Academic and Applied Research in Military and Public最新文献

筛选
英文 中文
Tunisia’s Security Concerns 突尼斯的安全问题
Academic and Applied Research in Military and Public Pub Date : 2015-03-31 DOI: 10.32565/aarms.2015.1.1
János Besenyő, Zoltán Prantner
{"title":"Tunisia’s Security Concerns","authors":"János Besenyő, Zoltán Prantner","doi":"10.32565/aarms.2015.1.1","DOIUrl":"https://doi.org/10.32565/aarms.2015.1.1","url":null,"abstract":"Ansar al-Sharia, established in April 2011, is the most prominent Salafist jihadist organization in Tunisia. At the beginning the movement, which sympathizes with the ideology of al-Qaeda, focused its attention on humanitarian and missionary works. Later it did not balk at using violence to enforce religious norms. The conflict between the Ennahda Government and the organization culminated between May and July, 2013. At the end of August the Government finally designated Ansar al-Sharia a terrorist-organization. According official reports, the organization is responsible for planning several unsuccessful attacks during the intervening months. Additionally, Okba bin Nafaa, the military wing of Ansar al-Sharia, has been fighting an open war with the Tunisian Army in the Algerian border region since December 2012.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Nuclear Weapons in NATO’s Early Cold War Strategies (1949–1957) 核武器在北约冷战初期战略中的作用(1949-1957)
Academic and Applied Research in Military and Public Pub Date : 2015-03-31 DOI: 10.32565/aarms.2015.1.10
P. Kiss
{"title":"The Role of Nuclear Weapons in NATO’s Early Cold War Strategies (1949–1957)","authors":"P. Kiss","doi":"10.32565/aarms.2015.1.10","DOIUrl":"https://doi.org/10.32565/aarms.2015.1.10","url":null,"abstract":"Since August 1945 atomic weapons have become significant factors in international relations, every state with great ambitions has aspired to get atomic secrets. The primary goal of the North Atlantic Treaty Organization (NATO) created in 1949 was – possessing the United States’, a nuclear power’s, security guarantee – to deter the Soviet agression. The first strategic documents of the Alliance were written with this very purpose. However, in the 1950s there was a shift in the allied nations’ policies, which influenced NATO’s strategic thinking as well, so in 1957 a real different strategic concept was adopted. Gaining technological superiority became the most important goal, which led to development and intense production of nuclear weapons. This article examines the emerging role of nuclear weapons and the changing strategy of the Alliance between 1949 and 1957.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130382188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operation “Artemis”: The First Autonomous EU-led Operation “阿尔忒弥斯”行动:第一次由欧盟主导的自主行动
Academic and Applied Research in Military and Public Pub Date : 2015-03-31 DOI: 10.32565/aarms.2015.1.11
J. Tomolya
{"title":"Operation “Artemis”: The First Autonomous EU-led Operation","authors":"J. Tomolya","doi":"10.32565/aarms.2015.1.11","DOIUrl":"https://doi.org/10.32565/aarms.2015.1.11","url":null,"abstract":"In June 2003, the EU launched Operation “Artemis”, its first military mission outside Europe and independent of NATO, to the Democratic Republic of Congo. While it ultimately received an EU badge, its origin, command and control were French. The objective of Operation “Artemis” was to contribute to the stabilisation of the security conditions in Bunia, capital of Ituri, to improve the humanitarian situation, and to ensure the protection of displaced persons in the refugee camps in Bunia. Its mandate was to provide a short-term interim force for three months until the transition to the reinforced United Nations Mission in the Democratic Republic of Congo (MONUC – Mission de l’Organisation des Nations Unies en République Démocratique du Congo; English: United Nations Organization Stabilization Mission in the Democratic Republic of the Congo). Although the EU can be said to have passed the first “test” of the European Security and Defence Policy (ESDP) mechanisms for the conduct of an autonomous operation, this test was a limited one. Operational constraints were caused by inadequate strategic lift capabilities and the lack of a strategic reserve.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diseases and Non-Battle Injuries (DNBI) in HUN Missions Based on EPIHUN Reports 基于EPIHUN报告的HUN任务中的疾病和非战斗伤害(DNBI)
Academic and Applied Research in Military and Public Pub Date : 2015-03-30 DOI: 10.32565/aarms.2015.1.2
L. Svéd, A. Sótér, Z. Vekerdi
