A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Limiting Institutions? The Challenge of Eurasian Security Governance
2005
Journal of International Relations and Development
What are the content of the new security agenda, the nature of the security dilemmas facing the Eurasian states, and the opportunities for externalising regional conflicts? ...
Yet for states to have any chance of maintaining their pre-eminence in the international system and defeating new security threats from organised crime and terrorist networks, they have to fight smart ...
security, 127-9 see also subregional institutions international law, 36, 108, 240 Iraq, 70, 78, 114, 240 Islam and Islamism, 4, 33, 36, 108, 126, 129, 237 Islamic Confederation Organisation, 36 Islamic ...
doi:10.1057/palgrave.jird.1800040
fatcat:o4petnnaw5dkjh5zgeb2wfyr7e
MMT: Exploiting fine-grained parallelism in dynamic memory management
2010
2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
For PHKmalloc with security checks turned on, MMT reduces the security check overheads from 21% to only 1% on average. ...
On average, MMT achieves a speedup ratio of 1.19× for both allocators, while both the application and memory management libraries are unmodified and are oblivious to the parallelization scheme. ...
However, the security checks have been shown to be highly useful in both identifying both bugs and detecting attacks [18] , [28] . ...
doi:10.1109/ipdps.2010.5470428
dblp:conf/ipps/TiwariLTS10
fatcat:kmwypfllbff3vbfxc3yljtinwy
Social Security: History and Politics from the New Deal. By Daniel Béland (Lawrence, University Press of Kansas, 2005) 255 pp. $29.95
2007
Journal of Interdisciplinary History
Vansina views the Njila of the ªrst millennium c.e. as comprising a low-density scattering of communities, in which earlier indigenous foragers were still the primary occupants of a large proportion of ...
It is hard to imagine that anyone could mine such a rich cache of material in any other maritime community. ...
The actual ªghting was the work of numerous and scattered bands. ...
doi:10.1162/jinh.2007.37.3.480
fatcat:gns2gwkx5bdvndqwekg6zzzp3q
Flexible Hardware-based Security-aware Mechanisms and Architectures
2023
These attacks have undeniably revealed the grave consequences of hardware/microarchitecture security flaws to the entire platform security, and how they can even subvert the security guarantees promised ...
This has been further leveraged in developing hardware-based dedicated security extensions and architectures to protect software from attacks exploiting software vulnerabilities such as memory corruption ...
Research Institute for Secure Computing (ICRI-SC). ...
doi:10.26083/tuprints-00023042
fatcat:ua4kvfc4endv5bhd4wglhzplue
Special Issue: Advances in Secure Data Streaming Systems
2015
unpublished
Acknowledgment The authors thank the anonymous reviewers for helpful comments and suggestions. This work was funded in part by the U.S. Army under grant #W911NF-11-1-0124. ...
However, it is only proved to be semantically secure against chosen-plaintext attack (IND-CPA). ...
In our solution, we split the storage structure of the basic element of index cache into sets of delta cells divided by column. ...
fatcat:vvmbxyvcyfccfi3wnl6q2kkfka
Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
2021
IEEE Access
The Sensor-MAC periodic hearing and rest protocol is proposed to defeat this issue. ...
Thus, security is critical in commercial and military applications to prevent malicious attacks like unauthorized access and denial of service DoS attacks. ...
doi:10.1109/access.2021.3111923
fatcat:4whrxb53cfe6lk7wbykmno2moa
Special Issue: Multimedia Information System Security
2009
unpublished
Acknowledgement This work was supported by the Slovenian Research Agency (ARRS), development project M2-0210 (C) entitled "AvID: Audiovisual speaker identification and emotion detection for secure communications ...
Acknowledgements This work was partially supported by the SAPIR project 6 , funded by the European Commission under IST FP6 (Contract no. 45128) and by the Ministero Italiano per l'Università e la Ricerca ...
