Journal articles on the topic 'SECURITY DOMAIN ENFORCEMENT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SECURITY DOMAIN ENFORCEMENT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Camp, L. Jean. "Reconceptualizing the Role of Security User." Daedalus 140, no. 4 (October 2011): 93–107. http://dx.doi.org/10.1162/daed_a_00117.
Full textvan Hoof, Joost, Jeroen Dikken, Willeke H. van Staalduinen, Suzan van der Pas, Rudy F. M. van den Hoven, and Loes M. T. Hulsebosch-Janssen. "Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague." International Journal of Environmental Research and Public Health 19, no. 7 (March 26, 2022): 3960. http://dx.doi.org/10.3390/ijerph19073960.
Full textGrubač, Momčilo. "Enforcement of judgments according to European legal standards." Glasnik Advokatske komore Vojvodine 75, no. 9-10 (2003): 18–33. http://dx.doi.org/10.5937/gakv0302018g.
Full textvan Hardeveld, Gert Jan, Craig Webber, and Kieron O’Hara. "Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets." American Behavioral Scientist 61, no. 11 (October 2017): 1244–66. http://dx.doi.org/10.1177/0002764217734271.
Full textWang, Yufei, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, and Fei Fang. "Deep Reinforcement Learning for Green Security Games with Real-Time Information." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1401–8. http://dx.doi.org/10.1609/aaai.v33i01.33011401.
Full textYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors 23, no. 7 (March 29, 2023): 3566. http://dx.doi.org/10.3390/s23073566.
Full textCsaba, Zágon, and Zsolt Lippai. "The Borderline between Private and Public Security." Academic and Applied Research in Military and Public Management Science 20, no. 3 (May 26, 2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.
Full textMatheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva, and Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES." International Journal of Advanced Research 10, no. 11 (November 30, 2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.
Full textKashmar, Nadine, Mehdi Adda, and Hussein Ibrahim. "HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities." Journal of Cybersecurity and Privacy 2, no. 1 (February 14, 2022): 42–64. http://dx.doi.org/10.3390/jcp2010004.
Full textLysychkina, �., O. Lysychkina, and Ye Protsenko. "NATO SPECIAL TERMINOLOGY IN THE CONTEXT OF MILITARY TERMINOLOGICAL ACTIVITIES WITHIN THE LINGUISTIC SUPPORT." Scientific journal of the National Academy of National Guard "Honor and Law" 2, no. 81 (2022): 99–102. http://dx.doi.org/10.33405/2078-7480/2022/2/81/263803.
Full textGradoń, Kacper. "Countering lone-actor terrorism: specification of requirements for potential interventions." Studia Iuridica 72 (April 17, 2018): 121–47. http://dx.doi.org/10.5604/01.3001.0011.7591.
Full textJain, Anil K., and Arun Ross. "Bridging the gap: from biometrics to forensics." Philosophical Transactions of the Royal Society B: Biological Sciences 370, no. 1674 (August 5, 2015): 20140254. http://dx.doi.org/10.1098/rstb.2014.0254.
Full textCAN, Özgü, and Murat ÜNALIR. "Ontology Based Access Control: A Case Study through Ontology Based Data Access." Deu Muhendislik Fakultesi Fen ve Muhendislik 25, no. 74 (May 15, 2023): 417–32. http://dx.doi.org/10.21205/deufmd.2023257413.
Full textStanković, Vladan, and Ana Opačić. "Brussels I regulation: Recognition and enforcement of foreign court decisions in civil and commercial matters." International Review, no. 3-4 (2022): 168–74. http://dx.doi.org/10.5937/intrev2204176s.
Full textDai, Xili, Cheng Yang, Bin Liu, Haigang Gong, and Xiaojun Yuan. "An Easy Way to Deploy the Re-ID System on Intelligent City: Cross-Domain Few-Shot Person Reidentification." Mobile Information Systems 2022 (June 15, 2022): 1–12. http://dx.doi.org/10.1155/2022/4522578.
Full textHorváth, Attila. "Possible Applications of High Altitude Platform Systems for the Security of South America and South Europe." Academic and Applied Research in Military and Public Management Science 20, Special Edition (2021): 79–94. http://dx.doi.org/10.32565/aarms.2021.2.ksz.6.
Full textTsyhanov, Oleh, Igor Chumachenko, Iryna Panova, and Mykola Golub. "Public Policy in the Sphere of Activity of the Ministry of Internal Affairs of Ukraine: Approaches to Determining the Essence and Content." Revista Amazonia Investiga 9, no. 28 (April 21, 2020): 159–65. http://dx.doi.org/10.34069/ai/2020.28.04.19.
