Search
Now showing items 11-20 of 37
A 2020 vision for the Black Sea region: the Commission on the Black Sea proposes
(Routledge Journals Taylor & Francis Ltd, 2010)
The Black Sea region is coming into its own although it is at times a contested and dangerous neighbourhood. Despite heightened interest in the region its real priorities and needs are still being largely ignored by insiders ...
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Perception or Discourse? Security Threats in Copenhagen School and Neoclassical Realism
(2011)
This article compares the perceptive approach of neoclassical realist security understanding with the discursive constructivist methodology of the Copenhagen School in analyzing the emergence of security threats. It departs ...
Protecting openflow switches against denial of service attacks
(Institute of Electrical and Electronics Engineers Inc., 2018)
This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible programmable ...
From the Atlantic pact to NATO: debating Turkey's location and function in the Turkish grand national assembly
(Uluslararası İlişkiler Konseyi Derneği, 2012)
This article using critical geopolitics as a framework analyzes identity formation in Turkey during Turkey's NATO accession. The main thesis of this article is that identity that is made through foreign policy discourse ...
6750 SAYILI TİCARİ İŞLEMLERDE TAŞINIR REHNİ KANUNU'NA İLİŞKİN BAZI TESPİTLER*
(Yeditepe Üniversitesi adına Prof. Sultan Tahmazoğlu Üzeltürk, 2016)
Çalışmamızda, 20.10.2016 tarihinde kabul edilen ve 01.01.2017 tarihinde yürürlüğe girecek olan 6750 sayılı Ticari İşlemlerde Taşınır Rehni
Kanunu’nın amacı ve uygulama alanı, rehnin konusu, rehin sözleşmesinin
tarafları, ...
Algı mı, söylem mi? Kopenhag Okulu ve yeni-klasik gerçekçilikte güvenlik tehditleri
(Uluslararası İlişkiler Konseyi Derneği İktisadi İşletmesi, 2011)
Bu makale, güvenlik tehditlerinin ortaya çıkışı bakımından yeni-klasik gerçekçilikteki algısal yaklaşımla, Kopenhag Okulunun söylemle inşaya dayalı yöntemini karşılaştırmaktadır. Makalenin hareket noktası, güvenlik ...
Geopolitics and gas-transit security through pipelines
(Springer International Publishing, 2020)
Hydrocarbons are valuable only if they can be transited from where they are produced to where they are consumed. Despite the enduring importance of transit to the global energy system, the topic did not begin to be extensively ...
Terror as potentiality - the affective rhythms of the political
(Routledge Journals, 2018)
The paper addresses the ways in which the cultural, the affective and the political intersect, counter and/or feed upon one another in the context of contemporary terror. Initially, building upon Machiavelli and Hobbes, ...
Contending Agendas For The Black Sea Region: A Turkish Alternative
(Genelkurmay ATASE SAREM Başkanlığı, 2010)
Soğuk Savaşın sona ermesi yüzlerce yıl çok sayıda çatışmaya tanıklık etmiş olan
Karadeniz havzasında çok taraflı iş birliğine dayalı yeni bir siyasi çerçevenin
gelişmesini mümkün kıldı. Avrasya’nın ortasındaki stratejik ...