Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








678 Hits in 6.5 sec

Limiting Institutions? The Challenge of Eurasian Security Governance

Radek Khol
2005 Journal of International Relations and Development  
What are the content of the new security agenda, the nature of the security dilemmas facing the Eurasian states, and the opportunities for externalising regional conflicts?  ...  Yet for states to have any chance of maintaining their pre-eminence in the international system and defeating new security threats from organised crime and terrorist networks, they have to fight smart  ...  security, 127-9 see also subregional institutions international law, 36, 108, 240 Iraq, 70, 78, 114, 240 Islam and Islamism, 4, 33, 36, 108, 126, 129, 237 Islamic Confederation Organisation, 36 Islamic  ... 
doi:10.1057/palgrave.jird.1800040 fatcat:o4petnnaw5dkjh5zgeb2wfyr7e

MMT: Exploiting fine-grained parallelism in dynamic memory management

Devesh Tiwari, Sanghoon Lee, James Tuck, Yan Solihin
2010 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)  
For PHKmalloc with security checks turned on, MMT reduces the security check overheads from 21% to only 1% on average.  ...  On average, MMT achieves a speedup ratio of 1.19× for both allocators, while both the application and memory management libraries are unmodified and are oblivious to the parallelization scheme.  ...  However, the security checks have been shown to be highly useful in both identifying both bugs and detecting attacks [18] , [28] .  ... 
doi:10.1109/ipdps.2010.5470428 dblp:conf/ipps/TiwariLTS10 fatcat:kmwypfllbff3vbfxc3yljtinwy

Social Security: History and Politics from the New Deal. By Daniel Béland (Lawrence, University Press of Kansas, 2005) 255 pp. $29.95

Michael B. Katz
2007 Journal of Interdisciplinary History  
Vansina views the Njila of the ªrst millennium c.e. as comprising a low-density scattering of communities, in which earlier indigenous foragers were still the primary occupants of a large proportion of  ...  It is hard to imagine that anyone could mine such a rich cache of material in any other maritime community.  ...  The actual ªghting was the work of numerous and scattered bands.  ... 
doi:10.1162/jinh.2007.37.3.480 fatcat:gns2gwkx5bdvndqwekg6zzzp3q

Flexible Hardware-based Security-aware Mechanisms and Architectures

Ghada Dessouky
2023
These attacks have undeniably revealed the grave consequences of hardware/microarchitecture security flaws to the entire platform security, and how they can even subvert the security guarantees promised  ...  This has been further leveraged in developing hardware-based dedicated security extensions and architectures to protect software from attacks exploiting software vulnerabilities such as memory corruption  ...  Research Institute for Secure Computing (ICRI-SC).  ... 
doi:10.26083/tuprints-00023042 fatcat:ua4kvfc4endv5bhd4wglhzplue

Special Issue: Advances in Secure Data Streaming Systems

Fatos Xhafa, Jin Li, Vladi Kolici, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Juan Carlos, Augusto, Argentina, Vladimir Batagelj (+18 others)
2015 unpublished
Acknowledgment The authors thank the anonymous reviewers for helpful comments and suggestions. This work was funded in part by the U.S. Army under grant #W911NF-11-1-0124.  ...  However, it is only proved to be semantically secure against chosen-plaintext attack (IND-CPA).  ...  In our solution, we split the storage structure of the basic element of index cache into sets of delta cells divided by column.  ... 
fatcat:vvmbxyvcyfccfi3wnl6q2kkfka

Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey

Ramasamy Lakshmana Kumar, Firoz Khan, Agbotiname Lucky Imoize, Joshua O. Ogbebor, Seifedine Kadry, SeungMin Rho
2021 IEEE Access  
The Sensor-MAC periodic hearing and rest protocol is proposed to defeat this issue.  ...  Thus, security is critical in commercial and military applications to prevent malicious attacks like unauthorized access and denial of service DoS attacks.  ... 
doi:10.1109/access.2021.3111923 fatcat:4whrxb53cfe6lk7wbykmno2moa

Special Issue: Multimedia Information System Security

Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina (+29 others)
2009 unpublished
Acknowledgement This work was supported by the Slovenian Research Agency (ARRS), development project M2-0210 (C) entitled "AvID: Audiovisual speaker identification and emotion detection for secure communications  ...  Acknowledgements This work was partially supported by the SAPIR project 6 , funded by the European Commission under IST FP6 (Contract no. 45128) and by the Ministero Italiano per l'Università e la Ricerca  ...  Just disabling and rendering it useless will defeat the very purpose of steganography.  ... 
fatcat:ekua3zeo5rfnvcycdaxfmhjihq

