Littérature scientifique sur le sujet « Security challenge »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Security challenge ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Security challenge"

1

Streater, K. « Cyber Security Challenge ». ITNOW 52, no 6 (1 novembre 2010) : 28. http://dx.doi.org/10.1093/itnow/bwq218.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Waugh, William L. « Securing Mass Transit : A Challenge for Homeland Security ». Review of Policy Research 21, no 3 (mai 2004) : 307–16. http://dx.doi.org/10.1111/j.1541-1338.2004.00077.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Fair, C. Christine. « Pakistan's Security-Governance Challenge ». Current History 110, no 735 (1 avril 2011) : 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Szönyi, István. « Hungary : A security challenge ? » International Spectator 29, no 1 (janvier 1994) : 89–108. http://dx.doi.org/10.1080/03932729408458041.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kurpjuhn, Thorsten. « The SME security challenge ». Computer Fraud & ; Security 2015, no 3 (mars 2015) : 5–7. http://dx.doi.org/10.1016/s1361-3723(15)30017-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Beysenov, B. K., et A. Igisenova. « Global challenge and spiritual security ». Eurasian Journal of Religious studies 2, no 2 (2015) : 28–37. http://dx.doi.org/10.26577/ejrs-2015-2-17.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

McCluskey, B. « Connected cars - the security challenge ». Engineering & ; Technology 12, no 2 (1 mars 2017) : 54–57. http://dx.doi.org/10.1049/et.2017.0205.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Carroll, John E. « The Acid Challenge to Security ». Bulletin of the Atomic Scientists 45, no 8 (octobre 1989) : 32–34. http://dx.doi.org/10.1080/00963402.1989.11459736.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lafuente, Guillermo. « The big data security challenge ». Network Security 2015, no 1 (janvier 2015) : 12–14. http://dx.doi.org/10.1016/s1353-4858(15)70009-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

EMBER, LOIS. « Diseases Pose National Security Challenge ». Chemical & ; Engineering News 78, no 11 (13 mars 2000) : 10. http://dx.doi.org/10.1021/cen-v078n011.p010.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Security challenge"

1

Griffiths, Jordan Luke. « Cyber security as an emerging challenge to South African national security ». Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62639.

Texte intégral
Résumé :
As South Africa is a rapidly developing country and has become more increasingly technologically advanced through the growth in information communications technology (ICT) and the expansion of modern state infrastructure. With this growth more of the country's citizens have also become connected as access to the internet has spread. However, this advancement has also introduced a new challenge to South African national security in the form of cyber security. The spread of technology has created new vulnerabilities within the cyber domain that may directly work to undermine the country's security. Computer hackers are developing advanced software and methods designed to infiltrate and disable critical state infrastructure, capture confidential state or corporate information, engage in identity theft and fraud, rob banks and financial institutions and even undermine democratic processes such as elections. Terrorists have also embraced cyber space as a domain where they can recruit followers, spread propaganda, and provide advice and encouragement to those who wish to conduct terrorist operations. States are now not only creating cyber teams that can counter these terrorists but they are also developing cyber weapons which can be deployed to disrupt the operations of other countries should the need arise. This study analyses the challenge that cyber security poses to South African national security. This research contextualises the concept of cyber security within the theoretical understanding of national security. In highlighting the destructive capabilities of cyber attacks, the study provides detail on four examples, namely the 2007 attacks against Estonia, the impact of the Stuxnet worm on Iranian centrifuges in 2010, Chinese hackers targeting the USA and the hack on the Democratic National Committee. This then provides a foundation through which South Africa's cyber security position can be evaluated. The study also analyses several public cyber attacks that have targeted South Africa and presents a number of research reports which identify the country as one of the most targeted nations in the world. Although South Africa has acknowledged the role of ICT in its development, the country has failed to engage on the importance of cyber security. This study examines the country's policy progress with regards to cyber security which has ultimately lead to the Cyber Security and Cyber Crimes bill which was released for public comment in December 2015. However, the country's cyber position is weakened by its lack of cyber skills and capacity, as such the research also provides some recommendations on how South Africa can strengthen its overall approach to cyber security.
Mini Dissertation (MSS)--University of Pretoria, 2017.
Political Sciences
MSS
Unrestricted
Styles APA, Harvard, Vancouver, ISO, etc.
2

Baldo, Martina <1996&gt. « Climate change : a current challenge for global security ». Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19655.