Just disabling and rendering it useless will defeat the very purpose of steganography. ...
fatcat:ekua3zeo5rfnvcycdaxfmhjihq
Baltic Security and Defence Review
2011
Baltic Security and Defence Review
unpublished
period of occupation. ...
At that time the sector of interior security, public order and policy was split among such actors and institutions as follows: -Latvian state police with its own cooperation "Safety Guards" (apvienība ...
fatcat:4yd7shhptfa2nhifukntgdrz74
America and guerrilla warfare
2001
ChoiceReviews
America and guerrilla warfare / Anthony James Joes. p. cm. Includes bibliographical references and index. ...
If defeated, they scattered, took refuge in the swamps and forests, only to reassemble and carry on the fight as occasion served. ...
Constant American patrolling kept the guerrillas on the move and uncovered many food caches. ...
doi:10.5860/choice.38-4601
fatcat:xhc4q6s4ybhc5fjvtq2d55hk6m
CRM support for creating IT security awareness with electronic banking customers
2017
unpublished
The most common eBanking security threats for last five years have been the attacks that target directly the customers and their computers. ...
Furthermore, a Security Awareness tool is created for raising and maintaining the high level of IT security awareness among the customers. ...
use and handling cache and cookies. ...
doi:10.25365/thesis.50465
fatcat:hkglfi5clnctvg35ea5bvjllru
Cold War Lithuania: National Armed Resistance and Soviet Counterinsurgency
2007
The Carl Beck Papers in Russian and East European Studies
Following the defeat of Nazi Germany, the Soviet Union sought to reestablish its control over the areas of Eastern Europe that it had occupied prior to the RussoGerman war. ...
These areas included Western Ukraine, Byelorussia, and the Baltic States of Lithuanian, Latvia, and Estonia.2 In these regions, the Soviets found wellorganized underground resistance movements that were ...
During the first Soviet occupation of Lithuania, from 1940 to 1941, the Soviets introduced several of the pacification policies that they would use again, after the defeat of Germany. ...
doi:10.5195/cbp.2007.135
fatcat:moh6xtouz5g23hwjbfg653kyka
CONFIGURATION MODELING AND DIAGNOSIS IN DATA CENTERS
2020
Figshare
The disk cache is split into three distinct partitions: data storage buffer db, metadata md and log space ls. (Section 3.3.3 &
Table 3 3 .1: Subset of Feature Vector Supporting the Problem. ...
Though, at present, OpenConfig models
For example, oper-data like CPU occupancy and throughput can describe the performance HI. ...
doi:10.6084/m9.figshare.12616301
fatcat:hetr7siwh5bznm3s7z3m3o7rse
Access denied: the practice and policy of global Internet filtering
2008
ChoiceReviews
the Caliphate and that remains banned in many countries. ...
Though most foreign news sites were accessible, Web sites of some important Arabic newspapers and news portals were found to be blocked. ...
The attacks did end shortly after the elections, as it was clear that the opposition was defeated and its street protest would not prevail. ...
doi:10.5860/choice.45-6833
fatcat:qhuziwkinrdtldsaylvbmumopu
Country Reports on Terrorism
2007
ChoiceReviews
the data needed, and completing and reviewing the collection of information. ...
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining ...
In March 2000, the group claimed credit for a rifle grenade attack against the Department of Energy ...
doi:10.5860/choice.44-4105
fatcat:o5bjzfekrbghbgaxgyq2vjgvby
Sagwitch: Shoshone chieftain, Mormon elder, 1822-1887
2000
ChoiceReviews
The Deseret News noted on September 5 that Smithfield's residents had dragged their houses into a makeshift fort "so that they will be more secure from attack than in their former scattered condition." ...
Valley as herding ground, 24; emigrant train attacked near, 30; Pine threatens to drive Cache cattle to, 34; Shoshone plan to attack Cache settlements, 69; Shoshone-Bannock Reservation established at, ...
doi:10.5860/choice.38-1129
fatcat:7hxsmpst2bgbrh3czdgrdmh4nm
« Previous
Showing results 1 — 15 out of 678 results