Baltic Security and Defence Review

Harold Raugh, Jürgen Foerster, Col Ehlers
2011 Baltic Security and Defence Review   unpublished
period of occupation.  ...  At that time the sector of interior security, public order and policy was split among such actors and institutions as follows: -Latvian state police with its own cooperation "Safety Guards" (apvienība  ... 
fatcat:4yd7shhptfa2nhifukntgdrz74

America and guerrilla warfare

2001 ChoiceReviews  
America and guerrilla warfare / Anthony James Joes. p. cm. Includes bibliographical references and index.  ...  If defeated, they scattered, took refuge in the swamps and forests, only to reassemble and carry on the fight as occasion served.  ...  Constant American patrolling kept the guerrillas on the move and uncovered many food caches.  ... 
doi:10.5860/choice.38-4601 fatcat:xhc4q6s4ybhc5fjvtq2d55hk6m

CRM support for creating IT security awareness with electronic banking customers

Nino Gelashvili
2017 unpublished
The most common eBanking security threats for last five years have been the attacks that target directly the customers and their computers.  ...  Furthermore, a Security Awareness tool is created for raising and maintaining the high level of IT security awareness among the customers.  ...  use and handling cache and cookies.  ... 
doi:10.25365/thesis.50465 fatcat:hkglfi5clnctvg35ea5bvjllru

Cold War Lithuania: National Armed Resistance and Soviet Counterinsurgency

George Reklaitis
2007 The Carl Beck Papers in Russian and East European Studies  
Following the defeat of Nazi Germany, the Soviet Union sought to reestablish its control over the areas of Eastern Europe that it had occupied prior to the RussoGerman war.  ...  These areas included Western Ukraine, Byelorussia, and the Baltic States of Lithuanian, Latvia, and Estonia.2 In these regions, the Soviets found wellorganized underground resistance movements that were  ...  During the first Soviet occupation of Lithuania, from 1940 to 1941, the Soviets introduced several of the pacification policies that they would use again, after the defeat of Germany.  ... 
doi:10.5195/cbp.2007.135 fatcat:moh6xtouz5g23hwjbfg653kyka

CONFIGURATION MODELING AND DIAGNOSIS IN DATA CENTERS

Sanjeev Sondur
2020 Figshare  
The disk cache is split into three distinct partitions: data storage buffer db, metadata md and log space ls. (Section 3.3.3 & Table 3 3 .1: Subset of Feature Vector Supporting the Problem.  ...  Though, at present, OpenConfig models For example, oper-data like CPU occupancy and throughput can describe the performance HI.  ... 
doi:10.6084/m9.figshare.12616301 fatcat:hetr7siwh5bznm3s7z3m3o7rse

Access denied: the practice and policy of global Internet filtering

2008 ChoiceReviews  
the Caliphate and that remains banned in many countries.  ...  Though most foreign news sites were accessible, Web sites of some important Arabic newspapers and news portals were found to be blocked.  ...  The attacks did end shortly after the elections, as it was clear that the opposition was defeated and its street protest would not prevail.  ... 
doi:10.5860/choice.45-6833 fatcat:qhuziwkinrdtldsaylvbmumopu

Country Reports on Terrorism

2007 ChoiceReviews  
the data needed, and completing and reviewing the collection of information.  ...  Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  In March 2000, the group claimed credit for a rifle grenade attack against the Department of Energy  ... 
doi:10.5860/choice.44-4105 fatcat:o5bjzfekrbghbgaxgyq2vjgvby

Sagwitch: Shoshone chieftain, Mormon elder, 1822-1887

2000 ChoiceReviews  
The Deseret News noted on September 5 that Smithfield's residents had dragged their houses into a makeshift fort "so that they will be more secure from attack than in their former scattered condition."  ...  Valley as herding ground, 24; emigrant train attacked near, 30; Pine threatens to drive Cache cattle to, 34; Shoshone plan to attack Cache settlements, 69; Shoshone-Bannock Reservation established at,  ... 
doi:10.5860/choice.38-1129 fatcat:7hxsmpst2bgbrh3czdgrdmh4nm
« Previous Showing results 1 — 15 out of 678 results