Letteratura scientifica selezionata sul tema "Secret Services Intelligence"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Secret Services Intelligence".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Secret Services Intelligence"

1

Fellows, Jamie, e Mark D. Chong. "Australian Secret Intelligence Service’s new powers: A step too far towards extraterritorial killings?" Alternative Law Journal 44, n. 4 (30 settembre 2019): 302–7. http://dx.doi.org/10.1177/1037969x19873479.

Testo completo
Abstract (sommario):
This article examines recent amendments to the Intelligence Services Act 2001 (Cth) ( IS Act). The amendments provide Australian Secret Intelligence Service staff and agents with additional protection from Australian criminal prosecution when using force under certain circumstances in overseas jurisdictions. The authors assert that while well-intentioned, and despite new and existing oversight provisions, the amendments allow pre-emptive use of force that could potentially be used to justify carrying out extraterritorial killings of Australians and foreign nationals, thereby breaching the lawful boundaries of Australian Secret Intelligence Service’s functions.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Hardy, Roger. "Israel's secret wars: a history of Israel's intelligence services". International Affairs 68, n. 2 (aprile 1992): 371. http://dx.doi.org/10.2307/2623301.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Freedman, Robert O., Ian Black e Benny Morris. "Israel's Secret Wars: A History of Israel's Intelligence Services." American Historical Review 98, n. 2 (aprile 1993): 538. http://dx.doi.org/10.2307/2166941.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Bandi, István. "Contributions to the history of the Hungarian pontifical institute from the perspective of the Hungarian secret services during the cold war". Studia Universitatis Moldaviae. Seria Ştiinţe Umanistice, n. 10(180) (aprile 2024): 58–68. http://dx.doi.org/10.59295/sum10(180)2023_07.

Testo completo
Abstract (sommario):
At the secret meeting of the secret services of the Eastern Bloc member states organized in Moscow in March 1955, the main tasks of each socialist secret service were outlined. The Hungarian services, in addition to the intelligence activities directed against the emigrant centers in the capitalist states, received a task to launch informational actions against the Vatican in the next decade. The present study examines the activity of Hungarian informational structures from the Kadar era at the objective level, that is, a concrete action carried out on Italian territory against a pontifical institution, which gained momentum starting from the mid-60s, by recruiting and integrating agents into the Hungarian Pontifical Institute operating in Rome. The analysis places special emphasis on the introduction of contemporary Hungarian intelligence methodology concepts.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Minkina, Mirosław. "Russian secret services in the so-called special operation in Ukraine". Przegląd Wschodnioeuropejski 14, n. 2 (24 dicembre 2023): 125–38. http://dx.doi.org/10.31648/pw.9707.

Testo completo
Abstract (sommario):
This article deals with the role of the Russian Federation’s secret services in the ongoing Russian invasion of Ukraine. The author explains the facts and regularities regarding the activity of the Russian secret services in this war. The research was performed from a positivist and post-positivist perspective and takes into consideration the so-called mainstream theories. For its purposes, a system analysis was included as well as references were made to the genesis of the Russian secret services, giving consideration to the space of the post-Soviet states. In addition, an in-depth study of the activity of the Russian special services, bearing in mind the key facts and methods of their operation were conducted. It confirmed the weakness of the Russian secret services. At the same time, the aftermath of this state of affairs is the increase in the importance of military intelligence.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sánchez Barrilao, Juan Francisco. "Servicios de inteligencia, secreto y garantía judicial de los derechos". Teoría y Realidad Constitucional, n. 44 (15 novembre 2019): 309. http://dx.doi.org/10.5944/trc.44.2019.26004.

Testo completo
Abstract (sommario):
En este trabajo se analiza el marco jurídico de la garantía judicial de los derechos con relación a la actividad de los servicios de inteligencia. En tal sentido, primero contextualizamos la inteligencia al respecto de la sociedad del riesgo y la seguridad; luego identificamos los servicios de inteligencia y presentamos el régimen jurídico del secreto; y finalmente se estudia el control judicial de la actividad de inteligencia en relación con la garantía de los derechos, así como sus déficits y su conveniente reforma.This paper analyzes the legal framework of the judicial guarantee of rights concerning the activity of intelligence services. In that sense, we first contextualize intelligence regarding the risk society and the security; then we focus on the intelligence services considering the legal framework of the secret; and finally we study the judicial control of intelligence activity in relation to the guarantee of rights, as well as its deficits and its convenient legal reform purposes.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Braat, Eleni. "Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II". Politics and Governance 6, n. 4 (28 dicembre 2018): 159–67. http://dx.doi.org/10.17645/pag.v6i4.1556.

Testo completo
Abstract (sommario):
Secrecy and informal organisation produce, sustain, and reinforce feelings of loyalty within intelligence and security services. This article demonstrates that loyalty is needed for cooperation between intelligence partners as well as within and between services. Under many circumstances, loyalty plays a larger role in the level of internal and external collaboration than formal work processes along hierarchical lines. These findings are empirically based on the case study of Anglo‒Dutch intelligence cooperation during World War II. By demonstrating that ‘loyalty’ critically affects the work of intelligence communities, this article contributes to current and future research that integrates history, intelligence studies, and research on emotions.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Rosicki, Remigiusz. "State Security and Individual Security as Exemplified by the Recruitment of Secret Collaborators by the Polish Intelligence Service". Polish Political Science Yearbook 51 (31 dicembre 2022): 1–19. http://dx.doi.org/10.15804/ppsy202255.

Testo completo
Abstract (sommario):
The material scope of the research problem presented in the text encompasses the issues concerned with the possibilities for and limitations of recruiting secret collaborators by the Polish civilian intelligence service. The analysis of the problematics of secret collaboration focuses mainly on institutional and legal aspects, which can be seen in its inclusion in the systemic legal perspective, encompassing such dimensions as administrative and legal, criminal and legal, civil and legal, and ethical one. Next to the normative aspects, the text addresses sociological and psychological aspects of recruiting secret collaborators by special services, thereby depicting the main recruitment methods. The methodology adopted is chiefly based on the institutional and legal approach, in which use is made of, inter alia, textual, functional and systemic interpretations. The problem of possible abuse concerned with the recruitment of secret collaborators by special services is illustrated with an abstract case study and a relevant legal interpretation. Besides, to extend the analysis of psychological and sociological aspects of recruiting secret collaborators, the study uses limited open interviews with former officers of the civilian special services operating in Poland before 1990.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Luțai, Raluca. "European intelligence services just signed up on social media. An analysis of secret services and social media platforms". Studia Universitatis Babeș-Bolyai Studia Europaea 67, n. 2 (30 dicembre 2022): 199–223. http://dx.doi.org/10.24193/subbeuropaea.2022.2.08.

Testo completo
Abstract (sommario):
"In the last decade a large number of public institutions, including intelligence services, make extensive use of social media to communicate with citizens. Much scholarly attention is paid to the benefits of online communication and the way governmental institutions presents themselves online. However, we know little about intelligence services and their presence on social media. This paper addresses this gap in literature and analyzes what kind of social networks European intelligence services prefer. The article is based on quantitative research of the social platforms used by the intelligence services of all 27 European Union Member States. The findings indicate that intelligence services are present in the social media environment to a different extent and the social platforms they choose to use are different. Keywords: intelligence services, social media, European Union."
Gli stili APA, Harvard, Vancouver, ISO e altri
10

BIZADEA, George. "HMONG. THE SECRET ARMY". STRATEGIES XXI - National Defence College 1, n. 72 (15 luglio 2021): 356–64. http://dx.doi.org/10.53477/2668-5094-21-25.

Testo completo
Abstract (sommario):
This article aims to analyze the role of the Hmong population in the Indochina conflict. US President Dwight D. Eisenhower considered Laos a buffer state according to theDominion Theory and as such much more strategically important than Vietnam. To avoid the fall of Laos under communism and thus the spread of communism in the region, Eisenhower turned to the services of the C.I.A., because he could not intervene officially in Laos without violating the Geneva Convention.Keywords: Indochina; Laos; Vietnam; war; United States of America; Hmong, Central Intelligence Agency.
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Secret Services Intelligence"

1

Ritchey, David (David Benjamin. "George Washington's Development as an Espionage Chief". Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.

Testo completo
Abstract (sommario):
The American Revolution was a war of movement over great distances. Timely intelligence regarding the strength and location of the enemy was vital to the commanders on both sides. Washington gained his early experience in intelligence gathering in the wilderness during the French and Indian War. By the end of the American Revolution, Washington had become a skilled manager of intelligence. He sent agents behind enemy lines, recruited tory intelligence sources, questioned travelers for information, and initiated numerous espionage missions. Many heroic patriots gathered the intelligence that helped win the War for Independence. Their duties required many of them to pose as one of the enemy, and often incur the hatred of friends and neighbors. Some gave their lives in helping to establish the new American nation. It is possible that without Washington's intelligence service, American independence might not have been won.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Le, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987". Orléans, 1992. http://www.theses.fr/1995ORLE1012.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

De, Witte Parra Mona. "La protection du renseignement britannique, américain et allemand pendant la Seconde Guerre mondiale". Thesis, Reims, 2016. http://www.theses.fr/2016REIML004.

Testo completo
Abstract (sommario):
Cette thèse est consacrée à l’étude de la protection des sources de renseignement britanniques pendant la Seconde Guerre mondiale, en enrichissant cette analyse grâce à des éléments de comparaison avec les pratiques privilégiées aux États-Unis et en Allemagne. Dans ces trois pays, des approches très différentes sont adoptées afin de s’assurer de la durabilité des sources et de pouvoir continuer à exploiter ces données précieuses, témoignant d’appréhensions variées de l’impératif de préserver ces sources et de politiques diverses à l’égard du choix complexe entre utilisation d’un renseignement et préservation de son origine, entre exploitation à court terme et bienfaits sur une échéance plus longue dans un contexte de guerre. En s’appuyant sur de nombreux documents d’archives civils et militaires des trois pays, cette étude présente leurs attitudes divergentes et permet de faire la lumière sur les véritables performances des services de renseignement des trois pays. Il est nécessaire de s’interroger sur le bien-fondé de la réputation de secret qui semble caractériser les agences britanniques, par opposition à leurs homologues américains, et sur le véritable succès des services allemands dans un pays marqué par de profondes divisions.Cette recherche détaille la coopération équivoque entre le Royaume-Uni et les États-Unis, qui a posé quelques-uns des premiers jalons de la « special relationship », la « relation spéciale » entre les deux pays, toute d’ambiguïté. Cette association est le théâtre de l’inversion du rapport de forces des deux puissances dans ce domaine comme dans bien d’autres. De plus, l’analyse des échanges des agences britanniques avec leurs homologues français et soviétiques permet d’adopter une nouvelle perspective dans l’étude de leurs relations internationales et de ces alliances complexes aux contours fluctuants
This thesis investigates the protection of British intelligence sources during World War Two, and includes a comparison with American and German practices. In these three countries, intelligence officers adopted very different approaches to preserve these sources and to ensure that the latter could be used in the long term. Each country had a different perception of the balance between the immediate use of intelligence and the protection of its sources, between the short-term benefits and long-term preservation of these assets in the context of the war. Drawing on a vast amount of archival material, both civilian and military, this research presents these three countries’ various approaches and uses this analysis to reflect on their concrete achievements. This study interrogates the preconceived ideas about these countries’ intelligence practices, in particular the reputation of secrecy of the British agencies, as opposed to the lack of discretion of their American counterparts. Moreover, this thesis emphasises the particular situation of German secret services in a very divided country.The ambiguous cooperation between Britain and the United States during the Second World War helped pave the way for their « special relationship ». During the war, the balance of power between the two nations shifted dramatically, in the intelligence field as in many others. Moreover, the analysis of the exchanges between the British intelligence officers and their French and Soviet colleagues opens new research avenues in the study of their international relations and on these complex and fluctuating alliances
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Couderc, Agathe. "Sous le sceau du secret : les coopérations internationales des Chiffres britannique et français, militaires et navals pendant la Première Guerre mondiale". Electronic Thesis or Diss., Sorbonne université, 2022. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2022SORUL060.pdf.

Testo completo
Abstract (sommario):
Redécouverte à la fin du XIXe siècle, à la faveur de l’évolution des télécommunications, la cryptologie, ou science des écritures secrètes, connaît un intérêt croissant dans les milieux militaires et navals. Son développement accéléré en temps de guerre se traduit chez les Français et les Britanniques par la création ou l’élargissement de plusieurs services dits « du Chiffre », spécialisés dans la protection des communications nationales et alliées et dans l’attaque des codes ennemis. Une telle évolution illustre l’émergence d’une nouvelle branche du renseignement et de son reflet dans le contre-espionnage pendant la Première Guerre mondiale : le renseignement technique. La comparaison des Chiffres français et britanniques au sein des forces armées établit des temporalités certes différentes dans l’apparition de certaines missions, mais met en lumière les similitudes dans l’instauration de ces services, notamment dans le recrutement d’un personnel soumis au secret. Au sein de l’Entente cordiale, une coopération secrète, interarmes et interalliée, se noue entre les services du Chiffre français et britanniques. Cette alliance comprend autant la construction de codes secrets communs que le partage d’informations issues de l’interception et du décryptement des messages ennemis. Elle permet ainsi de souligner l’importance de la cryptologie pour l’alliance franco-britannique, mais aussi pour leurs autres alliés comme les Américains, dans la lutte contre les Empires centraux. L’ampleur que cette spécialité du renseignement prend dans la conduite de la guerre explique dès lors la forme prise par les Chiffres français et britanniques d’après-guerre
At the end of the 19th century, thanks to the evolution of telecommunications, military and naval circles rediscover cryptology, also known as “science of secret writing”, and become more and more interested by it. Its quick development in wartime can be depicted by the creation or expansion of several units, called “Cipher services”, in France and in the United Kingdom. These services have two missions: protecting the national and allied communications, and attacking the secret codes of the enemy. Their growth during the First World War illustrates the emergence of a brand new branch of intelligence and its reflection in counter-espionage: signals intelligence, or SIGINT. A comparison between the French and British Cipher services within their armed forces shows that there were similarities in the establishment of these services, particularly in recruiting personnel whom were subject to secrecy, although the temporalities of certain missions differed. Within the Entente Cordiale, a secret, joint and allied cooperation was established between the various French and British signals intelligence services. This alliance included the creation of shared codes, as well as the sharing of information resulting from the interception and decrypting of enemy communications. It thus highlights the importance of cryptology for the Franco-British alliance in the fight against the Central Empires, which can also be observed in their other alliances, such as the one with the Americans. It also sheds light on the extent to which this intelligence specialty took on in the conduct of the war, which explains the shape taken by the French and British Ciphers after the war
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Blistène, Pauline. "Voir et faire voir le secret de l'État : fonctions et enjeux de la fiction d’espionnage contemporaine". Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H219.

Testo completo
Abstract (sommario):
Quelle est la valeur politique, morale et philosophique des fictions dites « d’espionnage » ? Nous examinons cette question à partir d’une méthodologie innovante mêlant analyse de séries télévisées contemporaines (Homeland, Le Bureau des Légendes) et enquêtes de terrain auprès des acteurs du renseignement (CIA, DGSE) et du divertissement (showrunners, scénaristes). La thèse que nous défendons est celle d’une modification du statut ontologique et épistémique des films ou séries d’espionnage en raison de l’engagement de véritables espions dans leur fabrication. L’importance politique et philosophique des fictions d’espionnage se manifeste par l’impact de ces fictions sur la réalité politique et sociale : le « réalisme » des fictions d’espionnage que nous définissons ici s’éloigne des conceptions communes de ressemblance avec le réel pour y substituer une approche qui met l’agentivité au cœur de l’analyse. Il ne s’agit pas de décréter l’effacement de la frontière entre fait et fiction mais au contraire d’en réaffirmer l’importance, comme hypothèse de production et de réception des œuvres. Dans un contexte où la demande d’information concernant les activités clandestines de l’État ne cesse de croître, les interactions entre professionnels du renseignement et du divertissement permettent aux premiers de mettre en scène leur propre dévoilement sans pour autant révéler leurs activités réelles. Ainsi, loin de concourir à l’abolition de la frontière du secret, de telles pratiques opèrent un déplacement de cette dernière : une reconduite du régime du secret sous l’apparence d’une mise en transparence. Le secret de l’État n’est jamais dévoilé, il est toujours signifié
What is the political, moral and philosophical value of “spy fiction”? This dissertation examines this question using an innovative methodology that combines an analysis of contemporary television series (Homeland, Le Bureau des Légendes) and interviews with intelligence practitioners (CIA, DGSE) along with entertainment professionals (showrunners, screenwriters). My thesis is that there is a change in the ontological and epistemic status of spy films and TV series due to the involvement of real spies in their creation. The political and philosophical importance of spy fiction manifests itself in the impact of spy fiction on the political and social reality: the “realism” of spy fiction that I define here departs from common conceptions of correspondence to reality and replaces it with an approach that locates agency at the heart of the analysis. This approach does not stipulate the blurring of fact and fiction, but instead reaffirms its importance as a hypothesis for the production and reception of cultural artifacts. In a context where the demand for information concerning clandestine activities of the state keeps growing, the interactions between intelligence and entertainment professionals allow the former to stage their own disclosure without revealing their real activities. Far from contributing to the abolition of the frontier of secrecy, such practices contribute to its displacement, thus allowing a renewal of secrecy under the appearance of transparency. State secrets are never revealed but only signified
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Guillaumin, Béatrice. "L'appareil français de renseignement : une administration ordinaire aux attributs extraordinaires". Electronic Thesis or Diss., Paris 1, 2021. https://ecm.univ-paris1.fr/nuxeo/site/esupversions/87fa596a-79d4-4f38-89d4-aca7a78356b9.

Testo completo
Abstract (sommario):
Depuis la fin des années 2000, l’intégration de l’appareil de renseignement dans le paysage administratif et institutionnel français est incontestable : encadrement juridique de ses activités, redéfinition du lien entretenu avec l’Exécutif, contrôle pluriel dont il fait dorénavant l’objet, etc. S’il convient de vérifier cette normalisation, il paraît davantage essentiel d’en évaluer la portée. Au seuil de l’étude, un faisceau d’indices peut être dégagé pour corroborer le processus d’une normalisation substantielle de l’appareil de renseignement. Ce dernier ne saurait pour autant disparaître et se fondre entièrement dans la matrice administrative. Dans cette hypothèse, alors que le processus de normalisation entend gommer les originalités de l’appareil de renseignement, il engendre en réalité un mouvement paradoxal : aux originalités de départ s’en sont ajoutées ou substituées de nouvelles. Ainsi envisagé, l’alignement de l’appareil de renseignement sur le modèle administratif demeure limité par un certain nombre d’éléments qui façonnent un édifice à la physionomie singulière, oscillant entre normalité et originalité. Pour s’en convaincre, il s’agit de mettre en exergue que la normalisation de l’appareil de renseignement s’opère par la conjonction de deux mouvements dans une synchronie parfaite. Le premier est relatif à l’encadrement juridique de l’appareil de renseignement qui, par les procédés qu’il déploie, constitue l’apanage de cette normalisation. Le second se concrétise dans le resserrement du contrôle de l’appareil de renseignement dont les mécanismes apparaissent comme les marqueurs de cette normalisation
Since the end of the 2000s, the integration of the intelligence apparatus into the French administrative and institutional landscape has been indisputable: legal framework for its activities, redefinition of the link maintained with the executive branch, plural control to which it is now subject, etc. While this normalisation should be verified, it will be more essential to assess its scope. At the threshold of the study, a bundle of clues can be released to corroborate the process of a substantial normalisation of the intelligence apparatus. However, it cannot disappear and merge entirely into the administrative matrix. In this hypothesis, while the normalisation process intends to erase the originalities of the intelligence apparatus, it actually generates a paradoxical movement: new originalities have been added. Thus considered, the alignment of the intelligence apparatus on the administrative model remains limited by a certain number of elements which shape an administration with a singular appearance, oscillating between normality and originality. To be convinced of this, the aim is to emphasise that the normalisation of the intelligence apparatus takes place by the conjunction of two movements in perfect synchronization. The first relates to the legal framework of the intelligence apparatus which constitutes the apanage of this normalisation. The second is triggered by the tightening of control over the intelligence apparatus, the mechanism of which appears to be the markers of this normalisation
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979". Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Ramondy, Karine. "1958-1961 : l'assassinat des leaders africains, un "moment" de construction nationale et de régulation des relations internationales (étude comparée en Afrique centrale)". Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01H006.

Testo completo
Abstract (sommario):
En suivant la trajectoire de quatre leaders africains au temps des indépendances, Barthélémy Boganda (République centrafricaine), Patrice Lumumba (République du Congo), Félix Moumié et Ruben Um Nyobè (Cameroun), ce travail cherche à explorer par le biais de l’anthropologie historique, de la méthode comparative et à l’échelle de l’Afrique centrale, en quoi l’assassinat politique peut constituer un moyen de réguler les relations internationales et peut être un fondement de la construction nationale de leur pays d’origine. Au fil de l’itinéraire politique de ces leaders, seront évoquées leurs désillusions onusiennes et panafricaines qui resserrent sur eux l’étau mortel d’une Realpolitik entre bipolarisation et néocolonialisme. L’autre hypothèse explorée est la suivante : il serait possible par le biais de l’Histoire comparée de faire émerger des invariants à l’assassinat politique sous forme de processus récurrents comme l’arme judiciaire, l’arme médiatique, l’absence de sépultures décentes, la damnatio memoriae dont ils sont frappés qui aboutit a contrario à une inversion symbolique et iconique. L’étude s’appuie sur de nombreuses sources qui se sont complétées afin de reconstituer l’enchaînement des évènements et de nouvelles interprétations : archives privées inédites, archives publiques dont certaines ont été déclassifiées pour cette étude, sources audiovisuelles et imprimées, témoignages oraux inédits recueillis par l’auteure
Through a close examination of the trajectory of four African leaders, Barthélémy Boganda (Republic of Central Africa), Patrice Lumumba (Republic of Congo), Félix Moumié et Ruben Um Nyobé (Cameroun), during the independence era, and by means of the historical anthropology, the comparative method and focusing on Central Africa, this study tries to explore to what extent political assassination could constitute a way of regulating international relationships and lay the foundations of the national construction of their country of origins. Along their political career path, their UN-related and Pan–Africanism disillusionment that tightens around them the lethal noose of a Realpolitik caught between bipolarization and neo-colonialism will be referred to. The other hypothesis developed here is as followed : it could be possible through comparative history to bring out invariance within political assassination under the forms of recurrent processes such as the judiciary weapon, the media weapon, the lack of a decent burial place and the damnatio memoriae they’ve been sentenced to which all contrastingly led to a symbolic and iconic reversal. The study relies on numerous sources that complete each other in order to reconstitute the chain of events and allow new interpretations: private exclusive archives, public archives, some of which having been declassified for this purpose, audio-visual and printed sources, exclusive oral narratives collected by the author
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)". Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040174.

Testo completo
Abstract (sommario):
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l’aventure, une reconnaissance sociale ou incité par un patriotisme naissant, l’espion prend des risques pour satisfaire un commanditaire. La troisième partie s’intéresse au secret militaire, difficile à préserver et dévoilé dans une logique de réseau, à différentes échelles et selon des organisations plus ou moins complexes. L’espion s’inscrit dans un rapport personnel avec un supérieur dont il est le « client ». L’étude s’intéresse dans un dernier temps à la transmission et la protection du renseignement obtenu. Les risques sont divers (interception postale mais surtout espions ennemis). La conclusion pose la question de l’efficacité du renseignement militaire, peu décisif du fait des contraintes logistiques et de la méfiance généralisée sur les informations et sur les acteurs qui les collectent. Dans une période de structuration de l’armée et de centralisation du pouvoir politique, le renseignement militaire oppose un fonctionnement décentralisé. La nécessité d’une information fiable entraîne une militarisation des civils, transformant ces derniers en auxiliaires de renseignement
This work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)". Electronic Thesis or Diss., Paris 4, 2010. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2010PA040174.pdf.

Testo completo
Abstract (sommario):
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l’aventure, une reconnaissance sociale ou incité par un patriotisme naissant, l’espion prend des risques pour satisfaire un commanditaire. La troisième partie s’intéresse au secret militaire, difficile à préserver et dévoilé dans une logique de réseau, à différentes échelles et selon des organisations plus ou moins complexes. L’espion s’inscrit dans un rapport personnel avec un supérieur dont il est le « client ». L’étude s’intéresse dans un dernier temps à la transmission et la protection du renseignement obtenu. Les risques sont divers (interception postale mais surtout espions ennemis). La conclusion pose la question de l’efficacité du renseignement militaire, peu décisif du fait des contraintes logistiques et de la méfiance généralisée sur les informations et sur les acteurs qui les collectent. Dans une période de structuration de l’armée et de centralisation du pouvoir politique, le renseignement militaire oppose un fonctionnement décentralisé. La nécessité d’une information fiable entraîne une militarisation des civils, transformant ces derniers en auxiliaires de renseignement
This work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Secret Services Intelligence"

1

Rooney, Anne. Secret services. Mankato, MN: Smart Apple Media, 2010.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Davies, Philip H. J. The British secret services. Oxford, England: ABC-Clio, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Martyn, Cornick, e Morris Peter, a cura di. The French secret services. New Brunswick, N.J: Transaction Publishers, 1993.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cornick, Martyn. The French secret services. Oxford: Clio Press, 1993.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Cornick, Martyn. The French secret services. New Brunswick, U.S.A: Transaction Publishers, 1993.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Lester, Normand. Enquêtes sur les services secrets. [Saint-Laurent]: Édition du Club Québec loisirs, 1998.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Frank, Clements. Israeli Secret Services. New Brunswick, N.J: Transaction Publishers, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Guisnel, Jean. Services secrets: Le pouvoir et les services de renseignements sous la présidence de François Mitterrand. Paris: La Découverte, 1988.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

J, Dziak John, e Consortium for the Study of Intelligence., a cura di. Bibliography on Soviet intelligence and security services. Boulder: Westview Press, 1985.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Junghans, Pascal. Les services de renseignements français. Boulogne: Éditions Edmond Dantès, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Secret Services Intelligence"

1

Bigo, Didier. "Transformations of the transnational field of secret services". In Intelligence Oversight in Times of Transnational Impunity, 70–97. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003354130-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Yan, Xuehu, Jinming Li, Yuliang Lu, Lintao Liu, Guozheng Yang e Huixian Chen. "Relations Between Secret Sharing and Secret Image Sharing". In Security with Intelligent Computing and Big-data Services, 79–93. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

O’Sullivan, Adrian. "Six: His Britannic Majesty’s Secret Intelligence Service". In The Baghdad Set, 169–79. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15183-6_8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cao, Lai-Cheng. "Secure Negotiation Approach for Share-Secret-Key of Kerberos Service". In Artificial Intelligence and Computational Intelligence, 101–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23887-1_13.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Shyu, Shyong Jian, e Ying Zhen Tsai. "Shamir’s Secret Sharing Scheme in Parallel". In Security with Intelligent Computing and Big-data Services, 206–16. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76451-1_20.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Robles, Ramiro Samano, R. Venkatesha Prasad, Ad Arts, Mateusz Rzymowski e Lukasz Kulas. "Artificial Intelligence for Wireless Avionics Intra-Communications". In Intelligent Secure Trustable Things, 331–52. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54049-3_18.

Testo completo
Abstract (sommario):
AbstractThis chapter presents a summary of the description and preliminary results of the use case related to the implementation of artificial intelligence tools in the emerging technology called wireless avionics intra-communications (WAICs). WAICs aims to replace some of the cable buses of modern aircraft. This replacement of infrastructure leads to: (1) complexity reduction of future airplanes, (2) creation of innovative services where wireless links are more flexible than wireline links, and mainly (3) a considerable weight reduction, which in turn leads to fuel consumption efficiency, increase of payload, as well as range extension. Therefore, WAICs is expected to have a large impact on the aeronautics industry, propelling a new generation of greener, more efficient, and less expensive aeronautical services. However, there are still several reliability, trust, interoperability and latency issues that need to be addressed before this technology becomes commercial. It is expected that AI will boost the applicability of this technology, contributing to the realization of the concept of “fly-by-wireless”.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Xia, Zhe, Zhen Yang, Shengwu Xiong e Ching-Fang Hsu. "Game-Based Security Proofs for Secret Sharing Schemes". In Security with Intelligent Computing and Big-data Services, 650–60. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_53.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Liu, Yan-Xiao, e Ching-Nung Yang. "Enhanced Secret Image Sharing Using POB Number System". In Security with Intelligent Computing and Big-data Services, 94–102. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Li, Long, Tianlong Gu, Liang Chang e Jingjing Li. "Efficient Computation Method of Participants’ Weights in Shamir’s Secret Sharing". In Security with Intelligent Computing and Big-data Services, 598–605. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_48.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Adams, Robyn. "A Most Secret Service: William Herle and the Circulation of Intelligence". In Diplomacy and Early Modern Culture, 63–81. London: Palgrave Macmillan UK, 2011. http://dx.doi.org/10.1057/9780230298125_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Secret Services Intelligence"

1

Miteva, Boryana. "Bulgarian scientific and technical intelligence in Japan during the Cold War". In 9th International e-Conference on Studies in Humanities and Social Sciences. Center for Open Access in Science, Belgrade - Serbia, 2023. http://dx.doi.org/10.32591/coas.e-conf.09.06055m.

Testo completo
Abstract (sommario):
Since Bulgarian-Japan relations have already been well researched by the scholar Evgeny Kandilarov, this study aims to pose an accent on a very specific aspect of their Cold War interaction. Based primary on Bulgarian declassified documents of ex-socialist secret services it attempts to supplement Cold War studies and knowledge about Sofia-Tokyo relations as a part of Japan’s relations with the Soviet Union and the East European countries as a whole. It provides analysis regarding aims, methodology, expansion, cooperation, and results of Bulgarian scientific and technical intelligence in Japan during the Cold War years. This study proposes that since Western democracies restricted access of socialist countries to high technology by COCOM and since Japan achieved unimaginable economic and technological growth in the end of 1960s, KGB and all Eastern European secret services estimated Japan as a destination with significant opportunities for scientific and technical intelligence. Bulgarian communist leader Todor Zhivkov was one of the greatest admirers of the Japanese economic model and thus, scientific, and technical intelligence became a priority line for Bulgarian residence in Japan. It was not only a countermeasure in view of COCOM restrictions but transformed into an important element of socialist strategy for modernization. Japan was not the only one of capitalist countries, which became an object of industrial espionage, but it took key place for completing important scientific and technical tasks in the field of electronics, robotics, chemical industry, equipment etc. This knowledge was more or less implemented in industry and contributed to the Bulgarian economic and technological modernization.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Taneski, Nenad, Sinisha Vitanovski e Aleksandar Petrovski. "THE PLACE AND ROLE OF THE INTELLIGENCE AND COUNTERINTELLIGENCE SERVICES". In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p28.

Testo completo
Abstract (sommario):
The security (Intelligence and Counterintelligence) services are one of the key elements for dealing with the 21st century challenges. The principle itself is directed mostly in preventive action i.e. early discovery, identifying and stopping the security threats. Intelligence is a process of collecting, processing, analyzing and distribution of intelligence data. The Intelligence i.e. the Intelligence services own the capacity for collecting information which is important for the safety and the constitutional order of the country. Counterintelligence is inverse process of the Intelligence i.e. detecting of unfriendly intelligence capacities. After the end of the Cold War, the security threats and challenges in the world changed, so according to that many countries changed their entire security system. Intelligence services are also susceptible to transformation. With the emergence of terrorism as a security threat no. 1 in the 21st century, the biggest parts of the Intelligences’ activities are directed to discovering and preventing the terrorist activities and to dissolving and destroying the terrorist organizations. The way the terrorist groups operate is similar worldwide. They are well organized, have strong propaganda machinery, hierarchy and a high degree of secrecy within the organization. They act on vital and sensitive goals in society, mostly on civilians, in order to sow fear and demonstrate power versus the regular security forces. The terrorism is not only a number 1 threat to national security, but also to international security. The need for cooperation of intelligence and counterintelligence services between the member states of NATO and the EU is extremely important for the 16 mutual exchange of intelligence information concerning the terrorist organizations and their actions. One terrorist organization does not operate locally but has cells in many countries around the world. That’s why the cooperation of the Intelligence services is so important in the process of uncovering future plans for detecting future terrorist attacks and stopping them as well as jointly dismantling terrorist organizations. The process of exchange of experiences, lessons learned and the organization of joint training and training the members of the intelligence services enables greater efficiency in the fight against terrorism. Key words: Intelligence, Counterintelligence, Intelligence Services, terrorism, terrorist organizations, security threats.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Almaghaslah, A. M. "Incorporating Human Aspect into Service Contract Procurement". In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216370-ms.

Testo completo
Abstract (sommario):
Abstract Organizations always strive to develop robust contracts to support supply chains. Depending on the size of the organizations, tens to thousands of contracts are procured to secure goods and services, including manpower. However, many disputes and penalties occur after contract awarding due to manpower qualifications not being satisfied as per contract terms and conditions (Brian, 2018). As the demand to outsource services increases, optimal safety operations require more qualified manpower. This paper introduces a new contract measure to evaluate individual safety intelligence, which represents the ability to recognize self and others safety profiles and use information and knowledge to guide thinking and behavior towards safe operations and safe working environment. Safety is always one of corporate values and is recognized as one the pillars to operational excellence models. Individuals’ safety intelligence factors can be used in contracts to assess candidates and current employees’ capabilities and interest in safety. This can help organizations which plan to outsource, to select the right staff based on their safety intelligence. Various literature reviews demonstrate the importance of human aspect to safety, but only a few shows a practical approach to measure its quality and fitness from contract administration perspective. Safety intelligence, as introduced here, can be used to guide organizations to assign qualified staff at the very early stage in a business relationship. This can optimize operations while protecting lives and assets. Contract procurement is one of the major activities that company has to perform in order to get necessary services to operations (Andrea, 2023). This paper focuses on contact procurement that includes manpower. Each organization has its own way to do the procurement but they all agree on some basic steps. Service contract procurement usually consists of 4 major steps shown in Fig. 1, namely develop service procurement plan, service procurement, contract administration, and adjust service procurement plan (Andrea, 2023).
Gli stili APA, Harvard, Vancouver, ISO e altri
4

"IOT Based Secure Data Storage System Using Cryptographic Algorithm". In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/vdgo3829/ngcesi23p69.

Testo completo
Abstract (sommario):
The cloud computing helps in numerous pathways for the web based service networks. The security of the data and the privacy constraints are the important aspects involved in the cloud computing techniques. Includes the safeguarding the sensitive data with higher precision. This is accompanied with the intelligent cryptographic algorithm to obtain secure data in the cloud system. This helps to save the data through several data processing applications accompanied with the cryptography algorithm. The cryptography algorithm are enabled to obtain encrypt data so that to have secure communication links in the networking system. This helps in the separation of data with the prescribed files in the distributed cloud networks. The operational time is secured by the classification of data in the form of data packets.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Bissoli, Andrea, e Fabrizio d'Amore. "Authentication as A Service Based on Shamir Secret Sharing". In 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC). IEEE, 2021. http://dx.doi.org/10.1109/iscsic54682.2021.00072.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Alameldin, Magdi. "Smart Predictive Maintenance Framework SPMF for Gas and Oil Industry". In International Petroleum Technology Conference. IPTC, 2022. http://dx.doi.org/10.2523/iptc-22497-ms.

Testo completo
Abstract (sommario):
Abstract The O&G industry is facing big challenges which consequently raise the necessity for reforming its traditional business model and integrating digital disruptive technologies such as Digital Twins, Artificial Intelligence and Blockchain. A Digital Twin(DT) is defined as a dynamic intelligent digital replica/model of the physical system/process/service/people which enables just-in-time informed decision making and root-cause analysis using AI. DTs are implanted at different levels such as Equipment/Asset Level Twin, System Level Twin, System of Systems (SoS) Level Twin. This research introduces a novel framework which is based on a Smart Secure Digital Twin (S2DT) to bridge the development gap compared to other leading industries such as manufacturing and automotive. The proposed model relies on Tiny Machine Learning (TinyML) to implement edge intelligence and solve the problems of transfer latency and data overload and consequently achieves low carbon footprint. Edge Intelligence (EI) reduces energy consumption and enhances security and perspective maintenance. The Blockchain Technology is used to solve the privacy, and cybersecurity problems [4]. The Extended Reality (XR) will be used to ensure proper training of operators, and industry 5.0 to boost collaboration between human and machine. At the component level, security is maintained by integrated the locally generated intelligence on a blockchain to insure immutability, and enhance security.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Sihvonen, Markus. "Hybrid intelligent logistics system for a recycling center". In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005251.

Testo completo
Abstract (sommario):
A realization of intelligent logistic system for a recycling center requires utilization of very latest information and communication technologies. Therefore, versatile technology framework and adapting data-driven solutions to optimize collection, transportation, and processing of recyclable materials is needed. The key components in building the technology framework for enabling intelligent, intelligent logistic recycling service are robust communication platform, reliable vehicle and asset tracking system and AI (Artificial Intelligent) enabled data analysis and management platform. The communication platform facilitates collaboration between stakeholders including recycling company, transportation company, waste management company and local government. Its purpose is to improve information flow and coordination between stakeholders. The vehicle and asset tracking system provides means to monitor and manage various assets and fleet of vehicles operating in the recycling area, which can be fully autonomous or driven by professional drivers. The data provided by the vehicle and asset tracking system must be acquired, analyzed and used for decision making efficiently in real time. The data analysis and management platform store all the data needed for operating intelligent logistic service of a recycling center. It utilizes existing IoT (Internet of Things) technologies and the communication platform. AI solutions are used for analyzing the collected data for further use to provide services for the users of the system. The research question is to how to design Hybrid Intelligent (HI) logistic system for recycling center in MORE industrial park that enables 24/7 autonomous recycling service for companies? The recycling center’s autonomous service is aimed for companies that have need to store larger quantities of various materials for recycling and further use in future. The key requirements from a client’s point of view are 24/7 access to recycling area, safe and secure material storage facility and efficient operations in recycling area. Safety, security and reliability of services in recycling center are particularly important when the center’s operating personnel are not present and available. This is also primary concern for the recycling center operator. The asset and vehicle tracking system must monitor and manage all vehicles in the recycling area regardless who is driving it, human or AI. Therefore, the system must consider human input and learn to manage autonomous traffic to provide support for human activities in the recycling area. The paper proposes a design solution for a smart autonomous recycling service that utilize HI logistic system.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Dewangan, Kheelesh Kumar, Vibek Panda, Sunil Ojha, Anjali Shahapure e Shweta Rajesh Jahagirdar. "Cyber Threats and Its Mitigation to Intelligent Transportation System". In Symposium on International Automotive Technology. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2024. http://dx.doi.org/10.4271/2024-26-0184.

Testo completo
Abstract (sommario):
<div class="section abstract"><div class="htmlview paragraph">With the revolutionary advancements in modern transportation, offering advanced connectivity, automation, and data-driven decision-making has put the intelligent transportation systems (ITS) to a high risk from being exposed to cyber threats. Development of modern transportation infrastructure, connected vehicle technology and its dependency over the cloud with an aim to enhance safety, efficiency, reliability and sustainability of ITS comes with a lot more opportunities to protect the system from black hats. This paper explores the landscape of cyber threats targeting ITS, focusing on their potential impacts, vulnerabilities, and mitigation strategies. The cyber-attacks in ITS are not just limited to Unauthorized Access, Malware and Ransomware Attacks, Data Breaches, Denial of Service but also to Physical Infrastructure Attacks. These attacks may result in potentially disrupting critical transportation infrastructure, compromise user safety, and can cause economic losses effecting the various services such as vehicle tracking and monitoring, communication systems, traffic management, driver assistance systems, fuel management, maintenance and diagnostics, data analytics and reporting. The article also focus on innovative approaches that have recently adopted my many cybersecurity professionals for secured operation of ITS involving block-chain, artificial intelligence, and Machine Learning. The development of 5G technology boosts these innovative approaches enabling high-reliability ensuring continuous high speed connectivity and low-latency for real time communications and security for the ITS and also promotes secured V2X communication. This article discusses the various practices adopted for security of ITS and also reviews the upcoming new technology and there approach for practical implementation in field. By understanding the various cyber threats targeting ITS and implementing appropriate safeguards, stakeholders can enhance the resilience and security of these systems, ensuring safe and efficient transportation in the digital age.</div></div>
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Adamson, Göran, Lihui Wang e Magnus Holm. "The State of the Art of Cloud Manufacturing and Future Trends". In ASME 2013 International Manufacturing Science and Engineering Conference collocated with the 41st North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/msec2013-1123.

Testo completo
Abstract (sommario):
Cloud manufacturing has emerged as a new manufacturing paradigm, which combines technologies (such as Internet of Things, Cloud computing, semantic Web, virtualisation and service-oriented technologies) with advanced manufacturing models, information and communication technologies. It aims to be networked, intelligent, service-oriented, knowledge-based and energy efficient, and promises a variety of benefits and advantages by providing fast, reliable and secure on-demand services for users. It is envisioned that companies in all sectors of manufacturing will be able to package their resources and know-hows in the Cloud, making them conveniently available for others through pay-as-you-go, which is also timely and economically attractive. Resources, e.g. manufacturing software tools, applications, knowledge and fabrication capabilities, will then be made accessible to presumptive consumers on a worldwide basis. After surveying a vast array of available publications, this paper presents an up-to-date literature review together with future trends and research directions in Cloud manufacturing.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Placinta, Dimitriedaniel. "THE IMPACT OF AI/MACHINE LEARNING IN EDUCATION". In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-004.

Testo completo
Abstract (sommario):
5G, cloud computing, quantum computing, machine learning, blockchain, artificial intelligence, all are high technologies that change the way we are living, working into multiconnected world: social networks, intelligent houses, autonomous cars, fintech, remote health, instant communication, etc. An essential aspect for the above disrupted technologies is generated by cybersecurity, by the relationship between national security and the implementation at large scale of 5G. The 5G technology became the number one threat for USA, NATO, and European Union. Europe became the playground where the winner between Huawei and its competitors for 5G adoption will be decided. Quantum computing will dramatically change the entire cybersecurity in the next years due to its power and speed in decrypting the today's strongest cryptographic algorithms, intelligence services, large organizations, the entire world will benefit from the advantages of the new revolutionary technology, for sure new cryptographic algorithms will be implemented to secure our data. Blockchain features increased the level of cybersecurity for a lot of activities like cryptocurrencies, money transfer, data tracking, securing of large amount of data for companies or governments, protecting highly sensitive information from the military field, defending against external cyber threats, ensuring the data integrity of IoT devices, etc. Artificial intelligence it's a weapon with two blades, both cybercriminals and "white hats" are fructifying the capabilities of this technology: avoid the identification of attacks, launch automatic attacks, build undetectable content to pass the security filters, biometric authentication, predict future cyber-attacks, identify abnormal behaviors, fraud detection, mistake free cybersecurity, etc. The paper will synthetize and present the latest research from the cybersecurity field: the new cyber threats for international security, how can we fight against cyber threats at national, European and international level, what are the most dangerous international key players of cybercrime world, what is the financial impact of cybercrime, why classic war has moved into the cyberspace, why is GDPR important from the cybersecurity perspective. The continuous evolution of technologies will generate new exponential challenges related to secure communication between multiple software integrations, data privacy, right of intimacy, encryption of information, for users, companies, governments, international regulation bodies, non-government organizations, as a consequence of the huge number of connected devices and people.
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Secret Services Intelligence"

1

Payment Systems Report - June of 2020. Banco de la República de Colombia, febbraio 2021. http://dx.doi.org/10.32468/rept-sist-pag.eng.2020.

Testo completo
Abstract (sommario):
With its annual Payment Systems Report, Banco de la República offers a complete overview of the infrastructure of Colombia’s financial market. Each edition of the report has four objectives: 1) to publicize a consolidated account of how the figures for payment infrastructures have evolved with respect to both financial assets and goods and services; 2) to summarize the issues that are being debated internationally and are of interest to the industry that provides payment clearing and settlement services; 3) to offer the public an explanation of the ideas and concepts behind retail-value payment processes and the trends in retail payments within the circuit of individuals and companies; and 4) to familiarize the public, the industry, and all other financial authorities with the methodological progress that has been achieved through applied research to analyze the stability of payment systems. This edition introduces changes that have been made in the structure of the report, which are intended to make it easier and more enjoyable to read. The initial sections in this edition, which is the eleventh, contain an analysis of the statistics on the evolution and performance of financial market infrastructures. These are understood as multilateral systems wherein the participating entities clear, settle and register payments, securities, derivatives and other financial assets. The large-value payment system (CUD) saw less momentum in 2019 than it did the year before, mainly because of a decline in the amount of secondary market operations for government bonds, both in cash and sell/buy-backs, which was offset by an increase in operations with collective investment funds (CIFs) and Banco de la República’s operations to increase the money supply (repos). Consequently, the Central Securities Depository (DCV) registered less activity, due to fewer negotiations on the secondary market for public debt. This trend was also observed in the private debt market, as evidenced by the decline in the average amounts cleared and settled through the Central Securities Depository of Colombia (Deceval) and in the value of operations with financial derivatives cleared and settled through the Central Counterparty of Colombia (CRCC). Section three offers a comprehensive look at the market for retail-value payments; that is, transactions made by individuals and companies. During 2019, electronic transfers increased, and payments made with debit and credit cards continued to trend upward. In contrast, payments by check continued to decline, although the average daily value was almost four times the value of debit and credit card purchases. The same section contains the results of the fourth survey on how the use of retail-value payment instruments (for usual payments) is perceived. Conducted at the end of 2019, the main purpose of the survey was to identify the availability of these payment instruments, the public’s preferences for them, and their acceptance by merchants. It is worth noting that cash continues to be the instrument most used by the population for usual monthly payments (88.1% with respect to the number of payments and 87.4% in value). However, its use in terms of value has declined, having registered 89.6% in the 2017 survey. In turn, the level of acceptance by merchants of payment instruments other than cash is 14.1% for debit cards, 13.4% for credit cards, 8.2% for electronic transfers of funds and 1.8% for checks. The main reason for the use of cash is the absence of point-of-sale terminals at commercial establishments. Considering that the retail-payment market worldwide is influenced by constant innovation in payment services, by the modernization of clearing and settlement systems, and by the efforts of regulators to redefine the payment industry for the future, these trends are addressed in the fourth section of the report. There is an account of how innovations in technology-based financial payment services have developed, and it shows that while this topic is not new, it has evolved, particularly in terms of origin and vocation. One of the boxes that accompanies the fourth section deals with certain payment aspects of open banking and international experience in that regard, which has given the customers of a financial entity sovereignty over their data, allowing them, under transparent and secure conditions, to authorize a third party, other than their financial entity, to request information on their accounts with financial entities, thus enabling the third party to offer various financial services or initiate payments. Innovation also has sparked interest among international organizations, central banks, and research groups concerning the creation of digital currencies. Accordingly, the last box deals with the recent international debate on issuance of central bank digital currencies. In terms of the methodological progress that has been made, it is important to underscore the work that has been done on the role of central counterparties (CCPs) in mitigating liquidity and counterparty risk. The fifth section of the report offers an explanation of a document in which the work of CCPs in financial markets is analyzed and corroborated through an exercise that was built around the Central Counterparty of Colombia (CRCC) in the Colombian market for non-delivery peso-dollar forward exchange transactions, using the methodology of network topology. The results provide empirical support for the different theoretical models developed to study the effect of CCPs on financial markets. Finally, the results of research using artificial intelligence with information from the large-value payment system are presented. Based on the payments made among financial institutions in the large-value payment system, a methodology is used to compare different payment networks, as well as to determine which ones can be considered abnormal. The methodology shows signs that indicate when a network moves away from its historical trend, so it can be studied and monitored. A methodology similar to the one applied to classify images is used to make this comparison, the idea being to extract the main characteristics of the networks and use them as a parameter for comparison. Juan José Echavarría Governor
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia