Artículos de revistas sobre el tema "Defence and security contracts"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Defence and security contracts".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Heuninckx, Baudouin. "Defence procurement: The most effective way to grant illegal State Aid and get away with it... or is it?" Common Market Law Review 46, Issue 1 (1 de febrero de 2009): 191–211. http://dx.doi.org/10.54648/cola2009007.
Texto completoZervos, Vasilis. "European Policies and the Space Industry Value Chain (Note 1)". Journal of Economics and Public Finance 4, n.º 1 (28 de febrero de 2018): 101. http://dx.doi.org/10.22158/jepf.v4n1p101.
Texto completoChernysheva, Galina N., Nikolay V. Rogov y Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders". Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, n.º 3 (30 de septiembre de 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.
Texto completoHasnaoui, Inas, Maria Zrikem y Rajaa Elassali. "Block-AD: Blockchain Attack-Defense CTF Competition for Next-Web3 Security". International Journal of Computer Science, Engineering and Information Technology 13, n.º 5 (27 de octubre de 2023): 30–37. http://dx.doi.org/10.5121/ijcseit.2023.13503.
Texto completoSarkawi, Azizi Ahmad, Mohamad Ghozali Hassan y Mustakim Melan. "THE SIGNIFICANCE OF LEADERSHIP SUPPORT TOWARDS EFFECTIVE CONTRACT MANAGEMENT". Journal of Technology and Operations Management 18, n.º 2 (30 de diciembre de 2023): 1–8. http://dx.doi.org/10.32890/jtom2023.18.2.1.
Texto completoNovruzova, Oksana B., Ilya A. Klevtsov y Elizaveta R. Shikova. "Methods and Conditions of Conclusion of State Contracts". Court administrator 1 (8 de febrero de 2024): 12–15. http://dx.doi.org/10.18572/2072-3636-2024-1-12-15.
Texto completoDerrick Lim Kin Yeap, Jason Jong Sheng Tat, Jason Ng Yong Xing, Joan Sia Yuk Ting, Mildred Lim Pei Chin y Muhammad Faisa. "Securing Industrial IoT: Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency". International Journal of Computer Technology and Science 1, n.º 3 (17 de julio de 2024): 01–19. http://dx.doi.org/10.62951/ijcts.v1i3.18.
Texto completoMateaş, Florian. "GENERAL CHARACTERIZATION OF SECURITY SYSTEMS FOR OBJECTIVES, GOODS, VALUABLES AND PROTECTION OF INDIVIDUALS". Agora International Journal of Juridical Sciences 9, n.º 3 (9 de octubre de 2015): 21–28. http://dx.doi.org/10.15837/aijjs.v9i3.2113.
Texto completoAhmad Sarkawi, Azizi, Mohamad Ghozali Hassan y Mustakim Melan. "Navigating Contract Compliance in Maritime Procurement for National Security: A Study on the Ministry of Defense". Compendium by PaperASIA 39, n.º 5(b) (22 de octubre de 2023): 34–39. http://dx.doi.org/10.59953/cpa.v39i5(b).33.
Texto completoKim, Yong Woon y Trevor Brown. "Autonomy versus control in procurement and contracting: the use of cost-reimbursement contracts in three US federal departments". International Review of Administrative Sciences 83, n.º 1_suppl (9 de julio de 2016): 41–58. http://dx.doi.org/10.1177/0020852315619477.
Texto completoIrenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel y Muhammad Faisal. "Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability". International Journal of Computer Technology and Science 1, n.º 3 (18 de julio de 2024): 41–55. http://dx.doi.org/10.62951/ijcts.v1i3.24.
Texto completoSetia, Prashant y Sandosh S. "Enhancing Cybersecurity Defense of IoT Ecosystem Using Blockchain". Suranaree Journal of Science and Technology 30, n.º 4 (9 de octubre de 2023): 010238(1–14). http://dx.doi.org/10.55766/sujst-2023-04-e01071.
Texto completoPrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim y Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech". Gulf Journal of Advance Business Research 3, n.º 2 (9 de febrero de 2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.
Texto completoBelova, Iryna, Andrii Homotiuk y Oleksiy Yaroshchuk. "Digital transformation of administrative and business processes in Ukraine during marital state". Economic Analysis, n.º 34(1) (2024): 42–52. http://dx.doi.org/10.35774/econa2024.01.042.
Texto completoRuggieri, Lynn. "Michael Bianco Inc. Immigrant Workers To Save Costs". Journal of Business Case Studies (JBCS) 7, n.º 4 (24 de junio de 2011): 91–104. http://dx.doi.org/10.19030/jbcs.v7i4.4687.
Texto completoAzreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya y Muhammad Faisal. "Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme". International Journal of Computer Technology and Science 1, n.º 3 (17 de julio de 2024): 20–40. http://dx.doi.org/10.62951/ijcts.v1i3.19.
Texto completoKrichen, Moez. "Strengthening the Security of Smart Contracts through the Power of Artificial Intelligence". Computers 12, n.º 5 (18 de mayo de 2023): 107. http://dx.doi.org/10.3390/computers12050107.
Texto completoSeetharam kakaraparthi, Durganjaneyulu immadisetty y Maranco M. "Enhanced honeypot security for intrusion detection and prevention systems using blockchain". World Journal of Advanced Research and Reviews 22, n.º 1 (30 de abril de 2024): 751–58. http://dx.doi.org/10.30574/wjarr.2024.22.1.1065.
Texto completoBayani, Samir Vinayak, Sanjeev Prakash y Lavanya Shanmugam. "Data Guardianship: Safeguarding Compliance in AI/ML Cloud Ecosystems". Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, n.º 3 (29 de septiembre de 2023): 436–56. http://dx.doi.org/10.60087/jklst.vol2.n3.p456.
Texto completoYachna, I., O. Kuvshynova, D. Shabanov, Ye Porуnos y M. Kostashchuk. "BLOCKCHAIN AND ITS APPLICATION IN THE DEFENCE SECTOR". Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки 20, n.º 3 (9 de octubre de 2024): 139–45. http://dx.doi.org/10.37701/dndivsovt.21.2024.17.
Texto completoKostopoulos, Nikos, Yannis C. Stamatiou, Constantinos Halkiopoulos y Hera Antonopoulou. "Blockchain Applications in the Military Domain: A Systematic Review". Technologies 13, n.º 1 (6 de enero de 2025): 23. https://doi.org/10.3390/technologies13010023.
Texto completoRautio, Samu, Timo Tuomi y Jan Akmal. "Legal Aspects of Additive Manufacturing in the Military Logistics". Security Dimensions 40, n.º 40 (31 de marzo de 2022): 154–95. http://dx.doi.org/10.5604/01.3001.0015.8153.
Texto completoRomas, Maria. "Procedure for Concluding Civil Law Contracts with the Participation of the State of Ukraine under Martial Law". Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi 2, n.º 15(27) (16 de junio de 2023): 187–94. http://dx.doi.org/10.33098/2078-6670.2023.15.27.2.187-194.
Texto completoChen, Yongle, Xiaojian Wang, Yuli Yang y Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract". Sensors 20, n.º 4 (15 de febrero de 2020): 1062. http://dx.doi.org/10.3390/s20041062.
Texto completoWyszomirska, Monika. "Tax and Legal Issues Related to the Implementation of Research and Development Projects in the Area of "Security and Defense"". Safety & Fire Technology 58, n.º 2 (2021): 22–36. http://dx.doi.org/10.12845/sft.58.2.2021.2.
Texto completoTerpstra, J. "Particuliere beveiligers als publieke handhavers". Justitiële verkenningen 38, n.º 8 (diciembre de 2012): 35–50. https://doi.org/10.5553/jv/016758502012038008004.
Texto completoSoroka, Larysa, Anna Danylenko, Maksym Sokiran, Diana Levchenko y Oksana Zubko. "Public-private collaboration for national security: challenges and opportunities". Revista Amazonia Investiga 12, n.º 70 (30 de octubre de 2023): 43–50. http://dx.doi.org/10.34069/ai/2023.70.10.4.
Texto completoPapanikolaou, Alexandros, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis y Konstantinos Rantos. "A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection". Electronics 12, n.º 6 (21 de marzo de 2023): 1484. http://dx.doi.org/10.3390/electronics12061484.
Texto completoXu, Ziqiang, Ahmad Salehi Shahraki y Carsten Rudolph. "Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids". Smart Cities 6, n.º 5 (23 de octubre de 2023): 3005–31. http://dx.doi.org/10.3390/smartcities6050135.
Texto completoGhosh, Samadrita. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (10 de abril de 2024): 303–22. http://dx.doi.org/10.60087/jaigs.v3i1.122.
Texto completoRana, Sohel. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (10 de abril de 2024): 161–78. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p178.
Texto completoAdegbite, Olusola Babatunde. "War Profiteering and Armed Conflicts: Examining Applicable Aspects of International Law". Groningen Journal of International Law 10, n.º 1 (3 de mayo de 2023): 21–42. http://dx.doi.org/10.21827/grojil.10.1.21-42.
Texto completoYasa, Abdul Rahman. "From Security Sector Reform to Endemic Corruption: The Case of Afghanistan". Journal of Strategic Security 13, n.º 3 (octubre de 2020): 99–119. http://dx.doi.org/10.5038/1944-0472.13.3.1755.
Texto completoPinheiro, Alexandre, Edna Dias Canedo, Robson de Oliveira Albuquerque y Rafael Timóteo de Sousa Júnior. "Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts". Sensors 21, n.º 13 (29 de junio de 2021): 4440. http://dx.doi.org/10.3390/s21134440.
Texto completoSilva, Mário Herbert Souza da y Prof Me Dênis Márcio Jesus Oliveira. "Responsabilidade Civil por vício oculto na venda de veículos usados". RCMOS - Revista Científica Multidisciplinar O Saber 3, n.º 1 (22 de enero de 2024): 1–8. http://dx.doi.org/10.51473/ed.al.v3i1.516.
Texto completoWitanto, Elizabeth Nathania, Yustus Eko Oktian y Sang-Gon Lee. "Toward Data Integrity Architecture for Cloud-Based AI Systems". Symmetry 14, n.º 2 (29 de enero de 2022): 273. http://dx.doi.org/10.3390/sym14020273.
Texto completovan Meegdenburg, Hilde. "‘We don’t do that’: A constructivist perspective on the use and non-use of private military contractors by Denmark". Cooperation and Conflict 54, n.º 1 (10 de abril de 2018): 25–43. http://dx.doi.org/10.1177/0010836718765901.
Texto completoADEYINKA, Tajudeen Yusuf, Musediq Olufemi LAWAL, Olawale Olufemi AKINRINDE y Remi Kasali ALATIS. "Nigeria’s Development Trajectory, Security Conundrum and the State-Citizens Relations". BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, n.º 1 (8 de abril de 2024): 194–211. http://dx.doi.org/10.53477/2284-9378-24-13.
Texto completoGACEK, Józef, Bronisław MARCINIAK y Ryszard WOŹNIAK. "Major Conditions of Shooting Range Operation in Poland". Problems of Mechatronics Armament Aviation Safety Engineering 9, n.º 3 (30 de septiembre de 2018): 89–104. http://dx.doi.org/10.5604/01.3001.0012.2741.
Texto completoHum, Derek. "Tenure, Faculty Contracts and Bargaining Conflict". Canadian Journal of Higher Education 28, n.º 3 (3 de mayo de 2017): 47–70. http://dx.doi.org/10.47678/cjhe.v28i3.183320.
Texto completoVladu, Mircea y Stelian Popescu. "Considerations on the Impact of Emerging and Disruptive Technologies on Security Policies". Scientific Bulletin 26, n.º 2 (1 de diciembre de 2021): 211–16. http://dx.doi.org/10.2478/bsaft-2021-0026.
Texto completoKobroń-Gąsiorowska, Łucja. "The employee and their social security in flexible forms of employment on the example of Poland – selected issues. Part I". Kwartalnik Prawa Międzynarodowego IV, n.º IV (30 de marzo de 2024): 187–206. http://dx.doi.org/10.5604/01.3001.0054.4285.
Texto completoPolychronaki, Maria, Dimitrios G. Kogias, Helen C. Leligkou y Panagiotis A. Karkazis. "Blockchain Technology for Access and Authorization Management in the Internet of Things". Electronics 12, n.º 22 (10 de noviembre de 2023): 4606. http://dx.doi.org/10.3390/electronics12224606.
Texto completoFleming, Courtney, Mark Reith y Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de febrero de 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Texto completoSlepak, Vitaly Yu. "Legal Regulation of Financing of Scientific Studies by Means of Awarding State Contracts in the Area of Security and Defense". Jurist 8 (29 de julio de 2020): 2–9. http://dx.doi.org/10.18572/1812-3929-2020-8-2-9.
Texto completoTiverios, Nicholas. "A Uniform Hermeneutic Thesis". University of Queensland Law Journal 40, n.º 2 (29 de junio de 2021): 181–214. http://dx.doi.org/10.38127/uqlj.v40i2.5483.
Texto completoZhang, Ying. "Increasing Cyber Defense in the Music Education Sector Using Blockchain Zero-Knowledge Proof Identification". Computational Intelligence and Neuroscience 2022 (28 de junio de 2022): 1–7. http://dx.doi.org/10.1155/2022/9922167.
Texto completoManin, Iaroslav. "Defense of the Fatherland: Conscription for Military Service on Mobilization". Полицейская и следственная деятельность, n.º 3 (marzo de 2022): 42–63. http://dx.doi.org/10.25136/2409-7810.2022.3.38878.
Texto completoMa, Xingbang, Dongsheng Yu, Yanhui Du, Lanting Li, Wenkai Ni y Haibin Lv. "A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence". Electronics 12, n.º 11 (29 de mayo de 2023): 2454. http://dx.doi.org/10.3390/electronics12112454.
Texto completoVarney, Eliza. "Redefining contractual capacity? the UN Convention on the Rights of Persons with Disabilities and the incapacity defence in English contract law". Legal Studies 37, n.º 3 (septiembre de 2017): 493–519. http://dx.doi.org/10.1111/lest.12166.
Texto completo