Full textRiahla, Mohamed Amine, Sihem Goumiri, Karim Tamine, and M'hamed Hamadouche. "A New Cooperation Model for Dynamic Networks." International Journal of Business Data Communications and Networking 17, no. 2 (July 2021): 1–15. http://dx.doi.org/10.4018/ijbdcn.286704.
Full textLamsal, Hiranya Lal. "Effectiveness Of Military Diplomacy Towards Nationalism, National Security and Unity." Unity Journal 3, no. 01 (March 6, 2022): 82–96. http://dx.doi.org/10.3126/unityj.v3i01.43317.
Full textEgorov, Gennady. "Legal Forms of Ensuring Information Security on the Internet." Legal Concept, no. 4 (December 2022): 70–76. http://dx.doi.org/10.15688/lc.jvolsu.2022.4.9.
Full textS, Vasudha, Neelamma K. Patil, and Dr Lokesh R. Boregowda. "Performance Improvement of Face Recognition System using Selective Local Feature Vectors." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 2 (August 10, 2013): 1330–38. http://dx.doi.org/10.24297/ijct.v10i2.3299.
Full textMalik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, and Mohammad A. Alqarni. "From Conventional to State-of-the-Art IoT Access Control Models." Electronics 9, no. 10 (October 15, 2020): 1693. http://dx.doi.org/10.3390/electronics9101693.
Full textLoncar-Turukalo, Tatjana, Eftim Zdravevski, José Machado da Silva, Ioanna Chouvarda, and Vladimir Trajkovik. "Literature on Wearable Technology for Connected Health: Scoping Review of Research Trends, Advances, and Barriers." Journal of Medical Internet Research 21, no. 9 (September 5, 2019): e14017. http://dx.doi.org/10.2196/14017.
Full textRAJ, RISHI, T. K. DAS, RAMANJIT KAUR, RAJ SINGH, and KAPILA SHEKHAWAT. "Invasive noxious weed management research in India with special reference to Cyperus rotundus, Eichhornia crassipes and Lantana camara." Indian Journal of Agricultural Sciences 88, no. 2 (April 27, 2018): 181–96. http://dx.doi.org/10.56093/ijas.v88i2.79160.
Full textKashmar, Nadine, Mehdi Adda, Hussein Ibrahim, Jean-François Morin, and Tony Ducheman. "Instantiation and Implementation of HEAD Metamodel in an Industrial Environment: Non-IoT and IoT Case Studies." Electronics 12, no. 15 (July 25, 2023): 3216. http://dx.doi.org/10.3390/electronics12153216.
Full textSanchez, Gabriella. "Critical Perspectives on Clandestine Migration Facilitation: An Overview of Migrant Smuggling Research." Journal on Migration and Human Security 5, no. 1 (March 2017): 9–27. http://dx.doi.org/10.1177/233150241700500102.
Full textTsai, Jason, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, and Milind Tambe. "Urban Security: Game-Theoretic Resource Allocation in Networked Domains." Proceedings of the AAAI Conference on Artificial Intelligence 24, no. 1 (July 4, 2010): 881–86. http://dx.doi.org/10.1609/aaai.v24i1.7612.
Full textIstván, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Full textNaja, Rola, Nadia Mouawad, and Ali J. Ghandour. "Spatio-temporal optimal law enforcement using Stackelberg games." Lebanese Science Journal 18, no. 2 (December 27, 2017): 244–54. http://dx.doi.org/10.22453/lsj-018.2.244-254.
Full textWeiss, Moritz, and Simon Dalferth. "Security Re-Divided: The Distinctiveness of Policy-Making in ESDP and JHA." Cooperation and Conflict 44, no. 3 (August 20, 2009): 268–87. http://dx.doi.org/10.1177/0010836709106216.
Full textAwad, Mamoun, Latifur Khan, and Bhavani Thuraisingham. "Policy Enforcement System for Inter-Organizational Data Sharing." International Journal of Information Security and Privacy 4, no. 3 (July 2010): 22–39. http://dx.doi.org/10.4018/jisp.2010070102.
Full textPerko, Igor, and Peter Ototsky. "Big Data for Business Ecosystem Players." Naše gospodarstvo/Our economy 62, no. 2 (June 1, 2016): 12–24. http://dx.doi.org/10.1515/ngoe-2016-0008.
