Academic literature on the topic 'Author verification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Author verification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Author verification"
Halteren, Hans Van. "Author verification by linguistic profiling." ACM Transactions on Speech and Language Processing 4, no. 1 (January 2007): 1–17. http://dx.doi.org/10.1145/1187415.1187416.
Full textSimonova, Natalia S. "An International Verifi cation Institute as an Element of the Mechanism of Ensuring for Meeting Commitments under International Treaties." Moscow Journal of International Law, no. 1 (March 30, 2014): 82–102. http://dx.doi.org/10.24833/0869-0049-2014-1-82-102.
Full textFang, Yong, Yue Yang, and Cheng Huang. "EmailDetective: An Email Authorship Identification And Verification Model." Computer Journal 63, no. 11 (July 13, 2020): 1775–87. http://dx.doi.org/10.1093/comjnl/bxaa059.
Full textPotha, Nektaria, and Efstathios Stamatatos. "Improved algorithms for extrinsic author verification." Knowledge and Information Systems 62, no. 5 (October 8, 2019): 1903–21. http://dx.doi.org/10.1007/s10115-019-01408-4.
Full textLazić, Ranko. "Verification Column." ACM SIGLOG News 9, no. 4 (October 2022): 26. http://dx.doi.org/10.1145/3583660.3583665.
Full textПинчук, Л. В. "The definition and features of on-site verification of testimony." Surgut State University Journal 12, no. 1 (2024): 105–12. http://dx.doi.org/10.35266/2949-3455-2024-1-11.
Full textCastillo, Esteban, Ofelia Cervantes, and Darnes Vilari. "Author verification using a Graph-based Representation." International Journal of Computer Applications 123, no. 14 (August 18, 2015): 1–8. http://dx.doi.org/10.5120/ijca2015905654.
Full textPotha, Nektaria, and Efstathios Stamatatos. "Improving author verification based on topic modeling." Journal of the Association for Information Science and Technology 70, no. 10 (March 7, 2019): 1074–88. http://dx.doi.org/10.1002/asi.24183.
Full textBytchkov, V. "The IAEA verification activity." Pathways to Peace and Security, no. 2 (2022): 245–62. http://dx.doi.org/10.20542/2307-1494-2022-2-245-262.
Full textOstapenko, Oleksiy, and Iryna Shulhan. "Verification – as a form of legal support for the mobilization of ukrainian citizens under martial law." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 10, no. 40 (December 18, 2023): 143–54. http://dx.doi.org/10.23939/law2023.40.143.
Full textDissertations / Theses on the topic "Author verification"
Hammoud, Khodor. "Trust in online data : privacy in text, and semantic-based author verification in micro-messages." Electronic Thesis or Diss., Université Paris Cité, 2021. http://www.theses.fr/2021UNIP5203.
Full textMany Problems surround the spread and use of data on social media. There is a need to promote trust on social platforms, regarding the sharing and consumption of data. Data online is mostly in textual form which poses challenges for automation solutions because of the richness of natural language. In addition, the use of micro-messages as the main means of communication on social media makes the problem much more challenging because of the scarceness of features to analyze per body of text. Our experiments show that data anonymity solutions cannot preserve user anonymity without sacrificing data quality. In addition, in the field of author verification, which is the problem of determining if a body of text was written by a specific person or not, given a set of documents known to be authored by them, we found a lack of research working with micro-messages. We also noticed that the state-of-the-art does not take text semantics into consideration, making them vulnerable to impersonation attacks. Motivated by these findings, we devote this thesis to tackle the tasks of (1) identifying the current problems with user data anonymity in text, and provide an initial novel semantic-based approach to tackle this problem, (2) study author verification in micro-messages and identify the challenges in this field, and develop a novel semantics-based approach to solve these challenges, and (3) study the effect of including semantics in handling manipulation attacks, and the temporal effect of data, where the authors might have changing opinions over time. The first part of the thesis focuses on user anonymity in textual data, with the aim to anonymize personal information from online user data for safe data analysis without compromising users’ privacy. We present an initial novel semantic-based approach, which can be customized to balance between preserving data quality and maximizing user anonymity depending on the application at hand. In the second part, we study author verification in micro-messages on social media. We confirm the lack of research in author verification on micro-messages, and we show that the state-of-the-art, which primarily handles long and medium-sized texts, does not perform well when applied on micro-messages. Then we present a semantics-based novel approach which uses word embeddings and sentiment analysis to collect the author’s opinion history to determine the correctness of the claim of authorship, and show its competitive performance on micro-messages. We use these results in the third part of the thesis to further improve upon our approach. We construct a dataset consisting of the tweets of the 88 most followed twitter influencers. We use it to show that the state-of-the-art is not able to handle impersonation attacks, where the content of a tweet is altered, changing the message behind the tweet, while the writing pattern is preserved. On the other hand, since our approach is aware of the text’s semantics, it is able to detect text manipulations with an accuracy above 90%. And in the fourth part of the thesis, we analyze the temporal effect of data on our approach for author verification. We study the change of authors’ opinions over time, and how to accommodate for that in our approach. We study trends of sentiments of an author per a specific topic over a period of time, and predict false authorship claims depending on what timeframe does the claim of authorship fall in
VASILIU, GRADINARIU MARIA. "Modelisation, verification et raffinement des algorithmes auto-stabilisants." Paris 11, 2000. http://www.theses.fr/2000PA112361.
