Zeitschriftenartikel zum Thema „Canadian Security Intelligence Act (Proposed)“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Canadian Security Intelligence Act (Proposed)" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Salter, Mark B., und Geneviève Piché. „The Securitization of the US–Canada Border in American Political Discourse“. Canadian Journal of Political Science 44, Nr. 4 (Dezember 2011): 929–51. http://dx.doi.org/10.1017/s0008423911000813.
Der volle Inhalt der QuelleEDWARDS, J. LL J. „The Canadian Security Intelligence Act 1984—a Canadian appraisal“. Oxford Journal of Legal Studies 5, Nr. 1 (1985): 143–53. http://dx.doi.org/10.1093/ojls/5.1.143.
Der volle Inhalt der QuelleGuilford, Katharine Briar. „Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service“. Victoria University of Wellington Law Review 47, Nr. 1 (01.06.2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Der volle Inhalt der QuelleKumari, Rashmi, und Dr Priyanka Singh. „Weaponizing Artificial Intelligence“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 6 (30.06.2023): 966–81. http://dx.doi.org/10.22214/ijraset.2023.53289.
Der volle Inhalt der QuelleShchukina, Tatiana. „Canada's Digital Charter becomes law“. Russia and America in the 21st Century, Nr. 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Der volle Inhalt der QuelleCarabash, Michael P. A. „Section 273.65 of the National Defence Act: Inappropriate and Unconstitutional“. Constitutional Forum / Forum constitutionnel 15, Nr. 1, 2 & 3 (24.07.2011): 2006. http://dx.doi.org/10.21991/c9hq17.
Der volle Inhalt der QuelleLaurin, Patrick. „Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program“. Surveillance & Society 18, Nr. 3 (19.08.2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Der volle Inhalt der QuelleMoraboena, Srikanthyadav, Gayatri Ketepalli und Padmaja Ragam. „A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder“. Revue d'Intelligence Artificielle 34, Nr. 4 (30.09.2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Der volle Inhalt der QuelleMonaghan, Jeffrey. „Security Traps and Discourses of Radicalization: Examining Surveillance Practices Targeting Muslims in Canada“. Surveillance & Society 12, Nr. 4 (19.06.2014): 485–501. http://dx.doi.org/10.24908/ss.v12i4.4557.
Der volle Inhalt der QuelleMeng, Mingming, und Yuancheng Li. „SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks“. PeerJ Computer Science 8 (29.06.2022): e1027. http://dx.doi.org/10.7717/peerj-cs.1027.
Der volle Inhalt der QuelleNath, Seema, Subhranil Som und Mukesh Chandra Negi. „Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices“. International Journal of Knowledge-based and Intelligent Engineering Systems 25, Nr. 1 (09.04.2021): 139–47. http://dx.doi.org/10.3233/kes-210059.
Der volle Inhalt der QuelleDahake, Dr Rupali, und Dr Pallavi Mirajkar. „Integration Tool using Internet of Things in Smart Architecture of Passenger Processing at Airport Terminal“. International Journal of Innovative Technology and Exploring Engineering 11, Nr. 8 (30.07.2022): 93–97. http://dx.doi.org/10.35940/ijitee.h9176.0711822.
Der volle Inhalt der QuelleAlli, P., und J. Dinesh Peter. „A novel auto-encoder induced chaos based image encryption framework aiding DNA computing sequence“. Journal of Intelligent & Fuzzy Systems 41, Nr. 1 (11.08.2021): 181–98. http://dx.doi.org/10.3233/jifs-201224.
Der volle Inhalt der QuelleCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke und Suzanne E. MacDonald. „The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour“. Animals 12, Nr. 13 (01.07.2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Der volle Inhalt der QuelleKreklewetz, Robert G., und Laura J. Burlock. „Policy Forum: Canada's Proposed Cryptoasset Legislation“. Canadian Tax Journal/Revue fiscale canadienne 71, Nr. 1 (April 2023): 73–81. http://dx.doi.org/10.32721/ctj.2023.71.1.pf.kreklewetz.
Der volle Inhalt der QuellePohoretskyi, M. M. „HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES“. Herald of criminal justice, Nr. 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Der volle Inhalt der QuelleKim, Sung-Hwan, Nam-Uk Kim und Tai-Myoung Chung. „Study on sensitive information leakage vulnerability modeling“. Kybernetes 44, Nr. 1 (12.01.2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Der volle Inhalt der QuelleKilcullen, Jack K. „Groping for the Reins: ERISA, HMO Malpractice, and Enterprise Liability“. American Journal of Law & Medicine 22, Nr. 1 (1996): 7–50. http://dx.doi.org/10.1017/s0098858800010285.
Der volle Inhalt der QuelleHerbst, Jan, Matthias Rüb, Sogo Pierre Sanon, Christoph Lipps und Hans D. Schotten. „Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach“. Network 4, Nr. 2 (09.04.2024): 133–49. http://dx.doi.org/10.3390/network4020007.