{"title":"Diseases and Non-Battle Injuries (DNBI) in HUN Missions Based on EPIHUN Reports","authors":"L. Svéd, A. Sótér, Z. Vekerdi","doi":"10.32565/aarms.2015.1.2","DOIUrl":"https://doi.org/10.32565/aarms.2015.1.2","url":null,"abstract":"The Medical Service of the Hungarian Defence Forces (HDF) has been playing and taking an important role in the elimination and medical stabilization of several regional crisis areas since 1991. These medical protection and “back-ups” literally mean the medical support of our military forces take part in different tasks besides this fulfilling the special tasks of preventive medicine. The medical data collected from the different tasks and missions have been gathered systematically in order to be informative. From 2008 on we manage data collection with a real-time surveillance report system, the so called EPIHUN (Hungarian Epidemiological and Patient Turnover Report), which have been collected from different aspects and analysed from force health protection aspects. With the DNBI data from the system the authors are analysing the preventable diseases morbidity state and tendencies of the EUFOR (European Union Force), KFOR (Kosovo Force), MFO (Multinational Force and Observers) and UNFICYP (United Nations Peacekeeping Force in Cyprus) missions on a 2013 data base. It could be surprising that the morbidity data are very similar to the values seen among military collectives living in barracks during the conscription era of the armed forces. Most DNBI are acute respiratory diseases and diseases of the digestive system, which is important information in medical preparation training before deployment.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Soft Factors of Economic Security 经济安全的软因素
Academic and Applied Research in Military and Public Pub Date : 1900-01-01 DOI: 10.32565/aarms.2019.2.7
M. Csath, Csaba Fasi, B. Nagy, Nóra Pálfi, Balázs Taksás, S. Vinogradov
{"title":"Soft Factors of Economic Security","authors":"M. Csath, Csaba Fasi, B. Nagy, Nóra Pálfi, Balázs Taksás, S. Vinogradov","doi":"10.32565/aarms.2019.2.7","DOIUrl":"https://doi.org/10.32565/aarms.2019.2.7","url":null,"abstract":"","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The U.S. Response to the 2016 Russian Election Meddling and the Evolving National Strategic Thought in Cyberspace (Part 2.) 美国对2016年俄罗斯干预大选的回应与网络空间国家战略思想的演变(第二部分)
Academic and Applied Research in Military and Public Pub Date : 1900-01-01 DOI: 10.32565/aarms.2019.1.4
Dóra Dévai
{"title":"The U.S. Response to the 2016 Russian Election Meddling and the Evolving National Strategic Thought in Cyberspace (Part 2.)","authors":"Dóra Dévai","doi":"10.32565/aarms.2019.1.4","DOIUrl":"https://doi.org/10.32565/aarms.2019.1.4","url":null,"abstract":"Due to the heightened political sensitivity caused by the recently held U.S. midterm elections and the frenzied media concentration on the 2016 election meddling, hacking and leaks have been in the focus of public discussions ever since. In order to better comprehend the appraisal of the U.S. political leadership back in 2016 and early in 2017, this article contextualizes the events and the response measures in the wider cybersecurity position of the U.S. Tracking down the development of the U.S. political and military approach to cyber threats,3 we came to the conclusion that the U.S. is lacking a working cybersecurity policy largely because its perception of cyber threats is self-centred and still deeply rooted in the strategic thinking of nuclear or traditional military attacks. Even if the same strategic principles are valid in cyberspace, cyberattacks, single, systemic or part of a broader influence operation, they play out according to a set of completely different dynamics than kinetic attacks. The true strategic lesson of the recent election meddling is that Russia has been, and most probably will be, able to seize the momentum and masterfully exploit those inherent deficiencies. Consequently, cyberspace as a strategic environment necessitates the careful analysis of the strategic thinking of the potential adverse nation.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Trump Administration and U.S.–Russian Relations 特朗普政府与美俄关系
Academic and Applied Research in Military and Public Pub Date : 1900-01-01 DOI: 10.32565/aarms.2019.1.2
Csizmazia Gábor
{"title":"The Trump Administration and U.S.–Russian Relations","authors":"Csizmazia Gábor","doi":"10.32565/aarms.2019.1.2","DOIUrl":"https://doi.org/10.32565/aarms.2019.1.2","url":null,"abstract":"President Trump’s controversial foreign policy performance, particularly in relation to Russia, raises the question of his administration’s stance towards U.S.–Russian relations. While the President has displayed initial intentions of reaching out to Moscow, his administration’s overall view of the world sets U.S.–Russian relations in a competition-based framework. This “global arena” perspective is reflected in official national security policy documents and by major foreign policy decisionmakers as well. Thus the Trump Administration not only maintains its predecessor’s initiatives countering Russia but enhances them by further emphasizing deterrence and containment measures in Europe through an increased European Deterrence Initiative (EDI) budget, addressing Russian violation of the Intermediate-Range Nuclear Forces (INF) Treaty, and arming Ukraine with lethal defensive weapons.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security of Encryption Procedures and Practical Implications of Building a Quantum Computer 加密程序的安全性及构建量子计算机的实际意义
Academic and Applied Research in Military and Public Pub Date : 1900-01-01 DOI: 10.32565/aarms.2020.3.1
Ferenc Koczka
{"title":"Security of Encryption Procedures and Practical Implications of Building a Quantum Computer","authors":"Ferenc Koczka","doi":"10.32565/aarms.2020.3.1","DOIUrl":"https://doi.org/10.32565/aarms.2020.3.1","url":null,"abstract":"In ensuring the operation of an IT system, it is essential to maintain the data’s confidentiality and integrity, which is based on some encryption processes. Encryption procedures are based on algorithms, the theory of which is given by cryptography. Due to their complexity, they are often hardly understandable not only to an average person but also to the majority of professionals who are familiar with IT. The algorithms used are not eternal; various designs or implementation errors or even performance gains from computer hardware improvements make one time high achieving algorithms obsolete and easily hackable. Strong algorithms can be circumvented in alternative ways, the necessary software and hardware infrastructure can already be built from personal computing devices. I tested its effectiveness on two different password databases: with the success of hacking university passwords, I prove that it is possible to circumvent strong algorithms with simple methods. Modern encryption algorithms have a relatively long life cycle and they become obsolete slowly. The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods. As it is an impossible task to modernise the encryption algorithms of all IT systems operating today, preparations must be started as soon as possible so that the new situation can be handled, at least for critical systems. In my article, I would like to draw attention to the weaknesses of encryption methods, present a possible method of circumventing the cryptographic methods currently in use, demonstrate the operation of a quantum computer and some algorithms relevant to the topic.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience of the Territory to the Occurrence of Natural Hazards 领土对自然灾害发生的恢复能力
Academic and Applied Research in Military and Public Pub Date : 1900-01-01 DOI: 10.32565/aarms.2019.2.2
A. Oulehlová
{"title":"Resilience of the Territory to the Occurrence of Natural Hazards","authors":"A. Oulehlová","doi":"10.32565/aarms.2019.2.2","DOIUrl":"https://doi.org/10.32565/aarms.2019.2.2","url":null,"abstract":"The article deals with the issue of increasing resilience of the territory by reducing its vulnerability to natural hazards. The present state of the issue is focused on the analysis of the United Nations’ involvement in disaster response where organising World Conferences on Disaster Risk Reduction is viewed as a key moment. Subsequently, tools used for assessing the vulnerability and resilience to disasters are examined. Based on the results of the current state of knowledge and deficiencies in the concerned area, a process has been proposed to evaluate the vulnerability and risk of the territory to the occurrence of natural hazards with the aim of ensuring acceptable area safety. Applicability of the proposed process of the vulnerability and risk assessment of the territory to natural hazards is presented on an example of a municipality. Verification on the selected municipality has proven the merit of the proposed procedure.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127958505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Possibilities in Postgraduate Specialisation Programmes Summarising Government Aimed Info-communication Systems and Services: Fundaments of theTraining, Abilities, and Requirements 总结政府目标信息通信系统和服务的研究生专业课程的可能性分析:培训、能力和要求的基础
Academic and Applied Research in Military and Public Pub Date : 1900-01-01 DOI: 10.32565/aarms.2019.3.3
T. Farkas
{"title":"Analysis of Possibilities in Postgraduate Specialisation Programmes Summarising Government Aimed Info-communication Systems and Services: Fundaments of theTraining, Abilities, and Requirements","authors":"T. Farkas","doi":"10.32565/aarms.2019.3.3","DOIUrl":"https://doi.org/10.32565/aarms.2019.3.3","url":null,"abstract":"An accessible info-communication system is a key element of cooperation between each level of governmental leadership and defence organisation (police, disaster management, army, etc.) during crises, emergency cases and other events of this type. Beyond technology and technical fundaments, the availability of human factor is also a primary criterion in order to execute the activity with success. To help this, the author analyses the conditions of creating a possible postgraduate specialisation programme, together with the most important elements, knowledge material and criterion requirements of such in the recent publication.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123253091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信