Journal articles on the topic 'Canadian Security Intelligence Act (Proposed)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Canadian Security Intelligence Act (Proposed).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Salter, Mark B., and Geneviève Piché. "The Securitization of the US–Canada Border in American Political Discourse." Canadian Journal of Political Science 44, no. 4 (December 2011): 929–51. http://dx.doi.org/10.1017/s0008423911000813.
Full textEDWARDS, J. LL J. "The Canadian Security Intelligence Act 1984—a Canadian appraisal." Oxford Journal of Legal Studies 5, no. 1 (1985): 143–53. http://dx.doi.org/10.1093/ojls/5.1.143.
Full textGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service." Victoria University of Wellington Law Review 47, no. 1 (June 1, 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Full textKumari, Rashmi, and Dr Priyanka Singh. "Weaponizing Artificial Intelligence." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 966–81. http://dx.doi.org/10.22214/ijraset.2023.53289.
Full textShchukina, Tatiana. "Canada's Digital Charter becomes law." Russia and America in the 21st Century, no. 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Full textCarabash, Michael P. A. "Section 273.65 of the National Defence Act: Inappropriate and Unconstitutional." Constitutional Forum / Forum constitutionnel 15, no. 1, 2 & 3 (July 24, 2011): 2006. http://dx.doi.org/10.21991/c9hq17.
Full textLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program." Surveillance & Society 18, no. 3 (August 19, 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Full textMoraboena, Srikanthyadav, Gayatri Ketepalli, and Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder." Revue d'Intelligence Artificielle 34, no. 4 (September 30, 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Full textMonaghan, Jeffrey. "Security Traps and Discourses of Radicalization: Examining Surveillance Practices Targeting Muslims in Canada." Surveillance & Society 12, no. 4 (June 19, 2014): 485–501. http://dx.doi.org/10.24908/ss.v12i4.4557.
Full textMeng, Mingming, and Yuancheng Li. "SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks." PeerJ Computer Science 8 (June 29, 2022): e1027. http://dx.doi.org/10.7717/peerj-cs.1027.
Full textNath, Seema, Subhranil Som, and Mukesh Chandra Negi. "Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 1 (April 9, 2021): 139–47. http://dx.doi.org/10.3233/kes-210059.
Full textDahake, Dr Rupali, and Dr Pallavi Mirajkar. "Integration Tool using Internet of Things in Smart Architecture of Passenger Processing at Airport Terminal." International Journal of Innovative Technology and Exploring Engineering 11, no. 8 (July 30, 2022): 93–97. http://dx.doi.org/10.35940/ijitee.h9176.0711822.
Full textAlli, P., and J. Dinesh Peter. "A novel auto-encoder induced chaos based image encryption framework aiding DNA computing sequence." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 181–98. http://dx.doi.org/10.3233/jifs-201224.
Full textCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke, and Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour." Animals 12, no. 13 (July 1, 2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Full textKreklewetz, Robert G., and Laura J. Burlock. "Policy Forum: Canada's Proposed Cryptoasset Legislation." Canadian Tax Journal/Revue fiscale canadienne 71, no. 1 (April 2023): 73–81. http://dx.doi.org/10.32721/ctj.2023.71.1.pf.kreklewetz.
Full textPohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES." Herald of criminal justice, no. 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Full textKim, Sung-Hwan, Nam-Uk Kim, and Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling." Kybernetes 44, no. 1 (January 12, 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Full textKilcullen, Jack K. "Groping for the Reins: ERISA, HMO Malpractice, and Enterprise Liability." American Journal of Law & Medicine 22, no. 1 (1996): 7–50. http://dx.doi.org/10.1017/s0098858800010285.
Full textHerbst, Jan, Matthias Rüb, Sogo Pierre Sanon, Christoph Lipps, and Hans D. Schotten. "Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach." Network 4, no. 2 (April 9, 2024): 133–49. http://dx.doi.org/10.3390/network4020007.
Full textKaiser, Stefan A. "Legal Challenges of Automated and Autonomous Systems." Volume 60 · 2017 60, no. 1 (January 1, 2018): 173–201. http://dx.doi.org/10.3790/gyil.60.1.173.
Full textMalgwi, Yusuf Musa, Ibrahim Goni, and Bamanga Mahmud Ahmad. "Artificial Neural Network Model for Intrusion Detection System." Mediterranean Journal of Basic and Applied Sciences 06, no. 01 (2022): 20–26. http://dx.doi.org/10.46382/mjbas.2022.6103.
Full textChatziamanetoglou, Dimitrios, and Konstantinos Rantos. "Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus." Security and Communication Networks 2023 (February 13, 2023): 1–20. http://dx.doi.org/10.1155/2023/3303122.
Full textMudaraddi, Kiran, Keerthi T, Likitha Yadav, M. Varsha, and Nivedita M. "Weapon Detection System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 3482–87. http://dx.doi.org/10.22214/ijraset.2023.52381.
Full textKrishna, R. Venkat, V. Vijayalakshmi, and M. Vignesh Balaji. "A Robust Emotion Detection and Music Recommendation System using Mini Xception CNN." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 2158–63. http://dx.doi.org/10.22214/ijraset.2022.48387.
Full textGopinath, S., S. Pragadeswaran, P. Subaranjani, R. Mounitha, and N. Parameshwari. "Ai Based Dual Authentication System." 4 2, no. 4 (December 1, 2022): 158–62. http://dx.doi.org/10.46632/daai/2/4/29.
Full textSalonen, Jarno, and Alessandro Guarino. "Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics." International Conference on Cyber Warfare and Security 19, no. 1 (March 21, 2024): 617–20. http://dx.doi.org/10.34190/iccws.19.1.2066.
Full textLi, Yu, Daofang Chang, Yinping Gao, Ying Zou, and Chunteng Bao. "Automated Container Terminal Production Operation and Optimization via an AdaBoost-Based Digital Twin Framework." Journal of Advanced Transportation 2021 (September 7, 2021): 1–16. http://dx.doi.org/10.1155/2021/1936764.
Full textRajeswari, A. R., K. Kulothungan, Sannasi Ganapathy, and Arputharaj Kannan. "Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT." Journal of Intelligent & Fuzzy Systems 40, no. 5 (April 22, 2021): 9197–211. http://dx.doi.org/10.3233/jifs-201633.
Full textMuravskyi, Volodymyr. "The impact of global technological trends on accounting." Herald of Ternopil National Economic University, no. 4 (86) (December 12, 2017): 138–48. http://dx.doi.org/10.35774/visnyk2017.04.138.
Full textRamasamy, Mathiyalagan, and Pamela Vinitha Eric. "A novel classification and clustering algorithms for intrusion detection system on convolutional neural network." Bulletin of Electrical Engineering and Informatics 11, no. 5 (October 1, 2022): 2845–55. http://dx.doi.org/10.11591/eei.v11i5.4145.
Full textRodríguez Marco, José Enrique, Manuel Sánchez Rubio, José Javier Martínez Herráiz, Rafael González Armengod, and Juan Carlos Plaza Del Pino. "Contributions to Image Transmission in Icing Conditions on Unmanned Aerial Vehicles." Drones 7, no. 9 (September 5, 2023): 571. http://dx.doi.org/10.3390/drones7090571.
Full textChuang, Hsiu-Min, Fanpyn Liu, and Chung-Hsien Tsai. "Early Detection of Abnormal Attacks in Software-Defined Networking Using Machine Learning Approaches." Symmetry 14, no. 6 (June 8, 2022): 1178. http://dx.doi.org/10.3390/sym14061178.
Full textZavistovskyi, O. "Professional, service and service-combat activity of the National Police: essence and definition of concepts." Analytical and Comparative Jurisprudence, no. 5 (December 30, 2022): 258–62. http://dx.doi.org/10.24144/2788-6018.2022.05.47.
Full textKalodanis, Konstantinos, Panagiotis Rizomiliotis, and Dimosthenis Anagnostopoulos. "European Artificial Intelligence Act: an AI security approach." Information & Computer Security, November 23, 2023. http://dx.doi.org/10.1108/ics-10-2022-0165.
Full textWest, Leah. "‘Within or outside Canada’: The Charter’s application to the extraterritorial activities of the Canadian Security Intelligence Service." University of Toronto Law Journal, January 5, 2022. http://dx.doi.org/10.3138/utlj-2021-0105.
Full textWest, Leah, and Craig Forcese. "Building Haystacks: Information Retention and Data Exploitation by the Canadian Security Intelligence Service." Alberta Law Review, October 2, 2019, 175. http://dx.doi.org/10.29173/alr2573.
Full textCefaliello, Aude, and Miriam Kullmann. "Offering false security: How the draft artificial intelligence act undermines fundamental workers rights." European Labour Law Journal, October 20, 2022, 203195252211144. http://dx.doi.org/10.1177/20319525221114474.
Full textAlthar, Raghavendra Rao, Debabrata Samanta, Sathvik Purushotham, Sandeep Singh Sengar, and Chaminda Hewage. "Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System." SN Computer Science 4, no. 4 (April 15, 2023). http://dx.doi.org/10.1007/s42979-023-01785-2.
Full textForcese, Craig, and Kent Roach. "Bill C-51 Backgrounder #2: The Canadian Security Intelligence Service's Proposed Power to 'Reduce' Security Threats Through Conduct that May Violate the Law and Charter." SSRN Electronic Journal, 2015. http://dx.doi.org/10.2139/ssrn.2564272.
Full textReyes, Luis, Diana Almeida, and Ana Flores. "Information Technologies for Occupational Health and Safety." Athenea, June 1, 2022, 32–41. http://dx.doi.org/10.47460/10.47460/athenea.v3i8.40.
Full textVenkatesh Kumar, M., and C. Lakshmi. "A privacy preservation data collection and access control using entropy-based conic curve." Journal of Intelligent & Fuzzy Systems, February 2, 2023, 1–14. http://dx.doi.org/10.3233/jifs-223141.
Full textKouroupis, Konstantinos. "The AI Act in light of the EU Digital Agenda: A critical approach." Journal of Data Protection & Privacy, January 1, 2023. http://dx.doi.org/10.69554/fquz5239.
Full textAbdullah, Sura Mahmood, and Mustafa Musa Jaber. "Deep learning for content-based image retrieval in FHE algorithms." Journal of Intelligent Systems 32, no. 1 (January 1, 2023). http://dx.doi.org/10.1515/jisys-2022-0222.
Full textDubiniecki, Abigail. "The directive on security of networks and information systems (NISD): One more critical step towards a ‘connected digital single market’ for the EU." Journal of Data Protection & Privacy, July 1, 2018. http://dx.doi.org/10.69554/kdhf3147.
Full textAlsubai, Shtwai, Ashit Kumar Dutta, Abdul Rahaman Wahab Sait, Yasser Adnan Abu Jaish, Bader Hussain Alamer, Hussam Eldin Hussein Saad, and Rashid Ayub. "Enhanced slime mould optimization with convolutional BLSTM autoencoder based malware classification in intelligent systems." Expert Systems, February 4, 2024. http://dx.doi.org/10.1111/exsy.13557.
Full textK. Pazhanivel, S. Sakthi, R. Shilpa, and E. Mounika. "AI Based Self Learning Intelligent Information Leak Protection System for TI Companies using LSTM." International Journal of Advanced Research in Science, Communication and Technology, June 10, 2022, 268–72. http://dx.doi.org/10.48175/ijarsct-4595.
Full textCleary, Frances, David C. Henshall, and Sasitharan Balasubramaniam. "On-Body Edge Computing Through E-Textile Programmable Logic Array." Frontiers in Communications and Networks 2 (June 11, 2021). http://dx.doi.org/10.3389/frcmn.2021.688419.
Full textFowles, Jib. "Television Violence and You." M/C Journal 3, no. 1 (March 1, 2000). http://dx.doi.org/10.5204/mcj.1828.
Full textRose, Megan Catherine. "The Future Is Furby." M/C Journal 26, no. 2 (April 25, 2023). http://dx.doi.org/10.5204/mcj.2955.
Full textFranks, Rachel. "Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”." M/C Journal 20, no. 2 (April 26, 2017). http://dx.doi.org/10.5204/mcj.1214.
Full text