Full textKebaili, Mejid. "Réflexions autour de la méthodologie de vérification des circuits multi-horloges : analyse qualitative et automatisation." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT064/document.
Full textFor several years now, the digital IC market has been requiring both more complex systems and reduced production times. In this context, the semiconductor chip maker companies call on external IP providers offering components working on dedicated clock signals. When these IPs communicate between them, the source and destination clocks are not the same, we talk about "Clock Domain Crossing" (CDC).CDC correspond to asynchronous communications and can cause critical failures. Furthermore, due to the complexity and the random nature of CDC issues, they can not be exhaustively checked with methods such as timing analysis or functional simulation. With the increase of CDC in the digital designs, EDA tools providers have developed software solutions dedicated to CDC static verification.Whereas, the designs are subject to continuous change, the verification tools are not able to be up to date. To resolve these practical issues, the CDC industrial verification is based on the specification of constraints and exclusions by the user. This manual flow, which replaces the tools, can mask bugs. Moreover, the human effort required by this approach is incompatible with the time allowed to industrial designs development.Our goal has been to automate the verification submitting solutions based on formal properties.The work consisted in the analysis of the different CDC design and verification approaches through the evaluation of main CDC checker tools. From the results obtained, we have formalized the practical problems and proposed models to obtain automatically exhaustive results. The tests have been performed on a processor-based subsystem (CPUSS) developed at STMicroelectronics.Adopting our models enables a complete checking of CPUSS in an automatic way, which is essential within a competitive industrial environment. Actually, the amount of information to be specified by the user has been reduced by half for each one of the evaluated tools. Otherwise, this work has shown that the development axis of the CDC tools despite the addition of functionalities such as hierarchical flows or fault injection, doesn’t improve the quality of results (QoR). Since a collaboration has been established with the main tool providers some solutions would probably be included into the tools over the coming years
Ahmad, Manzoor. "Modeling and verification of functional and non functional requirements of ambient, self adaptative systems." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00965934.
Full textGraja, Zaineb. "Vérification formelle des systèmes multi-agents auto-adaptatifs." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30105/document.
Full textA major challenge for the development of self-organizing MAS is to guarantee the convergence of the system to the overall function expected by an external observer and to ensure that agents are able to adapt to changes. In the literature, several works were based on simulation and model-checking to study self-organizing MAS. The simulation allows designers to experiment various settings and create some heuristics to facilitate the system design. Model checking provides support to discover deadlocks and properties violations. However, to cope with the complexity of self-organizing MAS, the designer also needs techniques that support not only verification, but also the development process itself. Moreover, such techniques should support disciplined development and facilitate reasoning about various aspects of the system behavior at different levels of abstraction. In this thesis, three essential contributions were made in the field of formal development and verification of self-organizing MAS: a formalization with the Event-B language of self-organizing MAS key concepts into three levels of abstraction, an experimentation of a top-down refinement strategy for the development of self-organizing MAS and the definition of a bottom-up refinement process based on refinement patterns
Stuner, Bruno. "Cohorte de réseaux de neurones récurrents pour la reconnaissance de l'écriture." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMR024.
Full textState-of-the-art methods for handwriting recognition are based on LSTM recurrent neural networks (RNN) which achieve high performance recognition. In this thesis, we propose the lexicon verification and the cohort generation as two new building blocs to tackle the problem of handwriting recognition which are : i) the large vocabulary problem and the use of lexicon driven methods ii) the combination of multiple optical models iii) the need for large labeled dataset for training RNN. The lexicon verification is an alternative to the lexicon driven decoding process and can deal with lexicons of 3 millions words. The cohort generation is a method to get easily and quickly a large number of complementary recurrent neural networks extracted from a single training. From these two new techniques we build and propose a new cascade scheme for isolated word recognition, a new line level combination LV-ROVER and a new self-training strategy to train LSTM RNN for isolated handwritten words recognition. The proposed cascade combines thousands of LSTM RNN with lexicon verification and achieves state-of-the art word recognition performance on the Rimes and IAM datasets. The Lexicon Verified ROVER : LV-ROVER, has a reduce complexity compare to the original ROVER algorithm and combine hundreds of recognizers without language models while achieving state of the art for handwritten line text on the RIMES dataset. Our self-training strategy use both labeled and unlabeled data with the unlabeled data being self-labeled by its own lexicon verified predictions. The strategy enables self-training with a single BLSTM and show excellent results on the Rimes and Iam datasets
Khebbeb, Khaled. "Formalisation et évaluation de stratégies d’élasticité multi-couches dans le Cloud." Thesis, Pau, 2019. http://www.theses.fr/2019PAUU3010.
Full textElasticity property allows Cloud systems to adapt to their incoming workload by provisioning and de-provisioning computing resources in an autonomic manner, as the demand rises and drops. Due to the unpredictable nature of the workload and the numerous factors that impact elasticity, providing accurate action plans to insure a Cloud system's elasticity while preserving high level policies (performance, costs, etc.) is a particularly challenging task. This thesis aims at providing a thorough specification and implementation of Cloud systems, by relying on bigraphs as a formal model, over two aspects: structural and behavioral.Structurally, the goal is to define a correct modeling of Cloud systems' "back-end" structure. This part is supported by the specification capabilities of Bigraph formalism. Specifically, via "sorting" mechanisms and construction rules that allow defining the designer's desiderata. As for the behavioral part, it consists of model, implement and validate generic elasticity strategies in order to describe Cloud systems' auto-adaptive behaviors (i.e., horizontal and vertical scaling, migration, etc.) in a cross-layer manner (i.e., at service and infrastructure levels). These tasks are supported by the dynamic aspects of Bigraphical Reactive Systems (BRS) formalism (through reaction rules).The introduced elasticity strategies aim at guiding the conditional triggering of the defined reaction rules, to describe Cloud systems' auto-scaling behaviors in a cross-layered manner. The encoding of these specifications and their implementation are defined in Rewrite Logic via Maude language. Their correctness is formally verified through a model-checking technique supported by the linear temporal logic LTL.In order to quantitatively validate these contributions, we propose a queuing-based approach in order to evaluate, analyze and discuss elasticity strategies in Cloud systems through different simulated execution scenarios. In this work, we explore the definition of a “good” strategy through a case study which considers the changing nature of the input workload. We propose an original way de compose different cross-layer elasticity strategies to guarantee different high-level policies
Guillaumin, Matthieu. "Données multimodales pour l'analyse d'image." Phd thesis, Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00522278/en/.
Full textGuillaumin, Matthieu. "Données multimodales pour l'analyse d'image." Phd thesis, Grenoble, 2010. http://www.theses.fr/2010GRENM048.
Full textThis dissertation delves into the use of textual metadata for image understanding. We seek to exploit this additional textual information as weak supervision to improve the learning of recognition models. There is a recent and growing interest for methods that exploit such data because they can potentially alleviate the need for manual annotation, which is a costly and time-consuming process. We focus on two types of visual data with associated textual information. First, we exploit news images that come with descriptive captions to address several face related tasks, including face verification, which is the task of deciding whether two images depict the same individual, and face naming, the problem of associating faces in a data set to their correct names. Second, we consider data consisting of images with user tags. We explore models for automatically predicting tags for new images, i. E. Image auto-annotation, which can also used for keyword-based image search. We also study a multimodal semi-supervised learning scenario for image categorisation. In this setting, the tags are assumed to be present in both labelled and unlabelled training data, while they are absent from the test data. Our work builds on the observation that most of these tasks can be solved if perfectly adequate similarity measures are used. We therefore introduce novel approaches that involve metric learning, nearest neighbour models and graph-based methods to learn, from the visual and textual data, task-specific similarities. For faces, our similarities focus on the identities of the individuals while, for images, they address more general semantic visual concepts. Experimentally, our approaches achieve state-of-the-art results on several standard and challenging data sets. On both types of data, we clearly show that learning using additional textual information improves the performance of visual recognition systems
Shiau, Wen-Ming, and 蕭文明. "Link Quality Control System and Laboratory Auto-verification System as ASTM Protocol." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/znjxfj.
Full text國立中正大學
資訊管理學系暨研究所
103
The accuracy of clinical diagnoses is important at all levels of hospitals. Laboratory test reports offer one of the foundations upon which physicians make medical decisions. The workflow of clinical laboratories can be divided by tasks into three stages, namely pre-examination, examination, and post-examination. The tasks in the pre-examination stage are collection, preservation, processing, and delivery of samples. The main task in the examination stage is to analyze the test while maintaining the analysis quality. The tasks in the post-examination stage are to validate the accuracy of the analysis results and to transmit data to laboratory information systems (LIS). Each process and step in these stages has a decisive effect on the analysis results. The analysis results can help physicians provide the most effective treatments only when each step of the test has been carried out with no error. In 1990s, there has been a rapid growth of laboratory automation facilities, especially in the US, European nations, and Japan. With the increasing prevalence of these automation facilities, the work efficiency at clinical laboratories has also improved. The maintenance and quality control of automation facilities has also become a new issue for clinical laboratories. Without regular and proper maintenance, the accuracy of the analysis results generated by these facilities will be affected. Therefore, quality control in clinical laboratories has been a common goal of all laboratories in recent years. Through quality control, they can maintain the accuracy of analysis results and further speed up the release of reports, improve the healthcare quality, and promote doctor-patient relationships. Laboratory auto-verification system is a system that all clinical laboratories seek to build. By integrating the existing real-time quality management system and using ASTM protocol, the two systems can be connected via RS-232. In addition to providing real-time diagnosis of transmission quality, the system can achieve automatic verification of test reports, improve the report release efficiency, and shorten the required time of laboratory tests at a minimum cost.
Books on the topic "Author verification"
Panokin, Aleksandr. Verification of court decisions in criminal cases: history and modernity. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1836962.
Full textTuzov, Andrey, and Nikolay Stoyko. Verification proceedings in the criminal proceedings of the Czech Republic. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2056731.
Full textApasova, Ekaterina, Nikita Kochetkov, Irina Kulagina, Mariya Nikitskaya, Alla Pogodina, Marina Rashodchikova, Nataliya Tolstyh, Irina Uglanova, and Valeriy Fedorov. Educational motivation: development of methodological tools. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2055741.
Full textUrban, Susanne. Nach der Schoah: Judishe Autoren und Deutschland : Literatur zwischen Selbstvergewisserung und Selbstbestimmung = After the Schoah : Jewish authors and Germany : literature between verification and self-determination. Frankfurt/Main: Buchmesse, Frankfurt Book Fair, 2001.
Find full textUrban, Susanne. Nach der Schoah: Judishe Autoren und Deutschland : Literatur zwischen Selbstvergewisserung und Selbstbestimmung = After the Schoah : Jewish authors and Germany : literature between verification and self-determination. Frankfurt/Main: Buchmesse, Frankfurt Book Fair, 2001.
Find full textShishkina, Elena. Tactical and forensic support of investigative activities. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1246682.
Full textKazakova, Nataliya. Internal audit of estimated reserves and liabilities as a method for diagnosing corporate risks. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1089678.
Full textAndrichenko, Lyudmila, Elena Gorenskaya, Aleksandr Emel'yanov, Aleksey Efremov, Sergey Zyryanov, Pavel Kabytov, Nikolay Kazancev, et al. Permissive activity in the mechanism of public administration. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1963277.
Full textPathrose, Plato. ADAS and Automated Driving: A Practical Approach to Verification and Validation. SAE International, 2022. http://dx.doi.org/10.4271/9781468604146.
Full textIchino, Anna, and Greg Currie. Truth and Trust in Fiction. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198805403.003.0004.
Full textBook chapters on the topic "Author verification"
Potha, Nektaria, and Efstathios Stamatatos. "Dynamic Ensemble Selection for Author Verification." In Lecture Notes in Computer Science, 102–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15712-8_7.
Full textReinhard, Tobias, and Bart Jacobs. "Ghost Signals: Verifying Termination of Busy Waiting." In Computer Aided Verification, 27–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81688-9_2.
Full textBhanu Prasad, A., S. Rajeswari, A. Venkannababu, and T. Raghunadha Reddy. "Author Verification Using Rich Set of Linguistic Features." In Advances in Intelligent Systems and Computing, 197–203. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7563-6_21.
Full textOishi, Shin’ichi. "Verified Numerical Computations and Related Applications." In International Symposium on Mathematics, Quantum Theory, and Cryptography, 11–12. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_4.
Full textStubbemann, Maximilian, and Gerd Stumme. "LG4AV: Combining Language Models and Graph Neural Networks for Author Verification." In Lecture Notes in Computer Science, 315–26. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-01333-1_25.