Texte intégral
Résumé :
A causa dell’allarmante aumento in quantità e velocità delle emissioni di CO2 soprattutto nel corso dell’ultimo secolo, il cambiamento climatico è stato ampiamente riconosciuto come una questione di rilevanza nazionale ed internazionale concernente quasi esclusivamente la sfera ambientale. Da più di un decennio risulta, tuttavia, evidente quanto variazioni repentine di temperatura rappresentino anche una notevole minaccia in chiave di sicurezza globale, richiedendo maggiore protezione tanto del singolo individuo quanto di un intero Stato. Difatti, attraverso l’attuazione di concrete politiche di sicurezza, Paesi in tutti i continenti stanno cercando di contrastare o quantomeno ridurre eventi meteorologici sempre più estremi, scarsità di risorse naturali e alimentari, possibili conflitti e migrazioni di popoli. Purtroppo, i Paesi poveri risultano esserne ad oggi le maggiori vittime. Proposte soprattutto da Paesi sviluppati, queste misure incrementano ulteriormente l’ineguaglianza sociale tra Paesi ricchi e non, essendo quest’ultimi privi di adeguati strumenti per la lotta al cambiamento climatico. L’Unione Europea e la NATO stanno quindi cercando di adottare diverse strategie di adattamento e mitigazione, adoperandosi non solo in loco ma anche nelle zone estere più a rischio. Invece l’Italia, dal canto suo, sta vertendo soprattutto a livello locale sulla sensibilizzazione dei propri cittadini nella salvaguardia di aree fragili, tra cui ghiacciai, il Delta del Po e Venezia.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Samuel, David. « RFID security in door locks ». Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12186.

Texte intégral
Résumé :

Radio frequency identification, RFID is a technology that is used in many fields including locks. The unlimited access to the reader and the transponder has resulted in severe security weaknesses and made it possible to apply different attacks. To classify door locks as secure they must at least fulfil two main criteria: the first is the use of a challenge-response authentication protocol and the second is to deploy sophisticated and secure algorithms.

MiFare classic and KeeLoq are two widely applied technologies that are still in use in many security critical applications and are considered to be secure but which have been broken by cryptanalysis and with modest efforts and cost.

How secure a certain solution is depends on how expensive it is to buy the equipment that can break the system and reveal the secret key and how secure a lock should be depends on the value of what it is protecting.

The dropping price of powerful computers and the availability of security related information on the web will lead to an increase of the number of attacks on different systems.

By the time this thesis is published those locks evaluated are not secure enough, to overcome the security shortage some improvements have to be made such as: the use of sophisticated algorithms, the use of longer key of at least 128-bit, the use of non-deterministic random number generators and the use of pure hardware solutions both in the receiver and the transmitter to reduce leakage.

Styles APA, Harvard, Vancouver, ISO, etc.
4

Keogh, Darrin M. « European security and defence policy reform : a theoretical challenge ». Thesis, London Metropolitan University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.507077.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Denney, Lisa. « Thin security ? : the challenge of engaging informal security actors in DFID's security sector reform programme in Sierra Leone ». Thesis, Aberystwyth University, 2013. http://hdl.handle.net/2160/2a246333-453e-4ee3-b714-7a53c3e9eeb7.

