Artigos de revistas sobre o tema "Defence and security contracts"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Defence and security contracts".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Heuninckx, Baudouin. "Defence procurement: The most effective way to grant illegal State Aid and get away with it... or is it?" Common Market Law Review 46, Issue 1 (2009): 191–211. http://dx.doi.org/10.54648/cola2009007.
Texto completo da fonteZervos, Vasilis. "European Policies and the Space Industry Value Chain (Note 1)." Journal of Economics and Public Finance 4, no. 1 (2018): 101. http://dx.doi.org/10.22158/jepf.v4n1p101.
Texto completo da fonteChernysheva, Galina N., Nikolay V. Rogov, and Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders." Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, no. 3 (September 30, 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.
Texto completo da fonteHasnaoui, Inas, Maria Zrikem, and Rajaa Elassali. "Block-AD: Blockchain Attack-Defense CTF Competition for Next-Web3 Security." International Journal of Computer Science, Engineering and Information Technology 13, no. 5 (2023): 30–37. http://dx.doi.org/10.5121/ijcseit.2023.13503.
Texto completo da fonteSarkawi, Azizi Ahmad, Mohamad Ghozali Hassan, and Mustakim Melan. "THE SIGNIFICANCE OF LEADERSHIP SUPPORT TOWARDS EFFECTIVE CONTRACT MANAGEMENT." Journal of Technology and Operations Management 18, no. 2 (2023): 1–8. http://dx.doi.org/10.32890/jtom2023.18.2.1.
Texto completo da fonteNovruzova, Oksana B., Ilya A. Klevtsov, and Elizaveta R. Shikova. "Methods and Conditions of Conclusion of State Contracts." Court administrator 1 (February 8, 2024): 12–15. http://dx.doi.org/10.18572/2072-3636-2024-1-12-15.
Texto completo da fonteDerrick Lim Kin Yeap, Jason Jong Sheng Tat, Jason Ng Yong Xing, Joan Sia Yuk Ting, Mildred Lim Pei Chin, and Muhammad Faisa. "Securing Industrial IoT: Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency." International Journal of Computer Technology and Science 1, no. 3 (2024): 01–19. http://dx.doi.org/10.62951/ijcts.v1i3.18.
Texto completo da fonteMateaş, Florian. "GENERAL CHARACTERIZATION OF SECURITY SYSTEMS FOR OBJECTIVES, GOODS, VALUABLES AND PROTECTION OF INDIVIDUALS." Agora International Journal of Juridical Sciences 9, no. 3 (2015): 21–28. http://dx.doi.org/10.15837/aijjs.v9i3.2113.
Texto completo da fonteAhmad Sarkawi, Azizi, Mohamad Ghozali Hassan, and Mustakim Melan. "Navigating Contract Compliance in Maritime Procurement for National Security: A Study on the Ministry of Defense." Compendium by PaperASIA 39, no. 5(b) (2023): 34–39. http://dx.doi.org/10.59953/cpa.v39i5(b).33.
Texto completo da fonteKim, Yong Woon, and Trevor Brown. "Autonomy versus control in procurement and contracting: the use of cost-reimbursement contracts in three US federal departments." International Review of Administrative Sciences 83, no. 1_suppl (2016): 41–58. http://dx.doi.org/10.1177/0020852315619477.
Texto completo da fonteIrenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel, and Muhammad Faisal. "Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability." International Journal of Computer Technology and Science 1, no. 3 (2024): 41–55. http://dx.doi.org/10.62951/ijcts.v1i3.24.
Texto completo da fonteSetia, Prashant, and Sandosh S. "Enhancing Cybersecurity Defense of IoT Ecosystem Using Blockchain." Suranaree Journal of Science and Technology 30, no. 4 (2023): 010238(1–14). http://dx.doi.org/10.55766/sujst-2023-04-e01071.
Texto completo da fontePrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.
Texto completo da fonteBelova, Iryna, Andrii Homotiuk, and Oleksiy Yaroshchuk. "Digital transformation of administrative and business processes in Ukraine during marital state." Economic Analysis, no. 34(1) (2024): 42–52. http://dx.doi.org/10.35774/econa2024.01.042.
Texto completo da fonteRuggieri, Lynn. "Michael Bianco Inc. Immigrant Workers To Save Costs." Journal of Business Case Studies (JBCS) 7, no. 4 (2011): 91–104. http://dx.doi.org/10.19030/jbcs.v7i4.4687.
Texto completo da fonteAzreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya, and Muhammad Faisal. "Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme." International Journal of Computer Technology and Science 1, no. 3 (2024): 20–40. http://dx.doi.org/10.62951/ijcts.v1i3.19.
Texto completo da fonteKrichen, Moez. "Strengthening the Security of Smart Contracts through the Power of Artificial Intelligence." Computers 12, no. 5 (2023): 107. http://dx.doi.org/10.3390/computers12050107.
Texto completo da fonteSeetharam kakaraparthi, Durganjaneyulu immadisetty, and Maranco M. "Enhanced honeypot security for intrusion detection and prevention systems using blockchain." World Journal of Advanced Research and Reviews 22, no. 1 (2024): 751–58. http://dx.doi.org/10.30574/wjarr.2024.22.1.1065.
Texto completo da fonteBayani, Samir Vinayak, Sanjeev Prakash, and Lavanya Shanmugam. "Data Guardianship: Safeguarding Compliance in AI/ML Cloud Ecosystems." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 436–56. http://dx.doi.org/10.60087/jklst.vol2.n3.p456.
Texto completo da fonteYachna, I., O. Kuvshynova, D. Shabanov, Ye Porуnos, and M. Kostashchuk. "BLOCKCHAIN AND ITS APPLICATION IN THE DEFENCE SECTOR." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки 20, no. 3 (2024): 139–45. http://dx.doi.org/10.37701/dndivsovt.21.2024.17.
Texto completo da fonteKostopoulos, Nikos, Yannis C. Stamatiou, Constantinos Halkiopoulos, and Hera Antonopoulou. "Blockchain Applications in the Military Domain: A Systematic Review." Technologies 13, no. 1 (2025): 23. https://doi.org/10.3390/technologies13010023.
Texto completo da fonteRautio, Samu, Timo Tuomi, and Jan Akmal. "Legal Aspects of Additive Manufacturing in the Military Logistics." Security Dimensions 40, no. 40 (2022): 154–95. http://dx.doi.org/10.5604/01.3001.0015.8153.
Texto completo da fonteRomas, Maria. "Procedure for Concluding Civil Law Contracts with the Participation of the State of Ukraine under Martial Law." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi 2, no. 15(27) (2023): 187–94. http://dx.doi.org/10.33098/2078-6670.2023.15.27.2.187-194.
Texto completo da fonteChen, Yongle, Xiaojian Wang, Yuli Yang, and Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract." Sensors 20, no. 4 (2020): 1062. http://dx.doi.org/10.3390/s20041062.
Texto completo da fonteWyszomirska, Monika. "Tax and Legal Issues Related to the Implementation of Research and Development Projects in the Area of "Security and Defense"." Safety & Fire Technology 58, no. 2 (2021): 22–36. http://dx.doi.org/10.12845/sft.58.2.2021.2.
Texto completo da fonteTerpstra, J. "Particuliere beveiligers als publieke handhavers." Justitiële verkenningen 38, no. 8 (2012): 35–50. https://doi.org/10.5553/jv/016758502012038008004.
Texto completo da fonteSoroka, Larysa, Anna Danylenko, Maksym Sokiran, Diana Levchenko, and Oksana Zubko. "Public-private collaboration for national security: challenges and opportunities." Revista Amazonia Investiga 12, no. 70 (2023): 43–50. http://dx.doi.org/10.34069/ai/2023.70.10.4.
Texto completo da fontePapanikolaou, Alexandros, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, and Konstantinos Rantos. "A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection." Electronics 12, no. 6 (2023): 1484. http://dx.doi.org/10.3390/electronics12061484.
Texto completo da fonteXu, Ziqiang, Ahmad Salehi Shahraki, and Carsten Rudolph. "Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids." Smart Cities 6, no. 5 (2023): 3005–31. http://dx.doi.org/10.3390/smartcities6050135.
Texto completo da fonteGhosh, Samadrita. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 303–22. http://dx.doi.org/10.60087/jaigs.v3i1.122.
Texto completo da fonteRana, Sohel. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 161–78. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p178.
Texto completo da fonteAdegbite, Olusola Babatunde. "War Profiteering and Armed Conflicts: Examining Applicable Aspects of International Law." Groningen Journal of International Law 10, no. 1 (2023): 21–42. http://dx.doi.org/10.21827/grojil.10.1.21-42.
Texto completo da fonteYasa, Abdul Rahman. "From Security Sector Reform to Endemic Corruption: The Case of Afghanistan." Journal of Strategic Security 13, no. 3 (2020): 99–119. http://dx.doi.org/10.5038/1944-0472.13.3.1755.
Texto completo da fontePinheiro, Alexandre, Edna Dias Canedo, Robson de Oliveira Albuquerque, and Rafael Timóteo de Sousa Júnior. "Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts." Sensors 21, no. 13 (2021): 4440. http://dx.doi.org/10.3390/s21134440.
Texto completo da fonteSilva, Mário Herbert Souza da, and Prof Me Dênis Márcio Jesus Oliveira. "Responsabilidade Civil por vício oculto na venda de veículos usados." RCMOS - Revista Científica Multidisciplinar O Saber 3, no. 1 (2024): 1–8. http://dx.doi.org/10.51473/ed.al.v3i1.516.
Texto completo da fonteWitanto, Elizabeth Nathania, Yustus Eko Oktian, and Sang-Gon Lee. "Toward Data Integrity Architecture for Cloud-Based AI Systems." Symmetry 14, no. 2 (2022): 273. http://dx.doi.org/10.3390/sym14020273.
Texto completo da fontevan Meegdenburg, Hilde. "‘We don’t do that’: A constructivist perspective on the use and non-use of private military contractors by Denmark." Cooperation and Conflict 54, no. 1 (2018): 25–43. http://dx.doi.org/10.1177/0010836718765901.
Texto completo da fonteADEYINKA, Tajudeen Yusuf, Musediq Olufemi LAWAL, Olawale Olufemi AKINRINDE, and Remi Kasali ALATIS. "Nigeria’s Development Trajectory, Security Conundrum and the State-Citizens Relations." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (2024): 194–211. http://dx.doi.org/10.53477/2284-9378-24-13.
Texto completo da fonteGACEK, Józef, Bronisław MARCINIAK, and Ryszard WOŹNIAK. "Major Conditions of Shooting Range Operation in Poland." Problems of Mechatronics Armament Aviation Safety Engineering 9, no. 3 (2018): 89–104. http://dx.doi.org/10.5604/01.3001.0012.2741.
Texto completo da fonteHum, Derek. "Tenure, Faculty Contracts and Bargaining Conflict." Canadian Journal of Higher Education 28, no. 3 (2017): 47–70. http://dx.doi.org/10.47678/cjhe.v28i3.183320.
Texto completo da fonteVladu, Mircea, and Stelian Popescu. "Considerations on the Impact of Emerging and Disruptive Technologies on Security Policies." Scientific Bulletin 26, no. 2 (2021): 211–16. http://dx.doi.org/10.2478/bsaft-2021-0026.
Texto completo da fonteKobroń-Gąsiorowska, Łucja. "The employee and their social security in flexible forms of employment on the example of Poland – selected issues. Part I." Kwartalnik Prawa Międzynarodowego IV, no. IV (2024): 187–206. http://dx.doi.org/10.5604/01.3001.0054.4285.
Texto completo da fontePolychronaki, Maria, Dimitrios G. Kogias, Helen C. Leligkou, and Panagiotis A. Karkazis. "Blockchain Technology for Access and Authorization Management in the Internet of Things." Electronics 12, no. 22 (2023): 4606. http://dx.doi.org/10.3390/electronics12224606.
Texto completo da fonteFleming, Courtney, Mark Reith, and Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.
Texto completo da fonteSlepak, Vitaly Yu. "Legal Regulation of Financing of Scientific Studies by Means of Awarding State Contracts in the Area of Security and Defense." Jurist 8 (July 29, 2020): 2–9. http://dx.doi.org/10.18572/1812-3929-2020-8-2-9.
Texto completo da fonteTiverios, Nicholas. "A Uniform Hermeneutic Thesis." University of Queensland Law Journal 40, no. 2 (2021): 181–214. http://dx.doi.org/10.38127/uqlj.v40i2.5483.
Texto completo da fonteZhang, Ying. "Increasing Cyber Defense in the Music Education Sector Using Blockchain Zero-Knowledge Proof Identification." Computational Intelligence and Neuroscience 2022 (June 28, 2022): 1–7. http://dx.doi.org/10.1155/2022/9922167.
Texto completo da fonteManin, Iaroslav. "Defense of the Fatherland: Conscription for Military Service on Mobilization." Полицейская и следственная деятельность, no. 3 (March 2022): 42–63. http://dx.doi.org/10.25136/2409-7810.2022.3.38878.
Texto completo da fonteMa, Xingbang, Dongsheng Yu, Yanhui Du, Lanting Li, Wenkai Ni, and Haibin Lv. "A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence." Electronics 12, no. 11 (2023): 2454. http://dx.doi.org/10.3390/electronics12112454.
Texto completo da fonteVarney, Eliza. "Redefining contractual capacity? the UN Convention on the Rights of Persons with Disabilities and the incapacity defence in English contract law." Legal Studies 37, no. 3 (2017): 493–519. http://dx.doi.org/10.1111/lest.12166.
Texto completo da fonte