Search
Now showing items 1-10 of 10
After the Crimean crisis: towards a greater Russian maritime power in the Black Sea
(Routledge Journals Taylor & Francis Ltd, 2014)
The modernization of the Black Sea Fleet currently underway is believed to be one of the most ambitious parts of the Russian State Arms Procurement programme 2011-2020. Up to 18 units are being built and are expected to ...
The Only Thing We Have to Fear: Post 9/11 Institutionalization of In-security [Korkmamız gereken tek şey: 11 Eylül sonrasında güvensizliğin kurumsallaşması]
(Uluslararası İlişkiler Konseyi Derneği, 2012)
During the last decade billions of dollars have been spent to increase security measures in the United States. New institutions including a department for homeland security have been established new security tools have ...
Escalating rivalries and diverging interests: prospects for stability and security in the Black Sea region
(Routledge Journals Taylor & Francis Ltd, 2010)
The Black Sea region is increasingly becoming a priority on the international agenda. In fact a regional approach is emerging as actors understand that common problems need to be addressed jointly. Nevertheless cooperation ...
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Perception or Discourse? Security Threats in Copenhagen School and Neoclassical Realism
(2011)
This article compares the perceptive approach of neoclassical realist security understanding with the discursive constructivist methodology of the Copenhagen School in analyzing the emergence of security threats. It departs ...
Terror as potentiality - the affective rhythms of the political
(Routledge Journals, 2018)
The paper addresses the ways in which the cultural, the affective and the political intersect, counter and/or feed upon one another in the context of contemporary terror. Initially, building upon Machiavelli and Hobbes, ...
AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection
(IEEE-Inst Electrical Electronics Engineers Inc, 2022)
The emergence of technological innovations brings sophisticated threats. Cyberattacks are increasing day by day aligned with these innovations and entails rapid solutions for defense mechanisms. These attacks may hinder ...
Physical-Layer Security in 6G Networks
(IEEE-Inst Electrical Electronics Engineers Inc, 2021)
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These ...
Secure Transmission for THz-Empowered RIS-Assisted Non-Terrestrial Networks
(IEEE-Inst Electrical Electronics Engineers Inc, 2023)
The non-terrestrial networks (NTNs) are recognized as a key component to provide cost-effective and high-capacity ubiquitous connectivity in the future wireless communications. In this paper, we investigate the secure ...
A Hybrid Approach With GAN and DP for Privacy Preservation of IIoT Data
(IEEE-Inst Electrical Electronics Engineers Inc, 2023)
There are emerging trends to use the Industrial Internet of Things (IIoT) in manufacturing and related industries. Machine Learning (ML) techniques are widely used to interpret the collected IoT data for improving the ...