Texte intégral
Résumé :
The United Kingdom's Department for International Development (DFID) has undertaken a highly innovative development strategy in Sierra Leone, reforming the security sector of the post-conflict state in order to ensure a stable environment in which investment and development can occur. Yet in doing so, DFID has not engaged with the actual locus of security provision in Sierra Leone and the effectiveness of reforms thus remains limited. This thesis seeks to understand why DFID has been unable to engage with informal security actors in its security sector reform (SSR) programme in Sierra Leone. Informal security actors are the dominant providers of policing and justice in Sierra Leone, with approximately 80 per cent of the population relying upon their services. Despite this, however, this thesis illustrates that DFID's bureaucratic and political nature produce particular understandings of security and the causes of war that focus overwhelmingly on state capacity and security provision. As a result, DFID engages with only state security providers and state failure aspects of the causes of war. Ultimately, this approach limits the ability of DFID's SSR programme to comprehensively address the causes of conflict and sustainably transform security provision in Sierra Leone. These limitations must be overcome if DFID is to remain at the forefront of SSR policy and practice.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sayeed, Sanjidaa. « Urbanization, Food Security and Sustainable Development : A Challenge for Bangladesh ». Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-227478.

Texte intégral
Résumé :
The thesis aimed to investigate the current situation of food security and initiatives by main actors in Dhaka, Bangladesh, with urban poor in focus. A qualitative study with the actors of food security and the urban poor is the basis of this research’s result complementing with previous studies on this topic. Income of the urban poor in Bangladesh is very low compare to the food price which is one of the main reasons why urban poor are not food secure in Dhaka city. There are many organizations working on income generating approaches in urban Dhaka but the work is too small to have an impact on the current situation of food security. Lack of social safety net is another reason identified for food insecurity in urban Dhaka. The government is provided low priced rice and wheat to the urban poor yet again this only covers 1 percent of the urban slums. Due to lack of resource sustainable development is not included in in the process of ensuring food security in urban Dhaka.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Storer, Robert J. « U.S.-Brazil security cooperation and the challenge of technology transfer ». Thesis, Monterey, California : Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41448.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited.
Since 2010, the United States and Brazil have made efforts to expand security cooperation between the two countries with the signing of a defense cooperation agreement, a general security of military information agreement, and the establishment of a defense cooperation dialogue. Despite these positive steps, the issue of technology transfer threatens to impede greater U.S.-Brazil security cooperation. Brazilian defense policy identifies technology transfer as a key component of its national defense, and there is a perception among many Brazilian officials that the United States is reticent to transfer defense technology to Brazil. This thesis includes an in-depth review of each country's policies and strategies related to arms and defense technology transfers, as well as case studies on cooperation (or lack thereof) between the U.S. and Brazil in two areas'nuclear and aviation'to understand what drives this belief among Brazilian policymakers. The thesis concludes that historical events in its relations with Washington make it difficult for Bras_lia to accept more recent U.S. efforts to enhance security cooperation and facilitate technology transfer on their face, while these same efforts cause U.S. policymakers to discount the importance of past indifference towards or overt efforts to block Brazil in obtaining certain technologies.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kalibjian, J. R. « Telemetry Post-Processing in the Clouds : A Data Security Challenge ». International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.

Texte intégral
Résumé :
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada
As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Karlsson, Henrik. « Americas Act of Patriotism : The Challenge of Balancing Freedom and Security ». Thesis, Linköping University, Department of Social and Welfare Studies, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8947.

Texte intégral
Résumé :

In the debate generated by the authorization and reauthorization of the Patriot act we can find a wide range of opinions and ideas concerning the balance of freedom and security, and how that might affect the society. The government (the creators of the law) advocates the necessity of the Patriot act and its structural changes to secure the freedoms of USA. While opposing views suggest that these changes affect the balance of freedom and security in such a way that it might affect the way of life and be a threat to the civil liberties of the citizens. The aim of this thesis is to investigate how the debate reflects how the Patriot act may have affected the balance between the various practices of freedoms and national security in USA.

