Journal articles on the topic 'Security complex'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security complex.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dhume, Sadanand. "Singapore's Security Complex." Foreign Policy, no. 127 (November 2001): 86. http://dx.doi.org/10.2307/3183303.
Full textDudykevyc, Valeriy, Galyna Mykytyn, Taras Kret, and Andrii Rebets. "Security of Cyber-Physical Systems from Concept to Complex Information Security System." Advances in Cyber-Physical Systems 1, no. 2 (February 23, 2016): 67–75. http://dx.doi.org/10.23939/acps2016.02.067.
Full textBoyle, Philip, and Kevin D. Haggerty. "Spectacular Security: Mega-Events and the Security Complex." International Political Sociology 3, no. 3 (September 2009): 257–74. http://dx.doi.org/10.1111/j.1749-5687.2009.00075.x.
Full textCollinson, Helen. "Security: the complex crypto relationship." Computers & Security 14, no. 4 (January 1995): 299. http://dx.doi.org/10.1016/0167-4048(95)90039-x.
Full textBuzan, Barry. "The Southeast Asian Security Complex." Contemporary Southeast Asia 10, no. 1 (June 1988): 1–16. http://dx.doi.org/10.1355/cs10-1a.
Full textLai, Ying-Cheng, Adilson Motter, Takashi Nishikawa, Kwangho Park, and Liang Zhao. "Complex networks: Dynamics and security." Pramana 64, no. 4 (April 2005): 483–502. http://dx.doi.org/10.1007/bf02706197.
Full textVolevodz, A. G. "Legal security in fuel and energy complex: statement of problem." SOCAR Proceedings, no. 3 (September 30, 2019): 97–112. http://dx.doi.org/10.5510/ogp20190300403.
Full textKilroy, Richard, Abelardo Rodriguez, and Todd Hataley. "Security Inequalities in North America: Reassessing Regional Security Complex Theory." Journal of Strategic Security 10, no. 4 (December 2017): 1–28. http://dx.doi.org/10.5038/1944-0472.10.4.1613.
Full textM. Xheladini, Fatmir. "Regional Security Complex: The Macedonian Context." European Journal of Multidisciplinary Studies 3, no. 1 (December 1, 2016): 34. http://dx.doi.org/10.26417/ejms.v3i1.p34-37.
Full textAghazada, M. M., P. M. Pavlova, and G. A. Nikolova. "Great Mediterranean as a Security Complex." Herald of Omsk University. Series Historical studies 8, no. 3 (2021): 117–22. http://dx.doi.org/10.24147/2312-1300.2021.8(3).117-122.
Full textGonçalves, Duarte. "Understanding Actors in Complex Security Problems." International Journal of Strategic Decision Sciences 9, no. 2 (April 2018): 1–18. http://dx.doi.org/10.4018/ijsds.2018040101.
Full textMeyer, Helen. "Cracking the complex world of security." Computers & Security 15, no. 3 (January 1996): 224. http://dx.doi.org/10.1016/s0167-4048(96)90307-7.
Full textNunes-Vaz, Rick, and Steven Lord. "Designing physical security for complex infrastructures." International Journal of Critical Infrastructure Protection 7, no. 3 (September 2014): 178–92. http://dx.doi.org/10.1016/j.ijcip.2014.06.003.
Full textLee, Geun. "Environmental Security in East Asia: The Regional Environmental Security Complex Approach." Asian Perspective 26, no. 2 (2002): 77–99. http://dx.doi.org/10.1353/apr.2002.0024.
Full textHuebert, Robert. "Health security, environmental security, and hard security in the Arctic." Journal of Intelligence, Conflict, and Warfare 5, no. 1 (May 31, 2022): 90–95. http://dx.doi.org/10.21810/jicw.v5i1.4267.
Full textUriadnikova, Inga, and Vasyl Zaplatynskyi. "MANAGEMENT OF COMPLEX SOCIAL HUMAN SECURITY SYSTEMS." JOURNAL of Donetsk mining institute, no. 1 (2021): 135–42. http://dx.doi.org/10.31474/1999-981x-2021-1-135-142.
Full textDunn Cavelty, Myriam, and Andreas Wenger. "Cyber security meets security politics: Complex technology, fragmented politics, and networked science." Contemporary Security Policy 41, no. 1 (October 14, 2019): 5–32. http://dx.doi.org/10.1080/13523260.2019.1678855.
Full textVarga, Márton. "The Security Complex of the European Union." Hadtudomány 32, no. 1 (July 14, 2022): 104–14. http://dx.doi.org/10.17047/hadtud.2022.32.e.104.
Full textGEORGESCU, Valentin. "Security of 5G Networks – A Complex Issue –." Romanian Military Thinking 2022, no. 1 (February 2022): 140–53. http://dx.doi.org/10.55535/rmt.2022.1.08.
Full textTrusova, N., S. Kalchenko, and M. Tereshchenko. "PLATFORM OF COMPLEX ENSURING OF ECONOMIC SECURITY." Scientific papers OF DMYTRO MOTORNYI TAVRIA STATE AGROTECHNOLOGICAL UNIVERSITY (ECONOMIC SCIENCES) 42 (2020): 58–64. http://dx.doi.org/10.31388/2519-884x-2020-42-58-64.
Full textPapp, V. V., and N. V. Boshota. "Economic Security of the Region’s Transport Complex." Business Inform 8, no. 511 (2020): 69–75. http://dx.doi.org/10.32983/2222-4459-2020-8-69-75.
Full textMongush, Amyrtaa K., and Igor N. Karmanov. "AUTOMATION OF COMPLEX INFORMATION SECURITY SYSTEMS DESIGN." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 31–35. http://dx.doi.org/10.33764/2618-981x-2020-6-2-31-35.
Full textMuller, Marie. "South African diplomacy and security complex theory." Round Table 88, no. 352 (October 1999): 585–620. http://dx.doi.org/10.1080/750459617.
Full textBerghel, Hal. "Leadership Failures in the National Security Complex." Computer 47, no. 6 (June 2014): 64–67. http://dx.doi.org/10.1109/mc.2014.152.
Full textPounder, Chris. "Plain speaking on a complex security problem." Computer Fraud & Security 2002, no. 5 (May 2002): 6. http://dx.doi.org/10.1016/s1361-3723(02)00510-9.
Full textHighland, Harold Joseph. "Partitioning the Security Analysis of Complex Systems." Computers & Security 14, no. 1 (January 1995): 30. http://dx.doi.org/10.1016/0167-4048(95)97004-t.
Full textDub, Bohdana. "COMPLEX ASSESSMENT OF UKRAINIAN AGROHOLDINGS’ ECONOMIC SECURITY." CHERKASY UNIVERSITY BULLETIN: ECONOMICS SCIENCES, no. 1 (2019): 102–13. http://dx.doi.org/10.31651/2076-5843-2019-1-102-113.
Full textLisetskyi, Yuriy M. "Complex Security of the Corporate Information Systems." Upravlâûŝie sistemy i mašiny, no. 1 (279) (June 2019): 68–75. http://dx.doi.org/10.15407/usim.2019.01.068.
Full textWright, Joanne. "Northern Ireland ‐ a British isles security complex." Terrorism and Political Violence 5, no. 4 (December 1993): 266–87. http://dx.doi.org/10.1080/09546559308427229.
Full textGiray Gunaydin, Gazi. "Securitization in Modern Politics: Complex Security Institution." Social Sciences 6, no. 3 (2017): 85. http://dx.doi.org/10.11648/j.ss.20170603.13.
Full textStivachtis, Yannis A. "A Mediterranean Region? Regional Security Complex Theory Revisited." Vestnik RUDN. International Relations 21, no. 3 (September 20, 2021): 416–28. http://dx.doi.org/10.22363/2313-0660-2021-21-3-416-428.
Full textKozachenko, Hanna, Svitlana Onychshenko, and Oleksandra Masliy. "Region Building Complex Social and Economic Security Threats." International Journal of Engineering & Technology 7, no. 3.2 (June 20, 2018): 215. http://dx.doi.org/10.14419/ijet.v7i3.2.14405.
Full textSimon, Stephanie, and Marieke de Goede. "Cybersecurity, Bureaucratic Vitalism and European Emergency." Theory, Culture & Society 32, no. 2 (January 14, 2015): 79–106. http://dx.doi.org/10.1177/0263276414560415.
Full textKruglikov, Sergey, Sergey Kasanin, and Yuri Kuleshov. "Methodical Approach to the Complex Description of Information Protection Object." Voprosy kiberbezopasnosti, no. 4(50) (2022): 39–51. http://dx.doi.org/10.21681/2311-3456-2022-4-39-51.
