Showing 1 - 20 results of 84 for search 'Preventive Security Force', query time: 0.10s Refine Results
  1. 1

    The UN Security Council and prevention of displacement by Weerasinghe, S, Ferris, E

    Published 2012
    “…Respecting the prohibitions against forced and arbitrary displacement could significantly reduce the risk of, or prevent, displacement in situations of armed conflict, as could insisting on accountability for violations of these prohibitions that amount to war crimes or crimes against humanity. …”
    Journal article
  2. 2
  3. 3
  4. 4
  5. 5

    Physical security analysis and simulation of the multi-layer security system for the Offshore Nuclear Plant (ONP) by Conway, Jared Thomas., Buongiorno, Jacopo, Golay, Michael W

    Published 2020
    “…This paper updates the security strategy in the earlier 2016 paper (ICONE24-61029, Charlotte, NC, Kindfuller et. al.) with the following significant additions: a modification of the plant design for security optimization, changes in the guard force based on simulations, placement of the protective barrier to prevent damage from ship explosions, and establishment of the shore station guard force, response team and key facilities. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Partners in national cyber security strategy? : An analysis of cyber security strategies of Ministry of Defence and police in UK by Onugha, Chikaodi Viola

    Published 2018
    “…Questionnaires and telephone interviews were used to gather information on personnel understanding of cyber security strategy and the nature of the partnership that exists between the two forces – military and police. …”
    Get full text
    Thesis
  9. 9
  10. 10

    Cost Estimation Model for Secure Software Development by Sia Abdullah, Nur Atiqah

    Published 2011
    “…Most of the commerce websites are forced to add on security coding to prevent them from web criminal. …”
    Get full text
    Thesis
  11. 11
  12. 12

    The Routledge International Handbook of Universities, Security and Intelligence Studies

    Published 2019
    “…<br/>In an era of intensified international terror, universities have been increasingly drawn into an arena of locating, monitoring and preventing such threats, forcing them into often covert relationships with the security and intelligence agencies. …”
    Book
  13. 13

    Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization by Salamatian, Salman, Huleihel, Wasim, Beirami, Ahmad, Cohen, Asaf, Medard, Muriel

    Published 2021
    “…While some solutions exist to prevent online brute-force attacks that arise from one single IP address, attacks performed by botnets are more challenging. …”
    Get full text
    Article
  14. 14

    The extent and implications of women's forced migration journeys to escape domestic violence by Bowstead, Janet

    Published 2013
    “…Whilst policy makers and practitioners focus on what works in particular local areas to tackle and prevent domestic violence against women, many individual women (often with their children) move away from their local area, either temporarily or permanently. …”
    Get full text
    Thesis
  15. 15
  16. 16

    Security Enhancement of Route Optimization in Mobile IPv6 Networks by Zare Anari, Abbas Mehdizadeh

    Published 2008
    “…Several methods were proposed to secure route optimization. Return routability was adopted by Internet Engineering Task Force (IETF) with its security protocol based on RFC 3775. …”
    Get full text
    Thesis
  17. 17

    Efficient and secure mobility support in 6LoWPAN networks by Qiu, Yue

    Published 2017
    “…The formal verification by the verification tools and the performance evaluation results show that the proposed security schemes for 6LoWPAN networks could not only enhance the security functionalities with the ability to prevent various malicious attacks but also be computationally efficient.…”
    Get full text
    Thesis
  18. 18

    A review on structured scheme representation on data security application by Mohd Salleh, Siti Norussaadah, Din, Roshidi, Zakaria, Nur Haryani, Mustapha, Aida

    Published 2018
    “…Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. …”
    Get full text
    Article
  19. 19

    ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications by Shams Ul Arfeen Laghari, Selvakumar Manickam, Ayman Khallel Al-ani, Mahmood a. Al-shareeda, Shankar Karuppayah

    Published 2023
    “…Industry 4.0, as a driving force, is making massive achievements, notably in the manufacturing sector, where all key components engaged in the production processes are being digitally interconnected. …”
    Get full text
    Get full text
    Article
  20. 20