This thesis investigates three aspects of the debate that concerns the Patriot act. The rhetoric’s used in the debate by both sides show some difference in the rationales of the debating sides. Some controversial aspects of the law undermine the safeguards that are suppose to protect the civil liberties and freedoms when their definitions are opened up for a wide arrange of interpretations. The third part of the thesis investigates the big brother mentality that is being fostered and culture of preparedness of all the nation’s dimensions and systems that is asked for in order to adapt to these systematic changes of their society that the law provides.

The investigation of the debate conclude that state apparatus takes on a role of coordinative micromanaging, which together with the culture of preparedness fosters the nation to always be on its toes. As a result of these changes the practices of freedom and the democratic values they nourish are being destabilized and undermined in the climate of fear that is being established.

Styles APA, Harvard, Vancouver, ISO, etc.
10

Gallton, Daniel A. « The Challenge of Small Satellite Systems to the Space Security Environment ». Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6797.

Texte intégral
Résumé :
Approved for public release, distribution unlimited
During the last two decades, technological advancements to the size and performance of electronics have fostered the development of increasingly sophisticated and smaller satellites. Small satellites, or smallsats as they are commonly referred to, have recorded data on terrestrial and space environments, served as important test beds and risk reducers for emerging space technologies, and provided important hands-on educational opportunities for industry and academia. The decreased cost and improved performance of smallsats have opened up a wide range of space missions at a fraction of the cost of larger satellite systems that would have been unfathomable two short decades ago. The proliferation of smallsat technology opens up a world of new scientific possibilities and unique security challenges as well for all space-faring nations through the potential use of smallsats as anti-satellite (ASAT) systems. This thesis examines the historical development of ASAT systems for the United States, the former Soviet Union, and China and discusses how they have influenced each nations space policy. Finally, this thesis will address current efforts to mitigate space weapons, review the implications of smallsat technology development on current space policy, and suggest courses of action to mitigate this emerging space security dilemma.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Security challenge"

1

G, Jacobsen C., et Canadian Pugwash Group, dir. World security : The new challenge. Toronto, Ont : Science for Peace, 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Program, CSIS International Security, dir. Civil security : Americans and the challenge of homeland security. Washington, D.C : CSIS Press, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

The Challenge of Anti-Roma Politics. New York : International Debate Education Association, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Innes, Alexandria J. Migration, Citizenship and the Challenge for Security. London : Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Administration, International Social Security, dir. Migration, a worldwide challenge for social security. Geneva : International Social Security Association, 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Xenia, Scheil-Adlung, dir. Building social security : The challenge of privatization. New Brunswick, USA : Transaction Publishers, 2001.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Energy security : Europe's new foreign policy challenge. New York : Routledge, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Khan, Zulfiqar Ali. Pakistan's security : The challenge and the response. Lahore, Pakistan : Progressive Publishers, 1988.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

MacLeod, Holly. Gender and human security : The challenge facing Canada's human security policy. St. Catharines, Ont : Brock University, Dept. of Political Science, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Warren, Aiden. New security challenges : The post 9/11 US challenge on international law. New York : Palgrave Macmillan, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Security challenge"

