Search

Showing total 438 results

Search Constraints

Start Over You searched for: Topic national security Remove constraint Topic: national security Publication Year Range This year Remove constraint Publication Year Range: This year
438 results

Search Results

1. Moorman Center Releases First Tranche of 'Presidential Transition Issue Paper Series'

2. Moorman Center Releases First Tranche of 'Presidential Transition Issue Paper Series'

4. Court Papers Offer Glimpse of Trump’s Defense in Classified Documents Case

5. Tycoon ‘started English paper to win U.S. support’; Court told how Lai wanted American politicians to subscribe to digital outlet as this would offer ‘political protection’ against Beijing crackdown

6. Peter Dutton backs release of Iraq war papers after Morrison government failure; Department claims key documents outlining reasoning behind joining US-led invasion were not included in an 'apparent administrative oversight'

7. Exposing the Dangers of the Influence of Foreign Adversaries on College Campuses. Hearing before the Subcommittee on Higher Education and Workforce Development of the Committee on Education and the Workforce. U.S. House of Representative, One Hundred Eighteenth Congress, First Session (July 13, 2023). Serial No. 118-17

8. International passengers can ditch paper and go digital: The New Zealand Traveller Declaration (NZTD) is now in full use for both air and maritime travellers arriving in New Zealand, including passengers and crew of international cruise ships.

11. Wargaming for Learning: How Educational Gaming Supports Student Learning and Perspectives

12. Religious Dynamics of Secrecy in Cold War American Life

13. Risk Monitoring Can be Enhanced as U.S. Businesses Face Challenges Competing.

14. Navigating the Economic Impacts of Migration in Africa: A Comprehensive Review.

15. The securitisation of foreign disinformation.

16. Nexus between digital trade and security: geopolitical implications for global economy in the digital age.

17. National Security or Trade Openness? The Balancing Act in Contemporary Trade Relations.

18. South Korea in the Chip War: Challenges and Opportunities.

19. ПОЗИЦІЯ АДМІНІСТРАЦІЇ БІЛЛА КЛІНТОНА СТОСОВНО СПІВРОБІТНИЦТВА УКРАЇНИ ТА НАТО.

20. Agile Inverse Design of Polarization-Independent Multi-Functional Reconfiguration Metamaterials Based on Doped VO 2.

21. 体系化构造:美国保密基础设施立法及启示.

22. Principles of Cloud Computing Infrastructure IaaS.

23. THE FUNCTIONING OF THE INSTITUTIONS IN THE REPUBLIC OF NORTH MACEDONIA DURING THE COVID-19 PANDEMIC.

24. Anti-unmanned aerial vehicle detection system for airports: aviation and national security perspective.

25. 数智赋能国家安全教育现代化的概念、内涵与 机制.

26. THE ROLE OF THE EUROPEAN UNION IN ACHIEVING SUSTAINABLE DEVELOPMENT AT THE GLOBAL LEVEL.

27. The Long-run Impact of Childhood Wartime Violence on Preferences for Nuclear Proliferation.

28. Towards Demystifying Trade Dependencies: At What Point do Trade Linkages Become a Concern?

29. Revitalising Australia's defence industry and national service scheme: Lessons from Sweden and the AUKUS initiative.

30. Validation of the Enhanced Model for Efficient Development of Security Audit Criteria.

31. National President's Column.

32. Climate Refugees in India: Seeking Security between Disaster Diplomacy and Strategic Ambiguity.

33. Towards a non-Western model of security assistance: How Iran assists militaries.

34. Egypt's position in the Russia–Ukraine war.

35. 'It's like crossing a border everyday': Police-migrant encounters in a postcolonial city.

36. Soviet Active Measures and the Second Cold War: Security, Truth, and the Politics of Self.

37. ПРАВОВІ АСПЕКТИ ЗАСТОСУВАННЯ СИЛ ОБОРОНИ ПІД ЧАС ВОЄННОГО СТАНУ

38. The role of political institutions in the religious sphere before and during the Russo-Ukrainian war: national security vs. freedom of religion.

39. Chip-encoded high-security classical optical key distribution.

40. The Urban Deployment Model: A Toolset for the Simulation and Performance Characterization of Radiation Detector Deployments in Urban Environments.

42. An Assessment on Internal Security Threat to Pakistan and Impacts of Terrorism on Economy.

43. Shanghai Cooperation Organization: Opportunities for Pakistan.

44. THE COMMUNITY FRAMEWORK FOR THE EXAMINATION OF FOREIGN DIRECT INVESTMENTS UNDER THE MAGNIFYING GLASS EUROPEAN COURT OF AUDITORS.

45. Violation of territorial integrity as a tool for waging long-term hybrid warfare (against the backdrop of power games in the South Caucasus region).

46. Rising sun in the cyber domain: Japan’s strategic shift toward active cyber defense.

47. Extending SysML Model Federation to Support Systems of Systems Multilevel Security Development.

48. Illustrative Examples of How to Measure Influence Operations: Experimental and Statistical Methods for Causal Inference.

49. Food Acquirability: An Unexplored Component of Food Security?

50. Rockburst prediction using artificial intelligence techniques: A review.