Skip to main content
The period of the eighties is the main subject of my story. The aim is to analyze the crisis in the functioning of the Belgian State and society, which culminated at the end of 1985, and to provide background facts. This is a crisis that... more
    • by 
    •   16  
      Cold WarRegionalismExtreme RightAnti-communism
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
    • by 
    •   5  
      Intrusion DetectionDeep LearningNetwork AttacksSecurity Service
The article examines in detail the process of setting up the security services of Latvia in the period prior to and after regaining full independence. The author emphasizes that a successful transition towards a consolidated democracy... more
    • by 
    •   8  
      National SecurityLatviaDemocratic TransitionsSecurity Service
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
    • by 
    •   5  
      Intrusion DetectionDeep LearningNetwork AttacksSecurity Service
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
    • by 
    •   5  
      Intrusion DetectionDeep LearningNetwork AttacksSecurity Service
    • by 
    •   3  
      CommunismCatholic Church HistorySecurity Service
    • by 
    •   6  
      Computer ScienceRouting protocolsWireless NetworkAd hoc network
    • by 
    •   7  
      SubversionUnited KingdomUKMI5
    • by 
    •   2  
      History of CommunismSecurity Service
Obóz Pracy w Świętochłowicach był, obok obozu w Mysłowicach, największym obozem w powojennym województwie śląskim. Od końca lutego do 20 listopada 1945 r. w obozie zmarło co najmniej 1855 osadzonych (tyle aktów zgonu więźniów,... more
    • by 
    •   4  
      History of CommunismSecurity ServiceVolksdeutscheLabour camps
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
    • by 
    •   5  
      Intrusion DetectionDeep LearningNetwork AttacksSecurity Service
Artykuł zawiera analizę 150 akt tajnych współpracowników aparatu bezpieczeństwa z lat 1945–1956 zachowanych w zasobie archiwum IPN w Katowicach. Omówiona została specyfika tych akt jako źródeł historycznych – ich niekompletność,... more
    • by 
    •   4  
      Security ServiceState Security FilesKatowice Voivodeshipsecurity agent
E-Governance is basically the use of internet expertise as a tool for exchanging information, providing services and transacting with people, businesses and other areas of government. E-Governance provides a sound approach to reinforce... more
    • by 
    •   5  
      E-GovernanceAuthenticationE-ServicesThreat
The article examines in detail the process of setting up the security services of Latvia in the period prior to and after gaining full independence with the dissolution of the Soviet Union. The author emphasizes that a successful... more
    • by 
    •   8  
      International SecurityNational SecurityLatviaSecurity Policy
    • by 
    •   16  
      Digital SignatureXMLTechnology ManagementE Business
Józef Lebenbaum z Lund i Andrzej Wirga z Moguncji, którzy przekazali księdzu Blachnickiemu informacje na temat działalności Gontarczyków mieli również przekazać komplet dokumentacji świadczącej o ich wywiadowczym charakterze. Albo ten... more
    • by 
    •   14  
      IntelligencePolish HistorySecurityCold War
    • by 
    •   6  
      Polish HistoryJesuit historyCommunismJesuits
    • by 
    •   4  
      Security RequirementsSecurity ServiceStorage systemPerformance Computing
    • by 
    •   8  
      Polish HistoryCommunist Secret PolicePostwar GermanySecurity Service
In most commercial electronic contract management applications available today, different customized code base has to be developed, deployed and operated to support each tenant. Few advanced commercial electronic contract management... more
    • by 
    •   13  
      BusinessSmall BusinessTechnology ManagementProductivity
In most commercial electronic contract management applications available today, different customized code base has to be developed, deployed and operated to support each tenant. Few advanced commercial electronic contract management... more
    • by 
    •   13  
      BusinessSmall BusinessTechnology ManagementProductivity
SOSE is a novel software development paradigm that results in flexible, loose-coupled and end-to-end applications. However, the adoption of this innovation is slowed by security challenge. Apparently, the use of only TLS (transport layer... more
    • by 
    •   3  
      Computer ScienceComputer SecuritySecurity Service
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
    • by 
    •   5  
      Intrusion DetectionDeep LearningNetwork AttacksSecurity Service
    • by 
    •   8  
      Data SecuritySecurity ServiceRural AreaInternet
    • by 
    •   7  
      PrivacyDatabasesAuthenticationQuantitative analysis
    • by 
    •   7  
      TerrorismPolitical Extremism/Radicalism/PopulismRadicalizationIslamic Studies