Artículos de revistas sobre el tema "Canadian Security Intelligence Act (Proposed)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Canadian Security Intelligence Act (Proposed)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Salter, Mark B. y Geneviève Piché. "The Securitization of the US–Canada Border in American Political Discourse". Canadian Journal of Political Science 44, n.º 4 (diciembre de 2011): 929–51. http://dx.doi.org/10.1017/s0008423911000813.
Texto completoEDWARDS, J. LL J. "The Canadian Security Intelligence Act 1984—a Canadian appraisal". Oxford Journal of Legal Studies 5, n.º 1 (1985): 143–53. http://dx.doi.org/10.1093/ojls/5.1.143.
Texto completoGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, n.º 1 (1 de junio de 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Texto completoKumari, Rashmi y Dr Priyanka Singh. "Weaponizing Artificial Intelligence". International Journal for Research in Applied Science and Engineering Technology 11, n.º 6 (30 de junio de 2023): 966–81. http://dx.doi.org/10.22214/ijraset.2023.53289.
Texto completoShchukina, Tatiana. "Canada's Digital Charter becomes law". Russia and America in the 21st Century, n.º 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Texto completoCarabash, Michael P. A. "Section 273.65 of the National Defence Act: Inappropriate and Unconstitutional". Constitutional Forum / Forum constitutionnel 15, n.º 1, 2 & 3 (24 de julio de 2011): 2006. http://dx.doi.org/10.21991/c9hq17.
Texto completoLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, n.º 3 (19 de agosto de 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Texto completoMoraboena, Srikanthyadav, Gayatri Ketepalli y Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, n.º 4 (30 de septiembre de 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Texto completoMonaghan, Jeffrey. "Security Traps and Discourses of Radicalization: Examining Surveillance Practices Targeting Muslims in Canada". Surveillance & Society 12, n.º 4 (19 de junio de 2014): 485–501. http://dx.doi.org/10.24908/ss.v12i4.4557.
Texto completoMeng, Mingming y Yuancheng Li. "SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks". PeerJ Computer Science 8 (29 de junio de 2022): e1027. http://dx.doi.org/10.7717/peerj-cs.1027.
Texto completoNath, Seema, Subhranil Som y Mukesh Chandra Negi. "Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices". International Journal of Knowledge-based and Intelligent Engineering Systems 25, n.º 1 (9 de abril de 2021): 139–47. http://dx.doi.org/10.3233/kes-210059.
Texto completoDahake, Dr Rupali y Dr Pallavi Mirajkar. "Integration Tool using Internet of Things in Smart Architecture of Passenger Processing at Airport Terminal". International Journal of Innovative Technology and Exploring Engineering 11, n.º 8 (30 de julio de 2022): 93–97. http://dx.doi.org/10.35940/ijitee.h9176.0711822.
Texto completoAlli, P. y J. Dinesh Peter. "A novel auto-encoder induced chaos based image encryption framework aiding DNA computing sequence". Journal of Intelligent & Fuzzy Systems 41, n.º 1 (11 de agosto de 2021): 181–98. http://dx.doi.org/10.3233/jifs-201224.
Texto completoCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke y Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour". Animals 12, n.º 13 (1 de julio de 2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Texto completoKreklewetz, Robert G. y Laura J. Burlock. "Policy Forum: Canada's Proposed Cryptoasset Legislation". Canadian Tax Journal/Revue fiscale canadienne 71, n.º 1 (abril de 2023): 73–81. http://dx.doi.org/10.32721/ctj.2023.71.1.pf.kreklewetz.
Texto completoPohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES". Herald of criminal justice, n.º 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Texto completoKim, Sung-Hwan, Nam-Uk Kim y Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling". Kybernetes 44, n.º 1 (12 de enero de 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Texto completoKilcullen, Jack K. "Groping for the Reins: ERISA, HMO Malpractice, and Enterprise Liability". American Journal of Law & Medicine 22, n.º 1 (1996): 7–50. http://dx.doi.org/10.1017/s0098858800010285.
Texto completoHerbst, Jan, Matthias Rüb, Sogo Pierre Sanon, Christoph Lipps y Hans D. Schotten. "Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach". Network 4, n.º 2 (9 de abril de 2024): 133–49. http://dx.doi.org/10.3390/network4020007.
Texto completoKaiser, Stefan A. "Legal Challenges of Automated and Autonomous Systems". Volume 60 · 2017 60, n.º 1 (1 de enero de 2018): 173–201. http://dx.doi.org/10.3790/gyil.60.1.173.