Der volle Inhalt der QuelleKaiser, Stefan A. „Legal Challenges of Automated and Autonomous Systems“. Volume 60 · 2017 60, Nr. 1 (01.01.2018): 173–201. http://dx.doi.org/10.3790/gyil.60.1.173.
Der volle Inhalt der QuelleMalgwi, Yusuf Musa, Ibrahim Goni und Bamanga Mahmud Ahmad. „Artificial Neural Network Model for Intrusion Detection System“. Mediterranean Journal of Basic and Applied Sciences 06, Nr. 01 (2022): 20–26. http://dx.doi.org/10.46382/mjbas.2022.6103.
Der volle Inhalt der QuelleChatziamanetoglou, Dimitrios, und Konstantinos Rantos. „Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus“. Security and Communication Networks 2023 (13.02.2023): 1–20. http://dx.doi.org/10.1155/2023/3303122.
Der volle Inhalt der QuelleMudaraddi, Kiran, Keerthi T, Likitha Yadav, M. Varsha und Nivedita M. „Weapon Detection System“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 5 (31.05.2023): 3482–87. http://dx.doi.org/10.22214/ijraset.2023.52381.
Der volle Inhalt der QuelleKrishna, R. Venkat, V. Vijayalakshmi und M. Vignesh Balaji. „A Robust Emotion Detection and Music Recommendation System using Mini Xception CNN“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 12 (31.12.2022): 2158–63. http://dx.doi.org/10.22214/ijraset.2022.48387.
Der volle Inhalt der QuelleGopinath, S., S. Pragadeswaran, P. Subaranjani, R. Mounitha und N. Parameshwari. „Ai Based Dual Authentication System“. 4 2, Nr. 4 (01.12.2022): 158–62. http://dx.doi.org/10.46632/daai/2/4/29.
Der volle Inhalt der QuelleSalonen, Jarno, und Alessandro Guarino. „Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics“. International Conference on Cyber Warfare and Security 19, Nr. 1 (21.03.2024): 617–20. http://dx.doi.org/10.34190/iccws.19.1.2066.
Der volle Inhalt der QuelleLi, Yu, Daofang Chang, Yinping Gao, Ying Zou und Chunteng Bao. „Automated Container Terminal Production Operation and Optimization via an AdaBoost-Based Digital Twin Framework“. Journal of Advanced Transportation 2021 (07.09.2021): 1–16. http://dx.doi.org/10.1155/2021/1936764.
Der volle Inhalt der QuelleRajeswari, A. R., K. Kulothungan, Sannasi Ganapathy und Arputharaj Kannan. „Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT“. Journal of Intelligent & Fuzzy Systems 40, Nr. 5 (22.04.2021): 9197–211. http://dx.doi.org/10.3233/jifs-201633.
Der volle Inhalt der QuelleMuravskyi, Volodymyr. „The impact of global technological trends on accounting“. Herald of Ternopil National Economic University, Nr. 4 (86) (12.12.2017): 138–48. http://dx.doi.org/10.35774/visnyk2017.04.138.
Der volle Inhalt der QuelleRamasamy, Mathiyalagan, und Pamela Vinitha Eric. „A novel classification and clustering algorithms for intrusion detection system on convolutional neural network“. Bulletin of Electrical Engineering and Informatics 11, Nr. 5 (01.10.2022): 2845–55. http://dx.doi.org/10.11591/eei.v11i5.4145.
Der volle Inhalt der QuelleRodríguez Marco, José Enrique, Manuel Sánchez Rubio, José Javier Martínez Herráiz, Rafael González Armengod und Juan Carlos Plaza Del Pino. „Contributions to Image Transmission in Icing Conditions on Unmanned Aerial Vehicles“. Drones 7, Nr. 9 (05.09.2023): 571. http://dx.doi.org/10.3390/drones7090571.
Der volle Inhalt der QuelleChuang, Hsiu-Min, Fanpyn Liu und Chung-Hsien Tsai. „Early Detection of Abnormal Attacks in Software-Defined Networking Using Machine Learning Approaches“. Symmetry 14, Nr. 6 (08.06.2022): 1178. http://dx.doi.org/10.3390/sym14061178.
Der volle Inhalt der QuelleZavistovskyi, O. „Professional, service and service-combat activity of the National Police: essence and definition of concepts“. Analytical and Comparative Jurisprudence, Nr. 5 (30.12.2022): 258–62. http://dx.doi.org/10.24144/2788-6018.2022.05.47.
Der volle Inhalt der QuelleKalodanis, Konstantinos, Panagiotis Rizomiliotis und Dimosthenis Anagnostopoulos. „European Artificial Intelligence Act: an AI security approach“. Information & Computer Security, 23.11.2023. http://dx.doi.org/10.1108/ics-10-2022-0165.
Der volle Inhalt der QuelleWest, Leah. „‘Within or outside Canada’: The Charter’s application to the extraterritorial activities of the Canadian Security Intelligence Service“. University of Toronto Law Journal, 05.01.2022. http://dx.doi.org/10.3138/utlj-2021-0105.
Der volle Inhalt der QuelleWest, Leah, und Craig Forcese. „Building Haystacks: Information Retention and Data Exploitation by the Canadian Security Intelligence Service“. Alberta Law Review, 02.10.2019, 175. http://dx.doi.org/10.29173/alr2573.
Der volle Inhalt der QuelleCefaliello, Aude, und Miriam Kullmann. „Offering false security: How the draft artificial intelligence act undermines fundamental workers rights“. European Labour Law Journal, 20.10.2022, 203195252211144. http://dx.doi.org/10.1177/20319525221114474.
Der volle Inhalt der QuelleAlthar, Raghavendra Rao, Debabrata Samanta, Sathvik Purushotham, Sandeep Singh Sengar und Chaminda Hewage. „Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System“. SN Computer Science 4, Nr. 4 (15.04.2023). http://dx.doi.org/10.1007/s42979-023-01785-2.
Der volle Inhalt der QuelleForcese, Craig, und Kent Roach. „Bill C-51 Backgrounder #2: The Canadian Security Intelligence Service's Proposed Power to 'Reduce' Security Threats Through Conduct that May Violate the Law and Charter“. SSRN Electronic Journal, 2015. http://dx.doi.org/10.2139/ssrn.2564272.
Der volle Inhalt der QuelleReyes, Luis, Diana Almeida und Ana Flores. „Information Technologies for Occupational Health and Safety“. Athenea, 01.06.2022, 32–41. http://dx.doi.org/10.47460/10.47460/athenea.v3i8.40.
Der volle Inhalt der QuelleVenkatesh Kumar, M., und C. Lakshmi. „A privacy preservation data collection and access control using entropy-based conic curve“. Journal of Intelligent & Fuzzy Systems, 02.02.2023, 1–14. http://dx.doi.org/10.3233/jifs-223141.
Der volle Inhalt der QuelleKouroupis, Konstantinos. „The AI Act in light of the EU Digital Agenda: A critical approach“. Journal of Data Protection & Privacy, 01.01.2023. http://dx.doi.org/10.69554/fquz5239.
Der volle Inhalt der QuelleAbdullah, Sura Mahmood, und Mustafa Musa Jaber. „Deep learning for content-based image retrieval in FHE algorithms“. Journal of Intelligent Systems 32, Nr. 1 (01.01.2023). http://dx.doi.org/10.1515/jisys-2022-0222.
Der volle Inhalt der QuelleDubiniecki, Abigail. „The directive on security of networks and information systems (NISD): One more critical step towards a ‘connected digital single market’ for the EU“. Journal of Data Protection & Privacy, 01.07.2018. http://dx.doi.org/10.69554/kdhf3147.
Der volle Inhalt der QuelleAlsubai, Shtwai, Ashit Kumar Dutta, Abdul Rahaman Wahab Sait, Yasser Adnan Abu Jaish, Bader Hussain Alamer, Hussam Eldin Hussein Saad und Rashid Ayub. „Enhanced slime mould optimization with convolutional BLSTM autoencoder based malware classification in intelligent systems“. Expert Systems, 04.02.2024. http://dx.doi.org/10.1111/exsy.13557.
Der volle Inhalt der QuelleK. Pazhanivel, S. Sakthi, R. Shilpa und E. Mounika. „AI Based Self Learning Intelligent Information Leak Protection System for TI Companies using LSTM“. International Journal of Advanced Research in Science, Communication and Technology, 10.06.2022, 268–72. http://dx.doi.org/10.48175/ijarsct-4595.
Der volle Inhalt der QuelleCleary, Frances, David C. Henshall und Sasitharan Balasubramaniam. „On-Body Edge Computing Through E-Textile Programmable Logic Array“. Frontiers in Communications and Networks 2 (11.06.2021). http://dx.doi.org/10.3389/frcmn.2021.688419.
Der volle Inhalt der QuelleFowles, Jib. „Television Violence and You“. M/C Journal 3, Nr. 1 (01.03.2000). http://dx.doi.org/10.5204/mcj.1828.
Der volle Inhalt der QuelleRose, Megan Catherine. „The Future Is Furby“. M/C Journal 26, Nr. 2 (25.04.2023). http://dx.doi.org/10.5204/mcj.2955.
Der volle Inhalt der QuelleFranks, Rachel. „Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”“. M/C Journal 20, Nr. 2 (26.04.2017). http://dx.doi.org/10.5204/mcj.1214.
Der volle Inhalt der Quelle