Academic literature on the topic 'Adversary system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adversary system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adversary system"
Coughlan, Stephen G. "The “Adversary System”: Rhetoric or Reality?" Canadian journal of law and society 8, no. 2 (1993): 139–70. http://dx.doi.org/10.1017/s0829320100003203.
Full textChen, Zhengxin. "Knowledge discovery and system‐user adversary." Kybernetes 26, no. 4 (June 1997): 425–41. http://dx.doi.org/10.1108/03684929710176430.
Full textSchulhofer, Stephen J. "The future of the adversary system." Justice Quarterly 3, no. 1 (March 1986): 83–93. http://dx.doi.org/10.1080/07418828600088811.
Full textBelliotti, Raymond A. "Our Adversary System: In Search of a Foundation." Canadian Journal of Law & Jurisprudence 1, no. 1 (January 1988): 19–34. http://dx.doi.org/10.1017/s0841820900000588.
Full textAbrams, Floyd, Robert H. Klonoff, and Paul L. Colby. "Trial Tactics: Sponsorship Costs of the Adversary System." Yale Law Journal 101, no. 5 (March 1992): 1159. http://dx.doi.org/10.2307/796966.
Full textKeeton, Robert E. "Time Limits as Incentives in an Adversary System." University of Pennsylvania Law Review 137, no. 6 (June 1989): 2053. http://dx.doi.org/10.2307/3312205.
Full textVidmar, Neil. "Expert Evidence, the Adversary System, and the Jury." American Journal of Public Health 95, S1 (July 2005): S137—S143. http://dx.doi.org/10.2105/ajph.2004.044677.
Full textSalem, Ahmed, Xuening Liao, Yulong Shen, and Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.
Full textMcGill, William L., and Bilal M. Ayyub. "Multicriteria Security System Performance Assessment Using Fuzzy Logic." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 4, no. 4 (October 2007): 356–76. http://dx.doi.org/10.1177/154851290700400405.
Full textJohnson, Aaron, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson. "PeerFlow: Secure Load Balancing in Tor." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (April 1, 2017): 74–94. http://dx.doi.org/10.1515/popets-2017-0017.
Full textDissertations / Theses on the topic "Adversary system"
Fulchino, Matthew T. "An assessment of uncertainty due to adversary mobility." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100373.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 47-50).
Uncertainty related to an adversary's tactics, techniques, and procedures is often difficult to characterize, particularly during the period immediately before a conflict, when planning for a face-to-face confrontation with a combatant. Adversarial freedom of maneuver and the fixed nature of asset defense leaves limited room for error or half-assessments, yet past analysis of regional defendability presumes a static, symmetric adversary, rather than a nimble, cunning one. This thesis examines historical events to identify the source of uncertainty with respect to defensive operations, and proposes that an alternative measure of performance be evaluated to fully characterize the effectiveness and limitations of defensive elements in the face of a determined peer.
by Matthew T. Fulchino.
S.M. in Engineering and Management
Crispin, K. J., and n/a. "Ethics and the advocate." University of Canberra. Law, 1995. http://erl.canberra.edu.au./public/adt-AUC20060630.172938.
Full textFukasaka, M. "The adversary system of the International Court of Justice : an analytical study." Thesis, University College London (University of London), 2016. http://discovery.ucl.ac.uk/1526961/.
Full textGaines, Phil. "Cross purposes : a critical analysis of the representational force of questions in adversarial legal examination /." Thesis, Connect to this title online; UW restricted, 1998. http://hdl.handle.net/1773/9431.
Full textAscensi, Lionel. "Du principe de la contradiction /." Paris : L.G.D.J, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/51222952X.pdf.
Full textTimmerbeil, Sven. "Witness coaching und adversary system : der Einfluss der Parteien und ihrer Prozessbevollmächtigten auf Zeugen und Sachverständige im deutschen und U.S.-amerikanischen Zivilprozess /." Tübingen : Mohr Siebeck, 2004. http://www.gbv.de/dms/ilmenau/toc/376083883.PDF.
Full textRubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.
Full textWe address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Barreto, Carolina Pereira. "O princípio do contraditório e da ampla defesa no processo administrativo disciplinar." Pós-Graduação em Direito, 2013. https://ri.ufs.br/handle/riufs/4357.
Full textA pesquisa se propõe a estudar o princípio do contraditório e da ampla defesa no processo administrativo disciplinar, analisado não apenas sob seu aspecto formal, mas também material. Para isso, parte-se da visão neoconstitucionalista do direito, caracterizado especialmente pelas transformações verificadas no Estado de Direito e sua influência na atuação administrativa, destacando a constitucionalização do direito administrativo como decorrência deste movimento. Ao tempo que discorrerá sobre o verdadeiro sentido de democracia e a aproximação das relações entre o Estado e o cidadão, lançando como consequência a mudança de enfoque do ato administrativo para processo administrativo. A abordagem trará a ampla processualidade administrativa como novo paradigma sedimentado na consensualidade, participação do cidadão e na legitimidade democrática da atividade estatal, apresentando o processo administrativo como verdadeiro instrumento de atuação positiva do poder público na concretização dos direitos fundamentais e da efetiva democratização do Estado de direito. Nesse contexto, a pesquisa tem como objetivo aprofundar o estudo do princípio do contraditório e da ampla defesa no processo administrativo disciplinar como direito fundamental do cidadão, servindo de instrumento de democratização do Estado, coadunando-se com a nova interpretação e aplicação dos princípios e valores constitucionais. Com a efetividade deste princípio processual constitucional, garante-se ao cidadão a ampla defesa perante as Comissões de Processo Disciplinar, e para que seja efetiva, a defesa deve ser realizada de forma técnica a ponto de influenciar a decisão do julgador no processo administrativo. Dessa forma, a discussão da controvérsia dar-se-á em torno da análise da nova visão do direito neoconstitucionalista, mais voltada para concretização dos valores constitucionais e na efetividade dos direitos fundamentais, em contraposição à prática jurisprudencial da Corte Suprema, diante das razões que motivaram a Súmula Vinculante n. 05.
Queiroz, Pedro Gomes de. "O princípio da cooperação e a exibição de documento ou coisa no Processo Civil." Universidade do Estado do Rio de Janeiro, 2014. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=7474.
Full textThe dissertation seeks to establish the constitutional and legal foundations of the principle of cooperation in civil procedure, describing it as an implicit constitutional principle deriving from the principle of solidarity (art. 3., I, Constitution of the Federative Republic of Brazil - CFRB), access to justice (art. 5., XXXV , CFRB), due process of law (art. 5, LIV , CFRB), adversary system (art. 5., LV , CF/1988) and reasonable duration of proceedings ( art. 5. , LXXVIII , CF/1988) . The essay seeks to demonstrate that the principle of cooperation is the basic idea of various provisions of the Code of Civil Procedure (CPC) of 1973 and of the Project of the New CPC, including the art. 339 of CPC/1973 and those that discipline the disclosure of documents and things. The dissertation seeks to establish the limits to the principle of cooperation in the Brazilian legal system, in particular the right to privacy (art. 5. , X, CF/1988) and the right to remain silent (art. 5. , LXIII , CF / 1988). At last, the dissertation seeks to establish the essence of the principle of cooperation and the way it operates in civil procedure.
Cambazoglu, Volkan. "Protocol, mobility and adversary models for the verification of security." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202017.
Full textQC 20170217
ProFuN
Books on the topic "Adversary system"
Strier, Franklin D. The adversary system: An annotated bibliography. Littleton, Colo: F.B. Rothman, 1990.
Find full textTidmarsh, Jay. Complex litigation and the adversary system. New York: Foundation Press, 1998.
Find full textAmerican Bar Association. Section of Litigation., ed. Readings on adversarial justice: The American approach to adjudication. St. Paul, Minn: West Pub. Co., 1988.
Find full textWitness Coaching und Adversary System: Der Einfluss der Parteien und ihrer Prozessbevollmächtigten auf Zeugen und Sachverständige im deutschen und US-amerikanischen Zivilprozess. Tübingen: Mohr Siebeck, 2004.
Find full textD, Jackson John. Judge without jury: Diplock trials in the adversary system. Oxford: Clarendon Press, 1995.
Find full textThe origins of adversary criminal trial. Oxford: Oxford University Press, 2003.
Find full textSosti͡azatelʹnyĭ ugolovnyĭ prot͡sess. Moskva: R. Valent, 2006.
Find full textDarovskikh, S. M. Pravovye pozit︠s︡ii Konstitut︠s︡ionnogo Suda RF, kasai︠u︡shchiesi︠a︡ realizat︠s︡ii print︠s︡ipa sosti︠a︡zatelʹnosti v ugolovnom sudoproizvodstve. Moskva: I︠U︡rlitinform, 2011.
Find full textBelkin, A. R. Teorii︠a︡ ugolovnogo prot︠s︡essa: Sosti︠a︡zatelʹnostʹ : monografii︠a︡. Moskva: Izdatelʹstvo "I︠U︡rlitinform", 2013.
Find full textDarovskikh, S. M. Pravovye pozit︠s︡ii Konstitut︠s︡ionnogo Suda RF, kasai︠u︡shchiesi︠a︡ realizat︠s︡ii print︠s︡ipa sosti︠a︡zatelʹnosti v ugolovnom sudoproizvodstve. Moskva: I︠U︡rlitinform, 2011.
Find full textBook chapters on the topic "Adversary system"
Adkins, Steve, Slobodan Djordjević, and Dragan A. Savić. "Wastewater System Ventilation – A Friend or Adversary?" In New Trends in Urban Drainage Modelling, 712–16. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99867-1_123.
Full textDe, Sourya Joyee, and Asim K. Pal. "Auctions with Rational Adversary." In Information Systems Security, 91–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_7.
Full textGalib, Asadullah Al, and Rashedur Mohammad Rahman. "Cloud Location Verification and Adversary Identification." In Advances in Intelligent Systems and Computing, 337–48. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13153-5_33.
Full textDavis, Paul K. "Simple Culture-Informed Cognitive Models of the Adversary." In Intelligent Systems Reference Library, 235–61. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67024-9_11.
Full textJani, Athraa Juhi. "Consensus Problem with the Existence of an Adversary Nanomachine." In Advances in Intelligent Systems and Computing, 407–19. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16184-2_39.
Full textReddy, Ankinapalli Uma Maheswara, Agepati Sai Hareesh, and B. Ankayarkanni. "An Internal Adversary Model to Prevent Selective Jamming Attacks." In Advances in Power Systems and Energy Management, 591–97. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-7504-4_59.
Full textCallen, Craig R. "Othello Could Not Optimize: Economics, Hearsay, and Less Adversary Systems." In The Dynamics of Judicial Proof, 437–53. Heidelberg: Physica-Verlag HD, 2002. http://dx.doi.org/10.1007/978-3-7908-1792-8_22.
Full textChan, T. H. Hubert, Li Ning, and Yong Zhang. "Maximizing the Expected Influence in Face of the Non-progressive Adversary." In Wireless Algorithms, Systems, and Applications, 28–39. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59016-1_3.
Full textChandel, Sonali, Wenxuan Cao, Zijing Sun, Jiayi Yang, Bailu Zhang, and Tian-Yi Ni. "A Multi-dimensional Adversary Analysis of RSA and ECC in Blockchain Encryption." In Lecture Notes in Networks and Systems, 988–1003. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_67.
Full textAmini, M. Hadi, Javad Khazaei, Darius Khezrimotlagh, and Arash Asrari. "Bi-level Adversary-Operator Cyberattack Framework and Algorithms for Transmission Networks in Smart Grids." In Advances in Intelligent Systems and Computing, 183–202. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34094-0_8.
Full textConference papers on the topic "Adversary system"
Bai, Xiaofei, Jian Gao, Chenglong Hu, and Liang Zhang. "Constructing an Adversary Solver for Equihash." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23337.
Full textLeMay, Elizabeth, Willard Unkenholz, Donald Parks, Carol Muehrcke, Ken Keefe, and William H. Sanders. "Adversary-driven state-based system security evaluation." In the 6th International Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1853919.1853926.
Full textAzfar, Abdullah, Kim-Kwang Raymond Choo, and Lin Liu. "An Android Social App Forensics Adversary Model." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.693.
Full textGraf, Jonathan, and Graf Research. "Towards system-level adversary attack surface modeling for microelectronics trust." In 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS). IEEE, 2016. http://dx.doi.org/10.1109/naecon.2016.7856852.
Full textRege, Aunshul, Frank Ferrese, Saroj Biswas, and Li Bai. "Adversary dynamics and smart grid security: A multiagent system approach." In 2014 7th International Symposium on Resilient Control Systems (ISRCS). IEEE, 2014. http://dx.doi.org/10.1109/isrcs.2014.6900101.
Full textKomalarajun, Kanpirom. "Should the Non-Adversary System be Adopted for Criminal Courts in Thailand?" In International Conference on Economics and Management Innovations (ICEMI). Volkson Press, 2017. http://dx.doi.org/10.26480/icemi.01.2017.299.301.
Full textGoodge, Adam, Bryan Hooi, See Kiong Ng, and Wee Siong Ng. "Robustness of Autoencoders for Anomaly Detection Under Adversarial Impact." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/173.
Full textКнязь, Владимир, Vladimir Knyaz', Марк Козырев, Mark Kozyrev, Артём Бордодымов, and Artem Bordodymov. "Thermal-to-color image translation for visualization on the pilot's display." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-1-70-73.
Full textSingh, Vivek K., and Mohan S. Kankanhalli. "Towards Adversary Aware Surveillance Systems." In Multimedia and Expo, 2007 IEEE International Conference on. IEEE, 2007. http://dx.doi.org/10.1109/icme.2007.4285081.
Full textKontouras, Efstathios, Anthony Tzes, and Leonidas Dritsas. "Adversary control strategies for discrete-time systems." In 2014 European Control Conference (ECC). IEEE, 2014. http://dx.doi.org/10.1109/ecc.2014.6862519.
Full textReports on the topic "Adversary system"
Merkle, Peter Benedict. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment. Office of Scientific and Technical Information (OSTI), March 2006. http://dx.doi.org/10.2172/883485.
Full textMegersa, Kelbesa. Tax Transparency for an Effective Tax System. Institute of Development Studies (IDS), January 2021. http://dx.doi.org/10.19088/k4d.2021.070.
Full textClarke, Alison, Sherry Hutchinson, and Ellen Weiss. Psychosocial support for children. Population Council, 2005. http://dx.doi.org/10.31899/hiv14.1003.
Full text