1

Bang, Henrik Paul. « Security and Neoliberalism ». Dans Foucault’s Political Challenge, 190–210. London : Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1007/978-1-137-31411-6_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kuzemko, Caroline, Michael F. Keating et Andreas Goldthau. « Energy Security ». Dans The Global Energy Challenge, 148–68. London : Macmillan Education UK, 2016. http://dx.doi.org/10.1057/978-1-137-41008-5_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Viegas, Virgilio, et Oben Kuyucu. « The Cybersecurity Challenge ». Dans IT Security Controls, 1–16. Berkeley, CA : Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7799-7_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Smith, Andrew. « Technology and International Security ». Dans Challenge and Change, 165–93. New York : Palgrave Macmillan US, 2016. http://dx.doi.org/10.1057/978-1-137-48479-6_7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Innes, Alexandria J. « Performing Security, Theorizing Security ». Dans Migration, Citizenship and the Challenge for Security, 113–38. London : Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137495969_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Tomic, Dusko, et Eldar Saljic. « Corruption-Specific Security Challenge ». Dans Sustainable Development and Social Responsibility—Volume 2, 41–47. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-32902-0_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Bang, Henrik Paul. « From Sovereignty to Security and Police ». Dans Foucault’s Political Challenge, 180–89. London : Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1007/978-1-137-31411-6_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kaliski, Burt. « RSA Factoring Challenge ». Dans Encyclopedia of Cryptography and Security, 1064–65. Boston, MA : Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_433.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Just, Mike. « Challenge-Response Identification ». Dans Encyclopedia of Cryptography and Security, 198–99. Boston, MA : Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_73.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chapsos, Ioannis. « Is Maritime Security a Traditional Security Challenge ? » Dans Advanced Sciences and Technologies for Security Applications, 59–78. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27914-5_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Security challenge"

1

Fallon, Maurice. « Perception and estimation challenges for humanoid robotics : DARPA Robotics Challenge and NASA Valkyrie ». Dans SPIE Security + Defence, sous la direction de Edward M. Carapezza, Panos G. Datskos et Christos Tsamis. SPIE, 2016. http://dx.doi.org/10.1117/12.2246706.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Nolan, Adam, Dan Kubaki, Timothy Ross, Joshua Blackburn et Mike Bakich. « LADAR recognition challenge problem ». Dans SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.920841.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Downer, Kathleen, et Maumita Bhattacharya. « BYOD Security : A New Business Challenge ». Dans 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity). IEEE, 2015. http://dx.doi.org/10.1109/smartcity.2015.221.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Tsai, Rung-Ywan, Chao-Hsu Tsai, Kuen Lee, Chou-Lin Wu, Lang-Chin D. Lin, Kuo-Chung Huang, Wei-Liang Hsu et al. « Challenge of 3D LCD displays ». Dans SPIE Defense, Security, and Sensing, sous la direction de Bahram Javidi, Jung-Young Son, Manuel Martinez-Corral, Fumio Okano et Wolfgang Osten. SPIE, 2009. http://dx.doi.org/10.1117/12.820169.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gorham, Brandy D., Edmund G. Zelnio, LeRoy A. Gorham et Frederick D. Garber. « A Synopsis of Challenge Problems ». Dans SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.925073.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Toth, Susan, William Hughes, Tien Pham et Jeffrey Houser. « ARL PED efforts at enterprise challenge 2016 ». Dans SPIE Defense + Security, sous la direction de Michael A. Kolodny et Tien Pham. SPIE, 2016. http://dx.doi.org/10.1117/12.2229481.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Arnold, Gregory, Jared L. Culbertson, Todd V. Rovito, Euvondia Barto, Mary Ann Harrison et Stephen Walls. « A baseline for the scene understanding challenge problem ». Dans SPIE Defense + Security, sous la direction de Ivan Kadar. SPIE, 2016. http://dx.doi.org/10.1117/12.2220419.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

McIntire, John P., Jonathan Boston, Brandon Smith, Pete Swartz, Amy Whitney-Rawls, Julian Martinez Calderon et Jonathan Magin. « AFRL Commander's Challenge 2015 : stopping the active shooter ». Dans SPIE Defense + Security, sous la direction de Edward M. Carapezza. SPIE, 2017. http://dx.doi.org/10.1117/12.2261418.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Anderson, Cressel, Ben Axelrod, J. Philip Case, Jaeil Choi, Martin Engel, Gaurav Gupta, Florian Hecht et al. « Mobile manipulation : a challenge in integration ». Dans SPIE Defense and Security Symposium, sous la direction de Grant R. Gerhart, Douglas W. Gage et Charles M. Shoemaker. SPIE, 2008. http://dx.doi.org/10.1117/12.777329.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Frederick, Philip A., Robert Kania, Justin Teems et Mike Del Rose. « External view of the DARPA Grand Challenge ». Dans Defense and Security Symposium, sous la direction de Grant R. Gerhart, Charles M. Shoemaker et Douglas W. Gage. SPIE, 2006. http://dx.doi.org/10.1117/12.668278.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Security challenge"

