Search
Now showing items 1-10 of 11
After the Crimean crisis: towards a greater Russian maritime power in the Black Sea
(Routledge Journals Taylor & Francis Ltd, 2014)
The modernization of the Black Sea Fleet currently underway is believed to be one of the most ambitious parts of the Russian State Arms Procurement programme 2011-2020. Up to 18 units are being built and are expected to ...
The Only Thing We Have to Fear: Post 9/11 Institutionalization of In-security [Korkmamız gereken tek şey: 11 Eylül sonrasında güvensizliğin kurumsallaşması]
(Uluslararası İlişkiler Konseyi Derneği, 2012)
During the last decade billions of dollars have been spent to increase security measures in the United States. New institutions including a department for homeland security have been established new security tools have ...
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ...
Escalating rivalries and diverging interests: prospects for stability and security in the Black Sea region
(Routledge Journals Taylor & Francis Ltd, 2010)
The Black Sea region is increasingly becoming a priority on the international agenda. In fact a regional approach is emerging as actors understand that common problems need to be addressed jointly. Nevertheless cooperation ...
A 2020 vision for the Black Sea region: the Commission on the Black Sea proposes
(Routledge Journals Taylor & Francis Ltd, 2010)
The Black Sea region is coming into its own although it is at times a contested and dangerous neighbourhood. Despite heightened interest in the region its real priorities and needs are still being largely ignored by insiders ...
Perception or Discourse? Security Threats in Copenhagen School and Neoclassical Realism
(2011)
This article compares the perceptive approach of neoclassical realist security understanding with the discursive constructivist methodology of the Copenhagen School in analyzing the emergence of security threats. It departs ...
Protecting openflow switches against denial of service attacks
(Institute of Electrical and Electronics Engineers Inc., 2018)
This paper presents a novel approach to protect Openflow switches against a type of Denial of Service (DoS) attacks. Openflow switches are the core of Software Defined Networks (SDN) and they are very flexible programmable ...
Geopolitics and gas-transit security through pipelines
(Springer International Publishing, 2020)
Hydrocarbons are valuable only if they can be transited from where they are produced to where they are consumed. Despite the enduring importance of transit to the global energy system, the topic did not begin to be extensively ...
Terror as potentiality - the affective rhythms of the political
(Routledge Journals, 2018)
The paper addresses the ways in which the cultural, the affective and the political intersect, counter and/or feed upon one another in the context of contemporary terror. Initially, building upon Machiavelli and Hobbes, ...
Physical-Layer Security With Optical Generalized Space Shift Keying
(Ieee-Inst Electrıcal Electronıcs Engıneers Inc, 2020)
Spatial modulation (SM) is a promising technique that reduces inter-channel interference while providing high power efficiency and detection simplicity. In order to ensure the secrecy of SM, precoding and friendly jamming ...