Journal articles on the topic 'Canadian Security Intelligence Service (Proposed)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Canadian Security Intelligence Service (Proposed).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Weller, Geoffrey R. "The Canadian Security Intelligence Service under stress." Canadian Public Administration/Administration publique du Canada 31, no. 2 (July 1988): 279–302. http://dx.doi.org/10.1111/j.1754-7121.1988.tb01318.x.
Full textRankin, Murray. "National Security: Information, Accountability, and the Canadian Security Intelligence Service." University of Toronto Law Journal 36, no. 3 (1986): 249. http://dx.doi.org/10.2307/825575.
Full textSenior CSIS Executive. "THREE ASPECTS OF ACCOUNTABILITY FOR THE CANADIAN INTELLIGENCE PUBLIC SERVICE." Journal of Intelligence, Conflict, and Warfare 6, no. 3 (January 31, 2024): 243–46. http://dx.doi.org/10.21810/jicw.v6i3.6406.
Full textHewitt, Steve. "Intelligence at the Learneds: The RCMP, the Learneds, and the Canadian Historical Association." Ottawa 1998 9, no. 1 (February 9, 2006): 267–86. http://dx.doi.org/10.7202/030501ar.
Full textWest, Leah, and Craig Forcese. "Twisted into knots: Canada’s challenges in lawful access to encrypted communications." Common Law World Review 49, no. 3-4 (January 22, 2020): 182–98. http://dx.doi.org/10.1177/1473779519891597.
Full textWilczynski, Artur. "Equity, Diversity, and Inclusion in National Security Intelligence." Journal of Intelligence, Conflict, and Warfare 4, no. 3 (February 27, 2022): 222–26. http://dx.doi.org/10.21810/jicw.v4i3.4197.
Full textGratton, Phil. "Leadership, Technology and National Security." Journal of Intelligence, Conflict, and Warfare 4, no. 3 (January 31, 2022): 147–51. http://dx.doi.org/10.21810/jicw.v4i3.4164.
Full textYoung, Bob. "Foreign Interference / Influence in Canada: A Way Forward." Journal of Intelligence, Conflict, and Warfare 6, no. 2 (November 24, 2023): 79–83. http://dx.doi.org/10.21810/jicw.v6i2.6250.
Full textRyan, Joseph F. "Review of the Canadian security intelligence service: A suitable model for the United Kingdom?" Intelligence and National Security 5, no. 3 (July 1990): 200–206. http://dx.doi.org/10.1080/02684529008432070.
Full textPark, Keundug, and Heung-Youl Youm. "Proposal of a Service Model for Blockchain-Based Security Tokens." Big Data and Cognitive Computing 8, no. 3 (March 12, 2024): 30. http://dx.doi.org/10.3390/bdcc8030030.
Full textSarkar, Manash, Soumya Banerjee, Youakim Badr, and Arun Kumar Sangaiah. "Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence." International Journal of Ambient Computing and Intelligence 8, no. 3 (July 2017): 1–21. http://dx.doi.org/10.4018/ijaci.2017070101.
Full textGratton, Phil. "THREAT RESILIENCE IN THE REALM OF MISINFORMATION, DISINFORMATION, AND TRUST." Journal of Intelligence, Conflict, and Warfare 5, no. 3 (January 31, 2023): 96–100. http://dx.doi.org/10.21810/jicw.v5i3.5126.
Full textTessier, Michelle. "LEVERAGING DIVERSITY, EQUALITY, AND INCLUSION (DEI) IN MEETING MODERN INTELLIGENCE CHALLENGES." Journal of Intelligence, Conflict, and Warfare 5, no. 3 (January 31, 2023): 122–25. http://dx.doi.org/10.21810/jicw.v5i3.5180.
Full textVelliangiri, S., P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari, and Yasser Alzamil. "Intelligence Amplification-Based Smart Health Record Chain for Enterprise Management System." Information 14, no. 5 (May 11, 2023): 284. http://dx.doi.org/10.3390/info14050284.
Full textGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service." Victoria University of Wellington Law Review 47, no. 1 (June 1, 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Full textPark, Keundug, and Heung-Youl Youm. "Proposal of Decentralized P2P Service Model for Transfer between Blockchain-Based Heterogeneous Cryptocurrencies and CBDCs." Big Data and Cognitive Computing 6, no. 4 (December 19, 2022): 159. http://dx.doi.org/10.3390/bdcc6040159.
Full textMoraboena, Srikanthyadav, Gayatri Ketepalli, and Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder." Revue d'Intelligence Artificielle 34, no. 4 (September 30, 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Full textLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program." Surveillance & Society 18, no. 3 (August 19, 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Full textStepanovskyi, V. S. "The activity of The Security Service of Ukraine as a subject of ensuring national security in the conditions of martial law." Analytical and Comparative Jurisprudence, no. 3 (July 18, 2023): 298–302. http://dx.doi.org/10.24144/2788-6018.2023.03.54.
Full textGuan, Allen Lim Chong, Goi Chai Lee, and Peter Dell. "Increasing the Adoption of Canadian Retail Businesses’ Websites: Canadian Young Generation Consumers' Enticement." Global Disclosure of Economics and Business 10, no. 1 (May 20, 2021): 17–36. http://dx.doi.org/10.18034/gdeb.v10i1.596.
Full textL, Santhanalakshmi, and Sakkaravarthi R. "INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 153. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19602.
Full textManin, Iaroslav, and Aleksandra Evgen'evna Klimashina. "State security of Israel: international and national legal aspects." Национальная безопасность / nota bene, no. 2 (February 2023): 1–19. http://dx.doi.org/10.7256/2454-0668.2023.2.39932.
Full textLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence." Mathematical Problems in Engineering 2022 (August 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Full textAlrubayyi, Hadeel, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem, and Mona Jaber. "Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications." Future Internet 16, no. 3 (February 29, 2024): 85. http://dx.doi.org/10.3390/fi16030085.
Full textMlato, Stanley, Yesaya Gabriel, Prince Chirwa, and Hyunsung Kim. "Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment." International journal of Computer Networks & Communications 16, no. 2 (March 29, 2024): 87–106. http://dx.doi.org/10.5121/ijcnc.2024.16206.
Full textFranchuk, Vasyl, and Volodymyr Hobela. "THE STRATEGIC VECTOR OF UKRAINE'S FINANCIAL INTELLIGENCE CONSTRUCTION." Науковий вісник Львівського державного університету внутрішніх справ (серія економічна), no. 1 (October 28, 2022): 3–11. http://dx.doi.org/10.32782/2311-844x/2022-1-1.
Full textJamil, Harun, Faiza Qayyum, Naeem Iqbal, Murad Ali Khan, Syed Shehryar Ali Naqvi, Salabat Khan, and Do Hyeun Kim. "Secure Hydrogen Production Analysis and Prediction Based on Blockchain Service Framework for Intelligent Power Management System." Smart Cities 6, no. 6 (November 22, 2023): 3192–224. http://dx.doi.org/10.3390/smartcities6060142.
Full textSiddique, Iqtiar Md, Selim Molla, MD Rakib Hasan, and Anamika Ahmed Siddique. "Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features." Journal of IoT and Machine Learning 1, no. 1 (February 9, 2024): 22–29. http://dx.doi.org/10.48001/joitml.2024.1122-29.
Full textYengkangyi, Millicent, Kwadwo Bioh Agyei, and George Asumadu. "Contemporary Challenges Associated With Border Security Operations to Promote Socio-Economic Development at Aflao Border in Ghana." International Journal of Public Policy and Administration 5, no. 3 (November 29, 2023): 46–69. http://dx.doi.org/10.47941/ijppa.1531.
Full textKaushik, Shivkant, Ramesh Chandra Poonia, Sunil Kumar Khatri, Debabrata Samanta, and Partha Chakraborty. "Transmit Range Adjustment Using Artificial Intelligence for Enhancement of Location Privacy and Data Security in Service Location Protocol of VANET." Wireless Communications and Mobile Computing 2022 (September 16, 2022): 1–13. http://dx.doi.org/10.1155/2022/9642774.