1

Kan, Paul R. Mexico's 'Narco-Refugees' : The Looming Challenge for U.S. National Security. Fort Belvoir, VA : Defense Technical Information Center, octobre 2011. http://dx.doi.org/10.21236/ada552113.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Obado-Joel, Jennifer. The Challenge of State-Backed Internal Security in Nigeria : Considerations for Amotekun. RESOLVE Network, décembre 2020. http://dx.doi.org/10.37805/pn2020.9.ssa.

Texte intégral
Résumé :
Nigeria faces immense internal security challenges, including the Boko-Haram crisis in the northeast and violent farmer-herder conflicts in the southwest and north-central states. Across the Nigerian federation, pockets of violent clashes have sprung and escalated in new locales in the last decade. Community responses to these violent crises have been diverse and included the establishment of armed groups to supplement or act in parallel to the security efforts of the Nigerian state—in some cases with backing from federal or state governments. These local security assemblages, community-based armed groups (CBAGs), are on the one hand contributors to local order, and normative conceptions of peace and security. On the other hand, these groups are often a pernicious actor within the broader security landscape, undermining intercommunal peace and drivers of violence and human rights abuses. This Policy Note focuses on the characteristics, challenges, and opportunities of Amotekun, a recently formed CBAG in Southwest Nigeria. Drawing from the experiences of similar Nigerian groups, the Note details recommendations that may facilitate greater success and lessen poten al risk associated with Amotekun’s formation. These recommendations are aimed primarily at Nigerian government and civil society actors and describe areas where external support could potentially improve local capacity to conduct oversight of Amotekun and similar groups.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Megan, Michael A. Force Protection and Coastal Security - A National Challenge, A Coast Guard Response. Fort Belvoir, VA : Defense Technical Information Center, février 2001. http://dx.doi.org/10.21236/ada389872.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Smith, Michael J. Security Challenge or Business Bonanza : United States Arms Transfers to the Persian Gulf. Fort Belvoir, VA : Defense Technical Information Center, avril 2001. http://dx.doi.org/10.21236/ada393645.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Djibo, Tahirou. African Military in National Conferences, A Challenge to National Security, A Case of Niger. Fort Belvoir, VA : Defense Technical Information Center, avril 1993. http://dx.doi.org/10.21236/ada265094.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kreamer, Walter H., et Jr. Terrorism in Southeast Asia : A Growing Challenge to Regional Peace, Security and U.S. Interests. Fort Belvoir, VA : Defense Technical Information Center, mars 2004. http://dx.doi.org/10.21236/ada423888.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Seymour, N. A. Global Security in the Twenty First Century - The Challenge to International Organizations, Alliances and Coalitions. Fort Belvoir, VA : Defense Technical Information Center, avril 1999. http://dx.doi.org/10.21236/ada363550.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Research Institute (IFPRI), International Food Policy. 2013 Global Hunger Index The challenge of hunger : Building resilience to achieve food and nutrition security. Washington, DC : International Food Policy Research Institute, 2013. http://dx.doi.org/10.2499/9780896298330.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Research Institute (IFPRI), International Food Policy. 2013 Global Hunger Index The challenge of hunger : Building resilience to achieve food and nutrition security. Washington, DC : International Food Policy Research Institute, 2013. http://dx.doi.org/10.2499/9780896299511.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Research Institute (IFPRI), International Food Policy. Global Hunger Index The challenge of hunger : Ensuring sustainable food security under land, water, and energy stresses. Washington, DC : International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896299429.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie