination, sense-making, and timely conversion of information to action. This fit is accomplished through elements, such as decentralized decision authority, emergent leadership, low specialization, low formalization, use of liaisons, and a reliance on performance controls, which in turn, contribute to decentralized allocation of decision rights, unconstrained patterns of interaction, and broad distribution of information. Organizations of the future will benefit from the insights that emerged from this research.
Franke, Benedikt. "Rethinking complex security cooperation with special reference to Africa's emerging peace and security architecture." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612245.
Full textTaylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.
Full textAl-Khalifa, Talal Mohammed. "The Gulf and Southeast Asia : regional security complex and regional security community : a comparative study." Thesis, University of Exeter, 2012. http://hdl.handle.net/10036/3625.
Full textGreen, Andrew Brian. "Is there a Central Asian security complex?, an application of security complex theory and securitization to problems relating to identity in Central Asia." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ52990.pdf.
Full textKiss, Kristina, and P. G. Pererva. "Strategic problems of economic security of Ukraine." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40227.
Full textRaszewski, Slawomir. "European Union energy policy and the Black Sea/Caspian region : between security community and security complex?" Thesis, University of Leeds, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590293.
Full textKhalid, Muhammad Adnan, and Qamar Nazir. "Security Issue of BGP in complex Peering and Transit Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2447.
Full textBorder Gateway Protocol (BGP) is a critical routing protocol of the internet, used to
exchange routing information between autonomous systems (ASes). BGP is highly
vulnerable to many attacks that can cause routing disturbance on the internet. This
paper describes BGP attacks, misconfigurations, causes of misconfigurations, impact
of these attacks and misconfigurations in BGP and counter measures. Also we
analyze new security architectures for BGP, comparison of these security protocols
and their deployment issues. At the end we propose new security solution that is
Defensive Routing Policy (DRP) to prevent BGP from malicious attacks and
misconfigurations. DRP is operationally deployable and very effective to solve BGP
problems.
Books on the topic "Security complex"
Ero, Comfort. Sierra Leone's security complex. London: Conflict, Security & Development Group at the Centre for Defence Studies, King's College, University of London, 2000.
Find full textNATO Advanced Research Workshop on Complex Societal Dynamics: Security Challenges and Opportunities (2009 Zagreb, Croatia). Complex societal dynamics: Security challenges and opportunities. Amsterdam: IOS Press, 2010.
Find full textUnited States. Department of Energy. Office of Inspections and Special Inquiries. Incident of security concern at the Y-12 National Security Complex. Washington, D.C.]: U.S. Dept. of Energy, Office of Inspector General, Office of Inspections and Special Inquiries, 2008.
Find full textFoundation, Observer Research, ed. Security in a complex era: Emerging challenges facing India. New Delhi: Observer Research Foundation, 2010.
Find full textKostecki, Wojciech. Europe after the Cold War: The security complex theory. Warsaw: Instytut Studiów Politycznych PAN, 1996.
Find full textDrohan, Thomas Alan. A new strategy for complex warfare: Combined effects in East Asia. New York: Cambria Press, 2016.
Find full textVenter, Hein, Mariki Eloff, Les Labuschagne, Jan Eloff, and Rossouw von Solms, eds. New Approaches for Security, Privacy and Trust in Complex Environments. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-72367-9.
Full textRietjens, S. J. H. Civil-military cooperation in response to a complex emergency: Just another drill? Leiden: Brill, 2008.
Find full textHayes, Bradd C. Doing windows: Non-traditional military responses to complex emergencies. [Washington, D.C.]: National Defense University, 1998.
Find full textThe dual state: Parapolitics, Carl Schmitt and the national security complex. Burlington, VT: Ashgate, 2013.
Find full textBook chapters on the topic "Security complex"
Bosworth, Eric, and Adrian Gheorghe. "Energy Security: A Problem of Complex Systems and Complex Situations." In Energy Security, 235–46. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0719-1_12.
Full textLekunze, Manu. "Societal security." In Complex Adaptive Systems, Resilience and Security in Cameroon, 48–71. New York, NY : Routledge, 2019. | Series: Routledge contemporary Africa series: Routledge, 2019. http://dx.doi.org/10.4324/9780429273445-4.
Full textBattersby, Paul. "Converging in the Shadows: Complex Crime, Complex Security." In The Unlawful Society, 51–84. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137282965_3.
Full textHydrick, Ashley, and Elizabeth Dunn. "Food Security and Complex Disasters." In Handbook of Security Science, 1–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-51761-2_26-1.
Full textHydrick, Ashley, and Elizabeth Dunn. "Food Security and Complex Disasters." In Handbook of Security Science, 599–617. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_26.
Full textYasmin, Lailufar. "Complex Interdependence and Security Architecture." In Regional Security in South Asia and the Gulf, 82–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003283058-5.
Full textTrufanov, Andrey, Nikolay Kinash, Alexei Tikhomirov, Olga Berestneva, and Alessandra Rossodivita. "Optimal Information Security Investment in Modern Social Networking." In Complex Networks VIII, 175–82. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54241-6_15.
Full textMoffat, James, Michael Bathe, and Lorna Frewer. "The Hybrid War Model: A Complex Adaptive Model of Complex Urban Conflict." In OR, Defence and Security, 77–100. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137454072_4.