Texto completoMalgwi, Yusuf Musa, Ibrahim Goni y Bamanga Mahmud Ahmad. "Artificial Neural Network Model for Intrusion Detection System". Mediterranean Journal of Basic and Applied Sciences 06, n.º 01 (2022): 20–26. http://dx.doi.org/10.46382/mjbas.2022.6103.
Texto completoChatziamanetoglou, Dimitrios y Konstantinos Rantos. "Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus". Security and Communication Networks 2023 (13 de febrero de 2023): 1–20. http://dx.doi.org/10.1155/2023/3303122.
Texto completoMudaraddi, Kiran, Keerthi T, Likitha Yadav, M. Varsha y Nivedita M. "Weapon Detection System". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 3482–87. http://dx.doi.org/10.22214/ijraset.2023.52381.
Texto completoKrishna, R. Venkat, V. Vijayalakshmi y M. Vignesh Balaji. "A Robust Emotion Detection and Music Recommendation System using Mini Xception CNN". International Journal for Research in Applied Science and Engineering Technology 10, n.º 12 (31 de diciembre de 2022): 2158–63. http://dx.doi.org/10.22214/ijraset.2022.48387.
Texto completoGopinath, S., S. Pragadeswaran, P. Subaranjani, R. Mounitha y N. Parameshwari. "Ai Based Dual Authentication System". 4 2, n.º 4 (1 de diciembre de 2022): 158–62. http://dx.doi.org/10.46632/daai/2/4/29.
Texto completoSalonen, Jarno y Alessandro Guarino. "Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics". International Conference on Cyber Warfare and Security 19, n.º 1 (21 de marzo de 2024): 617–20. http://dx.doi.org/10.34190/iccws.19.1.2066.
Texto completoLi, Yu, Daofang Chang, Yinping Gao, Ying Zou y Chunteng Bao. "Automated Container Terminal Production Operation and Optimization via an AdaBoost-Based Digital Twin Framework". Journal of Advanced Transportation 2021 (7 de septiembre de 2021): 1–16. http://dx.doi.org/10.1155/2021/1936764.
Texto completoRajeswari, A. R., K. Kulothungan, Sannasi Ganapathy y Arputharaj Kannan. "Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT". Journal of Intelligent & Fuzzy Systems 40, n.º 5 (22 de abril de 2021): 9197–211. http://dx.doi.org/10.3233/jifs-201633.
Texto completoMuravskyi, Volodymyr. "The impact of global technological trends on accounting". Herald of Ternopil National Economic University, n.º 4 (86) (12 de diciembre de 2017): 138–48. http://dx.doi.org/10.35774/visnyk2017.04.138.
Texto completoRamasamy, Mathiyalagan y Pamela Vinitha Eric. "A novel classification and clustering algorithms for intrusion detection system on convolutional neural network". Bulletin of Electrical Engineering and Informatics 11, n.º 5 (1 de octubre de 2022): 2845–55. http://dx.doi.org/10.11591/eei.v11i5.4145.
Texto completoRodríguez Marco, José Enrique, Manuel Sánchez Rubio, José Javier Martínez Herráiz, Rafael González Armengod y Juan Carlos Plaza Del Pino. "Contributions to Image Transmission in Icing Conditions on Unmanned Aerial Vehicles". Drones 7, n.º 9 (5 de septiembre de 2023): 571. http://dx.doi.org/10.3390/drones7090571.
Texto completoChuang, Hsiu-Min, Fanpyn Liu y Chung-Hsien Tsai. "Early Detection of Abnormal Attacks in Software-Defined Networking Using Machine Learning Approaches". Symmetry 14, n.º 6 (8 de junio de 2022): 1178. http://dx.doi.org/10.3390/sym14061178.
Texto completoZavistovskyi, O. "Professional, service and service-combat activity of the National Police: essence and definition of concepts". Analytical and Comparative Jurisprudence, n.º 5 (30 de diciembre de 2022): 258–62. http://dx.doi.org/10.24144/2788-6018.2022.05.47.
Texto completoKalodanis, Konstantinos, Panagiotis Rizomiliotis y Dimosthenis Anagnostopoulos. "European Artificial Intelligence Act: an AI security approach". Information & Computer Security, 23 de noviembre de 2023. http://dx.doi.org/10.1108/ics-10-2022-0165.
Texto completoWest, Leah. "‘Within or outside Canada’: The Charter’s application to the extraterritorial activities of the Canadian Security Intelligence Service". University of Toronto Law Journal, 5 de enero de 2022. http://dx.doi.org/10.3138/utlj-2021-0105.
Texto completoWest, Leah y Craig Forcese. "Building Haystacks: Information Retention and Data Exploitation by the Canadian Security Intelligence Service". Alberta Law Review, 2 de octubre de 2019, 175. http://dx.doi.org/10.29173/alr2573.
Texto completoCefaliello, Aude y Miriam Kullmann. "Offering false security: How the draft artificial intelligence act undermines fundamental workers rights". European Labour Law Journal, 20 de octubre de 2022, 203195252211144. http://dx.doi.org/10.1177/20319525221114474.
Texto completoAlthar, Raghavendra Rao, Debabrata Samanta, Sathvik Purushotham, Sandeep Singh Sengar y Chaminda Hewage. "Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System". SN Computer Science 4, n.º 4 (15 de abril de 2023). http://dx.doi.org/10.1007/s42979-023-01785-2.
Texto completoForcese, Craig y Kent Roach. "Bill C-51 Backgrounder #2: The Canadian Security Intelligence Service's Proposed Power to 'Reduce' Security Threats Through Conduct that May Violate the Law and Charter". SSRN Electronic Journal, 2015. http://dx.doi.org/10.2139/ssrn.2564272.
Texto completoReyes, Luis, Diana Almeida y Ana Flores. "Information Technologies for Occupational Health and Safety". Athenea, 1 de junio de 2022, 32–41. http://dx.doi.org/10.47460/10.47460/athenea.v3i8.40.
Texto completoVenkatesh Kumar, M. y C. Lakshmi. "A privacy preservation data collection and access control using entropy-based conic curve". Journal of Intelligent & Fuzzy Systems, 2 de febrero de 2023, 1–14. http://dx.doi.org/10.3233/jifs-223141.
Texto completoKouroupis, Konstantinos. "The AI Act in light of the EU Digital Agenda: A critical approach". Journal of Data Protection & Privacy, 1 de enero de 2023. http://dx.doi.org/10.69554/fquz5239.
Texto completoAbdullah, Sura Mahmood y Mustafa Musa Jaber. "Deep learning for content-based image retrieval in FHE algorithms". Journal of Intelligent Systems 32, n.º 1 (1 de enero de 2023). http://dx.doi.org/10.1515/jisys-2022-0222.
Texto completoDubiniecki, Abigail. "The directive on security of networks and information systems (NISD): One more critical step towards a ‘connected digital single market’ for the EU". Journal of Data Protection & Privacy, 1 de julio de 2018. http://dx.doi.org/10.69554/kdhf3147.
Texto completoAlsubai, Shtwai, Ashit Kumar Dutta, Abdul Rahaman Wahab Sait, Yasser Adnan Abu Jaish, Bader Hussain Alamer, Hussam Eldin Hussein Saad y Rashid Ayub. "Enhanced slime mould optimization with convolutional BLSTM autoencoder based malware classification in intelligent systems". Expert Systems, 4 de febrero de 2024. http://dx.doi.org/10.1111/exsy.13557.
Texto completoK. Pazhanivel, S. Sakthi, R. Shilpa y E. Mounika. "AI Based Self Learning Intelligent Information Leak Protection System for TI Companies using LSTM". International Journal of Advanced Research in Science, Communication and Technology, 10 de junio de 2022, 268–72. http://dx.doi.org/10.48175/ijarsct-4595.
Texto completoCleary, Frances, David C. Henshall y Sasitharan Balasubramaniam. "On-Body Edge Computing Through E-Textile Programmable Logic Array". Frontiers in Communications and Networks 2 (11 de junio de 2021). http://dx.doi.org/10.3389/frcmn.2021.688419.
Texto completoFowles, Jib. "Television Violence and You". M/C Journal 3, n.º 1 (1 de marzo de 2000). http://dx.doi.org/10.5204/mcj.1828.
Texto completoRose, Megan Catherine. "The Future Is Furby". M/C Journal 26, n.º 2 (25 de abril de 2023). http://dx.doi.org/10.5204/mcj.2955.
Texto completoFranks, Rachel. "Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”". M/C Journal 20, n.º 2 (26 de abril de 2017). http://dx.doi.org/10.5204/mcj.1214.
Texto completo