Full textBerlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud." ACM Transactions on Privacy and Security 25, no. 1 (February 28, 2022): 1–37. http://dx.doi.org/10.1145/3474056.
Full textRublovskis, Raimonds. "RE-THINKING OF NATIONAL SECURITY IN THE AGE OF PANDEMICS." Baltic Journal of Legal and Social Sciences, no. 2 (April 4, 2022): 15–25. http://dx.doi.org/10.30525/2592-8813-2021-2-2.
Full textSamimian-Darash, Limor, and Meg Stalcup. "Anthropology of security and security in anthropology: Cases of counterterrorism in the United States." Anthropological Theory 17, no. 1 (November 7, 2016): 60–87. http://dx.doi.org/10.1177/1463499616678096.
Full textApostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras, and Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions." Open Research Europe 1 (January 21, 2022): 87. http://dx.doi.org/10.12688/openreseurope.13715.2.
Full textKasum, Josip, Marko Pilić, Nebojša Jovanović, and Harrison Pienaar. "Model of Forensic Hydrography." Transactions on Maritime Science 8, no. 2 (October 21, 2019): 246–52. http://dx.doi.org/10.7225/toms.v08.n02.010.
Full textSchwab, Abraham P., Hung S. Luu, Jason Wang, and Jason Y. Park. "Genomic Privacy." Clinical Chemistry 64, no. 12 (December 1, 2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Full textKampas, Giorgos, Aggelos Vasileiou, Marios Antonakakis, Michalis Zervakis, Emmanouil Spanakis, Vangelis Sakkalis, Peter Leškovský, et al. "Design of Sensors’ Technical Specifications for Airborne Surveillance at Borders." Journal of Defence & Security Technologies 5, no. 1 (2022): 58–83. http://dx.doi.org/10.46713/jdst.005.04.
Full textCurl, Cynthia L., Lisa Meierotto, and Rebecca L. Som Castellano. "Understanding Challenges to Well-Being among Latina FarmWorkers in Rural Idaho Using in an Interdisciplinary, Mixed-Methods Approach." International Journal of Environmental Research and Public Health 18, no. 1 (December 29, 2020): 169. http://dx.doi.org/10.3390/ijerph18010169.
Full textDiamantopoulou, Vasiliki, and Haralambos Mouratidis. "Practical evaluation of a reference architecture for the management of privacy level agreements." Information & Computer Security 27, no. 5 (November 11, 2019): 711–30. http://dx.doi.org/10.1108/ics-04-2019-0052.
Full textYadav, Priya R. "Review Paper on Introduction to Cyber Forensics." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.
Full textApostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras, and Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions." Open Research Europe 1 (July 30, 2021): 87. http://dx.doi.org/10.12688/openreseurope.13715.1.
Full textDahlberg, Rasmus, Tobias Pulls, Tom Ritter, and Paul Syverson. "Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 194–213. http://dx.doi.org/10.2478/popets-2021-0024.
Full textLajaunie, Claire, Burkhard Schafer, and Pierre Mazzega. "Big Data Enters Environmental Law." Transnational Environmental Law 8, no. 3 (October 31, 2019): 523–45. http://dx.doi.org/10.1017/s2047102519000335.
Full textBROŽIČ, LILIANA. "CONTEMPORARY MILITARY CHALLENGES IN ENGLISH – A PROBLEM OR AN OPPORTUNITY." CONTEMPORARY MILITARY CHALLENGES 2011, no. 13/4 (October 15, 2011): 11–14. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.13.4.00.
Full textStaller, Mario S., and Swen Körner. "Regression, Progression and Renewal: The Continuous Redevelopment of Expertise in Police Use of Force Coaching." European Journal for Security Research, October 16, 2020. http://dx.doi.org/10.1007/s41125-020-00069-7.
Full textFigini, Silvia. "MACHINE LEARNING PER CARATTERIZZARE GLI ATTACCHI TERRORISTICI." Istituto Lombardo - Accademia di Scienze e Lettere - Rendiconti di Lettere, July 15, 2020. http://dx.doi.org/10.4081/let.2018.680.
Full text"Enforcement of Women's Rights through Education." International Journal of Recent Technology and Engineering 8, no. 4 (November 30, 2019): 5397–402. http://dx.doi.org/10.35940/ijrte.d7619.118419.
Full text"A Prototype Design for a Framework to Analyse the Traffic Flow in Darknet." International Journal of Innovative Technology and Exploring Engineering 8, no. 6S4 (July 26, 2019): 1449–52. http://dx.doi.org/10.35940/ijitee.f1295.0486s419.
Full text