Full textLekunze, Manu. "Modern state security." In Complex Adaptive Systems, Resilience and Security in Cameroon, 72–90. New York, NY : Routledge, 2019. | Series: Routledge contemporary Africa series: Routledge, 2019. http://dx.doi.org/10.4324/9780429273445-5.
Full textTashi, Igli, and Solange Ghernaouti-Hélie. "A Security Assurance Model to Holistically Assess the Information Security Posture." In Complex Intelligent Systems and Their Applications, 83–108. New York, NY: Springer New York, 2010. http://dx.doi.org/10.1007/978-1-4419-1636-5_5.
Full textConference papers on the topic "Security complex"
Iskhakov, S. Yu, A. A. Shelupanov, and R. V. Mescheryakov. "Assessment of security systems complex networks security." In 2014 Dynamics of Systems, Mechanisms and Machines (Dynamics). IEEE, 2014. http://dx.doi.org/10.1109/dynamics.2014.7005656.
Full textBlacknell, David. "Resolution in complex SAR images." In Defense and Security, edited by Edmund G. Zelnio and Frederick D. Garber. SPIE, 2004. http://dx.doi.org/10.1117/12.542160.
Full textWu, Lifang, and XiuKun Yang. "Face recognition in complex backgrounds." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.543638.
Full textDoerry, A. W. "Representing SAR complex image pixels." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2016. http://dx.doi.org/10.1117/12.2214516.
Full textCapodieci, Andrew, Jimmy S. Gill, and Mark D. Ollis. "Wheel placement reasoning in complex terrain." In SPIE Defense + Security, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Hoa G. Nguyen. SPIE, 2017. http://dx.doi.org/10.1117/12.2266990.
Full textLauzon, Marc, Camille-Alain Rabbath, and Eric Gagnon. "UAV autonomy for complex environments." In Defense and Security Symposium, edited by Grant R. Gerhart, Charles M. Shoemaker, and Douglas W. Gage. SPIE, 2006. http://dx.doi.org/10.1117/12.669552.
Full textGregorio- de Souza, Ian, Vincent H. Berk, Annarita Giani, George Bakos, Marion Bates, George Cybenko, and Doug Madory. "Detection of complex cyber attacks." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.670131.
Full textNaqvi, Syed, and Michel Riguidel. "Security assurances for intelligent complex systems." In Defense and Security Symposium, edited by Kevin L. Priddy and Emre Ertin. SPIE, 2007. http://dx.doi.org/10.1117/12.719441.
Full textSedinic, Ivan, and Tamara Perusic. "Security Risk Management in complex organization." In 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2015. http://dx.doi.org/10.1109/mipro.2015.7160481.
Full textCrespi, Valentino, Yong Sheng, and George Cybenko. "Trackability in complex situations and environments." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.670132.
Full textReports on the topic "Security complex"
Lai, Ying-Cheng. Security of Complex Networks. Fort Belvoir, VA: Defense Technical Information Center, February 2010. http://dx.doi.org/10.21236/ada567229.
Full textVorobeychik, Yevgeniy. Strategic analysis of complex security scenarios. Office of Scientific and Technical Information (OSTI), September 2012. http://dx.doi.org/10.2172/1051713.
Full textByrne, Raymond Harry, James Brian Rigdon, Brandon Robinson Rohrer, Glenn A. Laguna, Rush D. III Robinett, ), Kenneth Neal Groom, David Gerald Wilson, Robert J. Bickerstaff, and John J. Harrington. Design tools for complex dynamic security systems. Office of Scientific and Technical Information (OSTI), January 2007. http://dx.doi.org/10.2172/902217.
Full textElam, Shana, P. Bassett, and Kate McMordie Stoughton. Y-12 National Security Complex Water Assessment. Office of Scientific and Technical Information (OSTI), November 2010. http://dx.doi.org/10.2172/1034594.
Full textFox, Lora, and Laura Powledge. Statement of Work Y-12 National Security Complex Security Infrastructure Revitalization Program Project ? Combination Inspector. Office of Scientific and Technical Information (OSTI), July 2021. http://dx.doi.org/10.2172/1817288.
Full textHoward, Russell D. Educating Special Forces Junior Leaders for a Complex Security Environment. Fort Belvoir, VA: Defense Technical Information Center, July 2009. http://dx.doi.org/10.21236/ada514491.
Full textCastle, James M., Alfred C. Faber, Schneegas Jr., and D. A. Anarchy in the Streets: Restoring Public Security in Complex Contingencies. Fort Belvoir, VA: Defense Technical Information Center, May 1998. http://dx.doi.org/10.21236/ada353556.
Full textLandwehr, Carl E., and H. O. Lubbes. Determining Security Requirements for Complex Systems with the Orange Book. Fort Belvoir, VA: Defense Technical Information Center, January 1985. http://dx.doi.org/10.21236/ada465540.
Full textBeck, G. S. Annual Storm Water Report for the Y-12 National Security Complex. Office of Scientific and Technical Information (OSTI), January 2007. http://dx.doi.org/10.2172/921626.
Full textBrown, Nathanael J. K., Katherine A. Jones, Alisa Bandlow, Linda Karen Nozick, Lucas Waddell, Drew Levin, and Jonathan Whetzel. A Complex Systems Approach to More Resilient Multi-Layered Security Systems. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1431482.
Full text