Full textCho, Sung-Kwon. "Bioterrorism and Complex Security in the 21st Century : A Focus on Health Security." Journal of Political Science & Communication 19, no. 2 (June 30, 2016): 1. http://dx.doi.org/10.15617/psc.2016.06.19.2.1.
Full textWaterman, Kerry. "How Small States Work Together for Regional Security in Complex Security Threat Environments." Journal of Intelligence, Conflict, and Warfare 3, no. 3 (October 19, 2021): 194–98. http://dx.doi.org/10.21810/jicw.v3i3.3728.
Full textCORNISH, PAUL, and ANDREW M. DORMAN. "Complex security and strategic latency: the UK Strategic Defence and Security Review 2015." International Affairs 91, no. 2 (March 2015): 351–70. http://dx.doi.org/10.1111/1468-2346.12239.
Full textBoldizsár, Gábor. "Complex Challenges, Complex Responses and the State." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 1 (June 20, 2017): 53–60. http://dx.doi.org/10.1515/kbo-2017-0008.
Full textBabkin, A. V. "POSSIBLE WAYS OF IMPROVING COMPLEX OF TRANSPORT SECURITY OF METRO." Issues of radio electronics, no. 5 (June 8, 2019): 93–97. http://dx.doi.org/10.21778/2218-5453-2019-5-93-97.
Full textDmytro Busariev. "ESSENCE OF ECONOMICAL SAFETY SYSTEM OF FUEL AND ENERGY COMPLEX AS ONE OF THE TYPES OF A COMPLEX SOCIAL-ECONOMICAL SYSTEM." World Science 3, no. 5(45) (May 31, 2019): 4–8. http://dx.doi.org/10.31435/rsglobal_ws/31052019/6518.
Full textAlexandrescu, Mihai. "Central Europe as a regional security (sub)complex in the interwar period." Studia Universitatis Babeș-Bolyai Historia 67, no. 1 (September 30, 2022): 101–14. http://dx.doi.org/10.24193/subbhist.2022.1.05.
Full textBurdina, Anna A., Anna V. Bondarenko, Nataliya V. Moskvicheva, and Narmina O. Melik-Aslanova. "Management of complex economic security of enterprises: empirical test in Russia." Revista Amazonia Investiga 10, no. 46 (October 25, 2021): 303–10. http://dx.doi.org/10.34069/ai/2021.46.10.30.
Full textMalyarenko, O., and Gul'nara Kushebina. "Sustainable development of the agro-industrial complex of Kazakhstan as the basis of the country's food security." Agrarian Bulletin of the 216, no. 01 (January 30, 2022): 86–91. http://dx.doi.org/10.32417/1997-4868-2022-216-01-86-91.
Full textZhang, Chang Lun, and Chao Li. "Information Security Risk Assessment on Complex Information System." Advanced Materials Research 765-767 (September 2013): 1481–85. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1481.
Full textFarid, Faiza. "Necessity of Maritime Security in Gwadar Port Complex." Polaris – Journal of Maritime Research 2, no. 1 (December 20, 2020): 1–22. http://dx.doi.org/10.53963/pjmr.2020.005.2.
Full textAghazada, Mirmehdi Mirkamil ogly. "Greater Mediterranean Regional Security Complex: Myth or Reality?" Vestnik RUDN. International Relations 21, no. 3 (September 20, 2021): 429–40. http://dx.doi.org/10.22363/2313-0660-2021-21-3-429-440.
Full textLomsak, Daniel, and Jay Ligatti. "PoliSeer: A Tool for Managing Complex Security Policies." Journal of Information Processing 19 (2011): 292–306. http://dx.doi.org/10.2197/ipsjjip.19.292.
Full textAnisin, Alexei. "Unravelling the complex nature of security force defection." Global Change, Peace & Security 32, no. 2 (May 3, 2020): 135–55. http://dx.doi.org/10.1080/14781158.2020.1767046.
Full textMastrogiannakis, Diamantis, and Christian Dorville. "Security and sport mega-events: a complex relation." Sport in Society 16, no. 2 (March 2013): 133–39. http://dx.doi.org/10.1080/17430437.2013.776246.
Full textShiler, Alexander, and Elizaveta Stepanova. "Complex security problems of the internet of things." MATEC Web of Conferences 265 (2019): 07014. http://dx.doi.org/10.1051/matecconf/201926507014.
Full text