Full textBevendorff, Janek, Mara Chinea-Ríos, Marc Franco-Salvador, Annina Heini, Erik Körner, Krzysztof Kredens, Maximilian Mayerl, et al. "Overview of PAN 2023: Authorship Verification, Multi-author Writing Style Analysis, Profiling Cryptocurrency Influencers, and Trigger Detection." In Lecture Notes in Computer Science, 518–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28241-6_60.
Full textBevendorff, Janek, Ian Borrego-Obrador, Mara Chinea-Ríos, Marc Franco-Salvador, Maik Fröbe, Annina Heini, Krzysztof Kredens, et al. "Overview of PAN 2023: Authorship Verification, Multi-Author Writing Style Analysis, Profiling Cryptocurrency Influencers, and Trigger Detection." In Lecture Notes in Computer Science, 459–81. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-42448-9_29.
Full textBevendorff, Janek, Xavier Bonet Casals, Berta Chulvi, Daryna Dementieva, Ashaf Elnagar, Dayne Freitag, Maik Fröbe, et al. "Overview of PAN 2024: Multi-author Writing Style Analysis, Multilingual Text Detoxification, Oppositional Thinking Analysis, and Generative AI Authorship Verification." In Lecture Notes in Computer Science, 3–10. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56072-9_1.
Full textChen, Yu-Fang, Kai-Min Chung, Ondřej Lengál, Jyun-Ao Lin, and Wei-Lun Tsai. "AutoQ: An Automata-Based Quantum Circuit Verifier." In Computer Aided Verification, 139–53. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37709-9_7.
Full textNagasamudram, Ramana, Anindya Banerjee, and David A. Naumann. "The WhyRel Prototype for Modular Relational Verification of Pointer Programs." In Tools and Algorithms for the Construction and Analysis of Systems, 133–51. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30820-8_11.
Full textConference papers on the topic "Author verification"
van Dam, Michiel, and Claudia Hauff. "Large-scale author verification." In SIGIR '14: The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2600428.2609504.
Full text"Author Index." In 2008 Ninth International Workshop on Microprocessor Test and Verification. IEEE, 2008. http://dx.doi.org/10.1109/mtv.2008.25.
Full text"Author index." In 2014 15th International Microprocessor Test and Verification Workshop (MTV). IEEE, 2014. http://dx.doi.org/10.1109/mtv.2014.8.
Full text"Author Index." In 2005 Sixth International Workshop on Microprocessor Test and Verification. IEEE, 2005. http://dx.doi.org/10.1109/mtv.2005.7.
Full text"Author Index." In 2007 Eighth International Workshop on Microprocessor Test and Verification. IEEE, 2007. http://dx.doi.org/10.1109/mtv.2007.23.
Full text"Author Index." In 2018 IEEE 3rd International Verification and Security Workshop (IVSW). IEEE, 2018. http://dx.doi.org/10.1109/ivsw.2018.8494898.
Full text"Author Index." In 2019 IEEE 4th International Verification and Security Workshop (IVSW). IEEE, 2019. http://dx.doi.org/10.1109/ivsw.2019.8854383.
Full text"Author Index." In 2009 International Conference on Software Testing Verification and Validation. IEEE, 2009. http://dx.doi.org/10.1109/icst.2009.54.
Full text"Author Index." In 2010 Workshop on Model-Driven Engineering, Verification, and Validation (MoDeVVa). IEEE, 2010. http://dx.doi.org/10.1109/modevva.2010.16.
Full text"Author Index." In Seventh International Workshop on Microprocessor Test and Verification (MTV'06). IEEE, 2006. http://dx.doi.org/10.1109/mtv.2006.4.
Full textReports on the topic "Author verification"
Podvig, Pavel, Markus Schiller, Amy Woolf, Christine Parthemore, Almudena Azcárate Ortega, Dmitry Stefanovich, and Decker Eveleth. Exploring Options for Missile Verification. Edited by Pavel Podvig. The United Nations Institute for Disarmament Research, March 2022. http://dx.doi.org/10.37559/wmd/22/misver/01.
Full textTkachuk, Viktoriia, Yuliia Yechkalo, Serhiy Semerikov, Maria Kislova, and Valentyna Khotskina. Exploring Student Uses of Mobile Technologies in University Classrooms: Audience Response Systems and Development of Multimedia. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4126.
Full textPinchuk, O. P., and A. A. Prokopenko. Model of a computer-orient-ed methodological system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of qualification improvement. Національна академія Державної прикордонної служби України імені Б. Хмельницького, 2023. http://dx.doi.org/10.33407/lib.naes.736836.
Full text