Full textPohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES." Herald of criminal justice, no. 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Full textBuriachok, Volodymyr L., Volodymyr М. Bogush, Yurii V. Borsukovskii, Pavlo M. Skladannyi, and Victoria Yu Borsukovska. "МОДЕЛЬ ПІДГОТОВКИ ФАХІВЦІВ У СФЕРІ ІНФОРМАЦІЙНОЇ ТА КІБЕРНЕТИЧНОЇ БЕЗПЕКИ В ЗАКЛАДАХ ВИЩОЇ ОСВІТИ УКРАЇНИ." Information Technologies and Learning Tools 67, no. 5 (October 30, 2018): 277. http://dx.doi.org/10.33407/itlt.v67i5.2347.
Full textHwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.
Full textRathod, Tejal, Nilesh Kumar Jadav, Mohammad Dahman Alshehri, Sudeep Tanwar, Ravi Sharma, Raluca-Andreea Felseghi, and Maria Simona Raboaca. "Blockchain for Future Wireless Networks: A Decade Survey." Sensors 22, no. 11 (May 31, 2022): 4182. http://dx.doi.org/10.3390/s22114182.
Full textHussain, Muhammad Iftikhar, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain, and Muhammad Salman Pathan. "An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 125–36. http://dx.doi.org/10.3233/jifs-200835.
Full textHaddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali, and Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework." Eastern-European Journal of Enterprise Technologies 6, no. 9 (120) (December 30, 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.
Full textYang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology." Scientific Programming 2022 (April 26, 2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.
Full textYang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology." Scientific Programming 2022 (April 26, 2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.
Full textSinha, Keshav, Annu Priya, and Partha Paul. "K-RSA: Secure data storage technique for multimedia in cloud data server." Journal of Intelligent & Fuzzy Systems 39, no. 3 (October 7, 2020): 3297–314. http://dx.doi.org/10.3233/jifs-191687.
Full textCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke, and Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour." Animals 12, no. 13 (July 1, 2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Full textSylla, Tidiane, Mohamed Aymen Chalouf, Francine Krief, and Karim Samaké. "SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things." Security and Communication Networks 2021 (April 14, 2021): 1–24. http://dx.doi.org/10.1155/2021/6632747.
Full textKhan, Muhammad Salman, Ken Ferens, and Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks." International Journal of Cognitive Informatics and Natural Intelligence 8, no. 3 (July 2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.
Full textMoyo, Moses, and Marianne Loock. "Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa." Information 12, no. 3 (March 17, 2021): 128. http://dx.doi.org/10.3390/info12030128.
Full textManderna, Ankit, Sushil Kumar, Upasana Dohare, Mohammad Aljaidi, Omprakash Kaiwartya, and Jaime Lloret. "Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic." Sensors 23, no. 21 (October 27, 2023): 8772. http://dx.doi.org/10.3390/s23218772.
Full textArroyo-Figueroa, Gustavo. "Artificial Intelligence the Strategic Key of Cybersecurity." International Journal of Combinatorial Optimization Problems and Informatics 14, no. 3 (December 31, 2023): 16–23. http://dx.doi.org/10.61467/2007.1558.2023.v14i3.372.
Full textShobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim, and M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services." International Journal of Software Engineering and Computer Systems 9, no. 1 (January 31, 2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.
Full textVimala, K., and Dr D. Maruthanayagam. "Comparative Analysis of Routing Algorithms to Enhance the Quality of Service in MANET." International Journal of Recent Technology and Engineering (IJRTE) 11, no. 1 (May 30, 2022): 108–15. http://dx.doi.org/10.35940/ijrte.a6949.0511122.
Full textNajib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (July 16, 2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.
Full textManikandan, Kayalvizhi, and Ramamoorthy Sriramulu. "Optimized Path Planning Strategy to Enhance Security under Swarm of Unmanned Aerial Vehicles." Drones 6, no. 11 (November 2, 2022): 336. http://dx.doi.org/10.3390/drones6110336.
Full textZhang, Yunpeng, and Xin Liu. "An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network." International Journal of Software Engineering and Knowledge Engineering 30, no. 11n12 (November 2020): 1851–65. http://dx.doi.org/10.1142/s0218194020500400.
Full text