Journal articles on the topic 'Adversary system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adversary system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Coughlan, Stephen G. "The “Adversary System”: Rhetoric or Reality?" Canadian journal of law and society 8, no. 2 (1993): 139–70. http://dx.doi.org/10.1017/s0829320100003203.
Full textChen, Zhengxin. "Knowledge discovery and system‐user adversary." Kybernetes 26, no. 4 (June 1997): 425–41. http://dx.doi.org/10.1108/03684929710176430.
Full textSchulhofer, Stephen J. "The future of the adversary system." Justice Quarterly 3, no. 1 (March 1986): 83–93. http://dx.doi.org/10.1080/07418828600088811.
Full textBelliotti, Raymond A. "Our Adversary System: In Search of a Foundation." Canadian Journal of Law & Jurisprudence 1, no. 1 (January 1988): 19–34. http://dx.doi.org/10.1017/s0841820900000588.
Full textAbrams, Floyd, Robert H. Klonoff, and Paul L. Colby. "Trial Tactics: Sponsorship Costs of the Adversary System." Yale Law Journal 101, no. 5 (March 1992): 1159. http://dx.doi.org/10.2307/796966.
Full textKeeton, Robert E. "Time Limits as Incentives in an Adversary System." University of Pennsylvania Law Review 137, no. 6 (June 1989): 2053. http://dx.doi.org/10.2307/3312205.
Full textVidmar, Neil. "Expert Evidence, the Adversary System, and the Jury." American Journal of Public Health 95, S1 (July 2005): S137—S143. http://dx.doi.org/10.2105/ajph.2004.044677.
Full textSalem, Ahmed, Xuening Liao, Yulong Shen, and Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.
Full textMcGill, William L., and Bilal M. Ayyub. "Multicriteria Security System Performance Assessment Using Fuzzy Logic." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 4, no. 4 (October 2007): 356–76. http://dx.doi.org/10.1177/154851290700400405.
Full textJohnson, Aaron, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson. "PeerFlow: Secure Load Balancing in Tor." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (April 1, 2017): 74–94. http://dx.doi.org/10.1515/popets-2017-0017.
Full textMacKenzie, Gavin. "Breaking the Dichotomy Habit: The Adversary System and the Ethics of Professionalism." Canadian Journal of Law and Jurisprudence 9, no. 01 (January 1996): 33–50. http://dx.doi.org/10.1017/s0841820900003337.
Full textOldham, James. "Truth-Telling in the Eighteenth-Century English Courtroom." Law and History Review 12, no. 1 (1994): 95–121. http://dx.doi.org/10.1017/s0738248000011263.
Full textRomeo, Andrea. "The Adversary System of Excuse and the Lawyer’s Role." Archiv fuer Rechts- und Sozialphilosophie 104, no. 4 (2018): 570. http://dx.doi.org/10.25162/arsp-2018-0030.
Full textMcCullough, Keith P. "Judge without jury: Diplock trials in the adversary system." Journal of Criminal Justice 24, no. 6 (January 1996): 567–69. http://dx.doi.org/10.1016/s0047-2352(97)81180-4.
Full textJolowicz, J. A. "Exchange of Witnesses' Statements—Privilege and the Adversary System." Cambridge Law Journal 48, no. 1 (March 1989): 41–43. http://dx.doi.org/10.1017/s0008197300108311.
Full text변진석. "Litigation System and Citizen Confidence in Judicial System: Ideas from the US Adversary System." Seoul Law Review 23, no. 3 (February 2016): 265–95. http://dx.doi.org/10.15821/slr.2016.23.3.009.
Full textKruse, Katherine R. "Wrongful Convictions and Upstream Reform in the Criminal Justice System." Texas A&M Law Review 3, no. 2 (September 2015): 367–93. http://dx.doi.org/10.37419/lr.v3.i2.5.
Full textBrookbank, C. R. "The Adversary System in Canadian Industrial Relations: Blight or Blessing?" Relations industrielles 35, no. 1 (April 12, 2005): 20–40. http://dx.doi.org/10.7202/029035ar.
Full textSabir Idrees, Muhammad, Yves Roudier, and Ludovic Apvrille. "Model the System from Adversary Viewpoint: Threats Identification and Modeling." Electronic Proceedings in Theoretical Computer Science 165 (October 13, 2014): 45–58. http://dx.doi.org/10.4204/eptcs.165.4.
Full textGinsburg, Tom. "The Japanese Adversary System in Context: Controversies and Comparisons (review)." Journal of Japanese Studies 30, no. 2 (2004): 572–77. http://dx.doi.org/10.1353/jjs.2004.0059.
Full textHead, Brian W. "The Australian party system: Adversary politics and the convergence thesis." Politics 20, no. 2 (November 1985): 89–94. http://dx.doi.org/10.1080/00323268508401967.
Full textYoo, Jeong Do, Eunji Park, Gyungmin Lee, Myung Kil Ahn, Donghwa Kim, Seongyun Seo, and Huy Kang Kim. "Cyber Attack and Defense Emulation Agents." Applied Sciences 10, no. 6 (March 21, 2020): 2140. http://dx.doi.org/10.3390/app10062140.
Full textKruglik, Stanislav. "Minimum-storage regenerating codes resistant to special adversary." Information and Control Systems, no. 1 (March 3, 2021): 38–44. http://dx.doi.org/10.31799/1684-8853-2021-1-38-44.
Full textBall-Rokeach, Sandra J., and William E. Loges. "Ally or Adversary? Using Media Systems for Public Health." Prehospital and Disaster Medicine 15, no. 4 (December 2000): 62–69. http://dx.doi.org/10.1017/s1049023x00025309.
Full textKalpanaDhanji, Patel, and Santhoshkumarsingh Santhoshkumarsingh. "Assault Discovery and Localizing Adversary in Remote Networks." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 81. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp81-84.
Full textHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi, and Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing." Security and Communication Networks 2020 (August 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Full textSangaiah, Arun Kumar, Darshan Vishwasrao Medhane, Gui-Bin Bian, Ahmed Ghoneim, Mubarak Alrashoud, and M. Shamim Hossain. "Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System." IEEE Transactions on Industrial Informatics 16, no. 5 (May 2020): 3322–29. http://dx.doi.org/10.1109/tii.2019.2953289.
Full textPurdy,, Donald A. "Federal Sentencing Training for Private Defense Attorneys in Our Adversary System." Federal Sentencing Reporter 10, no. 6 (May 1, 1998): 314–17. http://dx.doi.org/10.2307/20640109.
Full textQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Full textJaggard, Aaron D., Aaron Johnson, Sarah Cortes, Paul Syverson, and Joan Feigenbaum. "20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables." Proceedings on Privacy Enhancing Technologies 2015, no. 1 (April 1, 2015): 4–24. http://dx.doi.org/10.1515/popets-2015-0002.
Full textWang, Chenyu, Guoai Xu, and Wenting Li. "A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment." Security and Communication Networks 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/9062675.
Full textNirmala, Puspita. "Adversary System in Common Law Countries and Possibility for Implementation in Indonesian Court." Amsir Law Journal 2, no. 1 (September 25, 2020): 12–20. http://dx.doi.org/10.36746/alj.v2i1.28.
Full textGertner, Nancy, and Joseph Sanders. "Alternatives to Traditional Adversary Methods of Presenting Scientific Expertise in the Legal System." Daedalus 147, no. 4 (October 2018): 135–51. http://dx.doi.org/10.1162/daed_a_00525.
Full textMuthukumaran V., Manimozhi I., Praveen Sundar P. V., Karthikeyan T., and Magesh Gopu. "Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring." International Journal of e-Collaboration 17, no. 3 (July 2021): 25–45. http://dx.doi.org/10.4018/ijec.2021070102.
Full textPetrakova, S. A. "Evolution of the adversary (on the example of criminal proceedings)." Institute Bulletin: Crime, Punishment, Correction 13, no. 2 (July 19, 2019): 222–28. http://dx.doi.org/10.46741/2076-4162-2019-13-2-222-228.
Full textFarshteindiker, Adi, and Rami Puzis. "Leadership Hijacking in Docker Swarm and Its Consequences." Entropy 23, no. 7 (July 19, 2021): 914. http://dx.doi.org/10.3390/e23070914.
Full textInthavisas, K., and N. Sungprasert. "Security Evaluation on Speech Biometric Authentication System." Advanced Materials Research 717 (July 2013): 826–31. http://dx.doi.org/10.4028/www.scientific.net/amr.717.826.
Full textAntwiwaa, A., A. Kumar, and A. K. Jaiswal. "Source based Security Issues in WDM Systems." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (August 1, 2017): 2101. http://dx.doi.org/10.11591/ijece.v7i4.pp2101-2108.
Full textParande, Somu, and Jayashree D. Mallapur. "Tactical approach to identify and quarantine spurious node participation request in sensory application." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3451. http://dx.doi.org/10.11591/ijece.v10i4.pp3451-3459.
Full textSANDERS, ANDREW. "Judge Without Jury: Diplock Trials in the Adversary System, J. Jackson and S. Doran." Howard Journal of Criminal Justice 35, no. 4 (January 26, 2009): 373–74. http://dx.doi.org/10.1111/j.1468-2311.1996.tb00885.x.
Full textBarbosa, Geraldo. "A Wireless Physically Secure Key Distribution System." Journal of Information Security and Cryptography (Enigma) 3, no. 1 (September 3, 2016): 9. http://dx.doi.org/10.17648/enig.v3i1.56.
Full textJung, Junwoo, Jaesung Lim, Sungyeol Park, Haengik Kang, and Seungbok Kwon. "Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System." Applied Sciences 11, no. 5 (March 3, 2021): 2198. http://dx.doi.org/10.3390/app11052198.
Full textBergadano, Francesco, Fabio Carretto, Fabio Cogno, and Dario Ragno. "Defacement Detection with Passive Adversaries." Algorithms 12, no. 8 (July 29, 2019): 150. http://dx.doi.org/10.3390/a12080150.
Full textLi, Mingzhen, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen, Yixian Yang, and Guangcan Yang. "Cross-Platform Strong Privacy Protection Mechanism for Review Publication." Security and Communication Networks 2021 (June 8, 2021): 1–22. http://dx.doi.org/10.1155/2021/5556155.
Full textHatzivassiliou, Evanthis. "Images of the Adversary: NATO Assessments of the Soviet Union, 1953–1964." Journal of Cold War Studies 11, no. 2 (April 2009): 89–116. http://dx.doi.org/10.1162/jcws.2009.11.2.89.
Full textBundy, Stephen McG, and Einer Richard Elhauge. "Do Lawyers Improve the Adversary System? A General Theory of Litigation Advice and Its Regulation." California Law Review 79, no. 2 (March 1991): 313. http://dx.doi.org/10.2307/3480690.
Full textCohen, Elliot D. "Pure legal advocates and moral agents: Two concepts of a lawyer in an adversary system." Criminal Justice Ethics 4, no. 1 (January 1985): 38–59. http://dx.doi.org/10.1080/0731129x.1985.9991769.
Full textGlasser, Cyril. "Civil Procedure and the Lawyers-The Adversary System and the Decline of the Orality Principle." Modern Law Review 56, no. 3 (May 1993): 307–24. http://dx.doi.org/10.1111/j.1468-2230.1993.tb02675.x.
Full textShuman, Daniel W., and Stuart A. Greenberg. "The expert witness, the adversary system, and the voice of reason: Reconciling impartiality and advocacy." Professional Psychology: Research and Practice 34, no. 3 (2003): 219–24. http://dx.doi.org/10.1037/0735-7028.34.3.219.
Full textOrmrod, David, and Benjamin Turnbull. "Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success." International Journal of Cyber Warfare and Terrorism 7, no. 4 (October 2017): 1–13. http://dx.doi.org/10.4018/ijcwt.2017100101.
Full text