نتایج جستجو برای: armed attack

تعداد نتایج: 92853  

2005
Andor Gaudia Péter Szemes Béla Takarics Péter Korondi

In these days when we go to public places like banks or post-offices, we always have to reckon with the risk of armed robbery, or terrorist attack. These places are protected by special security crew, but the increasing demand on improved security requires redundant and failsafe methods which eliminates the human factor. In this paper an Intelligent Space based project is introduced which can d...

Journal: :Emerging Infectious Diseases 1997
P. K. Russell

The growing awareness of the possibility that a terrorist organization might use a biologic agent in an attack on a civilian target in the United States raises important questions about our capability as a nation to respond effectively to the threat and to deal with the consequences of an attack. The article by Kaufmann et al. in this issue of Emerging Infectious Diseases describes three possib...

Journal: :Yustisia 2021

<em>This article aimed to analyze the classification of armed conflict in Estonia's cyber-attack and how existing IHL are answering this problem, whether those regulations enough for future cases cyber-attack. This uses normative method by comparing Geneva Convention 1949 Additional Protocol I 1977 with Rule 30 Tallinn Manual 1.0 some relevant literary works, using a descriptive-analytic ...

Journal: :Security and Communication Networks 2021

In this study, a fail-stop group signature scheme (FSGSS) that combines the features of and signatures to enhance security level original is proposed. Assuming FSGSS encounters an attack by hacker armed with supercomputer, can prove digital forged. Based on aforementioned objectives, study proposes three lemmas proves they are indeed feasible. First, how does recipient digitally signed document...

Journal: :Journal on the use of force and international law 2022

Following a rocket attack that occurred at Erbil airport in Iraq, President Biden authorised the first use of military force since becoming on 25 February 2021. This was legally justified basis self-defence. On face it this seemed an innocuous justification. Yet, article argues through both downplaying treaty source right self-defence and its express requirement for armed attack, as well promot...

Journal: :International Studies Quarterly 2021

Abstract While there is a substantial body of literature on the consequences terror attacks public attitudes toward state institutions in Western democracies, little known about impact that such events have context armed conflict. We address this gap by exploring attitudinal effects 2012 Taliban attack civilians Kabul City, Afghanistan. test two competing hypotheses: “rally-effect” hypothesis a...

Journal: :Security and Defence Quarterly 2023

This paper takes a comprehensive look at the current state of army aviation attack helicopter squadrons Polish Armed Forces. The aim article is to present concept for functioning reconnaissance Forces, which into account identified requirements Land Forces in relation on battlefield and limitations To meet this aim, qualitative research included interviewing, observation collection analysis tex...

2006
Krishna Prasad Paudel

This paper examines the impact of armed conflict on the lives of the forestdependent poor in Nepal. Based on a survey study carried out in four districts among forest-dependent poor and their service providers, the findings show that the armed conflict is severely affecting the lives and living conditions of the poor. The lack of food, drinking water, education, health care and employment oppor...

2012
Uwe Steinhoff

According to the dominant position in the just war tradition from Augustine to Anscombe and beyond, there is no ‘‘moral equality of combatants.’’ That is, on the traditional view the combatants participating in a justified war may kill their enemy combatants participating in an unjustified war—but not vice versa (barring certain qualifications). I shall argue here, however, that in the large nu...

2002
Sapon Tanachaiwiwat Kai Hwang Yue Chen

A new risk-minimizing security model is presented for distributed network intrusion detection with automated responses. The scheme is based on collective risk assessment of multiple attacks on a network. We propose a new adaptive alarm/defense framework in protecting network resources. We have tested the adaptive security framework on a small Linux cluster at USC. The desired security functions...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید