Articoli di riviste sul tema "Canadian Security Intelligence Act (Proposed)"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Canadian Security Intelligence Act (Proposed)".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Salter, Mark B., e Geneviève Piché. "The Securitization of the US–Canada Border in American Political Discourse". Canadian Journal of Political Science 44, n. 4 (dicembre 2011): 929–51. http://dx.doi.org/10.1017/s0008423911000813.
Testo completoEDWARDS, J. LL J. "The Canadian Security Intelligence Act 1984—a Canadian appraisal". Oxford Journal of Legal Studies 5, n. 1 (1985): 143–53. http://dx.doi.org/10.1093/ojls/5.1.143.
Testo completoGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, n. 1 (1 giugno 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Testo completoKumari, Rashmi, e Dr Priyanka Singh. "Weaponizing Artificial Intelligence". International Journal for Research in Applied Science and Engineering Technology 11, n. 6 (30 giugno 2023): 966–81. http://dx.doi.org/10.22214/ijraset.2023.53289.
Testo completoShchukina, Tatiana. "Canada's Digital Charter becomes law". Russia and America in the 21st Century, n. 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Testo completoCarabash, Michael P. A. "Section 273.65 of the National Defence Act: Inappropriate and Unconstitutional". Constitutional Forum / Forum constitutionnel 15, n. 1, 2 & 3 (24 luglio 2011): 2006. http://dx.doi.org/10.21991/c9hq17.
Testo completoLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, n. 3 (19 agosto 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Testo completoMoraboena, Srikanthyadav, Gayatri Ketepalli e Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, n. 4 (30 settembre 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Testo completoMonaghan, Jeffrey. "Security Traps and Discourses of Radicalization: Examining Surveillance Practices Targeting Muslims in Canada". Surveillance & Society 12, n. 4 (19 giugno 2014): 485–501. http://dx.doi.org/10.24908/ss.v12i4.4557.
Testo completoMeng, Mingming, e Yuancheng Li. "SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks". PeerJ Computer Science 8 (29 giugno 2022): e1027. http://dx.doi.org/10.7717/peerj-cs.1027.
Testo completoNath, Seema, Subhranil Som e Mukesh Chandra Negi. "Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices". International Journal of Knowledge-based and Intelligent Engineering Systems 25, n. 1 (9 aprile 2021): 139–47. http://dx.doi.org/10.3233/kes-210059.
Testo completoDahake, Dr Rupali, e Dr Pallavi Mirajkar. "Integration Tool using Internet of Things in Smart Architecture of Passenger Processing at Airport Terminal". International Journal of Innovative Technology and Exploring Engineering 11, n. 8 (30 luglio 2022): 93–97. http://dx.doi.org/10.35940/ijitee.h9176.0711822.
Testo completoAlli, P., e J. Dinesh Peter. "A novel auto-encoder induced chaos based image encryption framework aiding DNA computing sequence". Journal of Intelligent & Fuzzy Systems 41, n. 1 (11 agosto 2021): 181–98. http://dx.doi.org/10.3233/jifs-201224.
Testo completoCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke e Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour". Animals 12, n. 13 (1 luglio 2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Testo completoKreklewetz, Robert G., e Laura J. Burlock. "Policy Forum: Canada's Proposed Cryptoasset Legislation". Canadian Tax Journal/Revue fiscale canadienne 71, n. 1 (aprile 2023): 73–81. http://dx.doi.org/10.32721/ctj.2023.71.1.pf.kreklewetz.
Testo completoPohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES". Herald of criminal justice, n. 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Testo completoKim, Sung-Hwan, Nam-Uk Kim e Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling". Kybernetes 44, n. 1 (12 gennaio 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Testo completoKilcullen, Jack K. "Groping for the Reins: ERISA, HMO Malpractice, and Enterprise Liability". American Journal of Law & Medicine 22, n. 1 (1996): 7–50. http://dx.doi.org/10.1017/s0098858800010285.
Testo completoHerbst, Jan, Matthias Rüb, Sogo Pierre Sanon, Christoph Lipps e Hans D. Schotten. "Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach". Network 4, n. 2 (9 aprile 2024): 133–49. http://dx.doi.org/10.3390/network4020007.
Testo completoKaiser, Stefan A. "Legal Challenges of Automated and Autonomous Systems". Volume 60 · 2017 60, n. 1 (1 gennaio 2018): 173–201. http://dx.doi.org/10.3790/gyil.60.1.173.
Testo completoMalgwi, Yusuf Musa, Ibrahim Goni e Bamanga Mahmud Ahmad. "Artificial Neural Network Model for Intrusion Detection System". Mediterranean Journal of Basic and Applied Sciences 06, n. 01 (2022): 20–26. http://dx.doi.org/10.46382/mjbas.2022.6103.
Testo completoChatziamanetoglou, Dimitrios, e Konstantinos Rantos. "Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus". Security and Communication Networks 2023 (13 febbraio 2023): 1–20. http://dx.doi.org/10.1155/2023/3303122.
Testo completoMudaraddi, Kiran, Keerthi T, Likitha Yadav, M. Varsha e Nivedita M. "Weapon Detection System". International Journal for Research in Applied Science and Engineering Technology 11, n. 5 (31 maggio 2023): 3482–87. http://dx.doi.org/10.22214/ijraset.2023.52381.
Testo completoKrishna, R. Venkat, V. Vijayalakshmi e M. Vignesh Balaji. "A Robust Emotion Detection and Music Recommendation System using Mini Xception CNN". International Journal for Research in Applied Science and Engineering Technology 10, n. 12 (31 dicembre 2022): 2158–63. http://dx.doi.org/10.22214/ijraset.2022.48387.
Testo completoGopinath, S., S. Pragadeswaran, P. Subaranjani, R. Mounitha e N. Parameshwari. "Ai Based Dual Authentication System". 4 2, n. 4 (1 dicembre 2022): 158–62. http://dx.doi.org/10.46632/daai/2/4/29.
Testo completoSalonen, Jarno, e Alessandro Guarino. "Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics". International Conference on Cyber Warfare and Security 19, n. 1 (21 marzo 2024): 617–20. http://dx.doi.org/10.34190/iccws.19.1.2066.
Testo completoLi, Yu, Daofang Chang, Yinping Gao, Ying Zou e Chunteng Bao. "Automated Container Terminal Production Operation and Optimization via an AdaBoost-Based Digital Twin Framework". Journal of Advanced Transportation 2021 (7 settembre 2021): 1–16. http://dx.doi.org/10.1155/2021/1936764.
Testo completoRajeswari, A. R., K. Kulothungan, Sannasi Ganapathy e Arputharaj Kannan. "Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT". Journal of Intelligent & Fuzzy Systems 40, n. 5 (22 aprile 2021): 9197–211. http://dx.doi.org/10.3233/jifs-201633.
Testo completoMuravskyi, Volodymyr. "The impact of global technological trends on accounting". Herald of Ternopil National Economic University, n. 4 (86) (12 dicembre 2017): 138–48. http://dx.doi.org/10.35774/visnyk2017.04.138.
Testo completoRamasamy, Mathiyalagan, e Pamela Vinitha Eric. "A novel classification and clustering algorithms for intrusion detection system on convolutional neural network". Bulletin of Electrical Engineering and Informatics 11, n. 5 (1 ottobre 2022): 2845–55. http://dx.doi.org/10.11591/eei.v11i5.4145.
Testo completoRodríguez Marco, José Enrique, Manuel Sánchez Rubio, José Javier Martínez Herráiz, Rafael González Armengod e Juan Carlos Plaza Del Pino. "Contributions to Image Transmission in Icing Conditions on Unmanned Aerial Vehicles". Drones 7, n. 9 (5 settembre 2023): 571. http://dx.doi.org/10.3390/drones7090571.
Testo completoChuang, Hsiu-Min, Fanpyn Liu e Chung-Hsien Tsai. "Early Detection of Abnormal Attacks in Software-Defined Networking Using Machine Learning Approaches". Symmetry 14, n. 6 (8 giugno 2022): 1178. http://dx.doi.org/10.3390/sym14061178.
Testo completoZavistovskyi, O. "Professional, service and service-combat activity of the National Police: essence and definition of concepts". Analytical and Comparative Jurisprudence, n. 5 (30 dicembre 2022): 258–62. http://dx.doi.org/10.24144/2788-6018.2022.05.47.
Testo completoKalodanis, Konstantinos, Panagiotis Rizomiliotis e Dimosthenis Anagnostopoulos. "European Artificial Intelligence Act: an AI security approach". Information & Computer Security, 23 novembre 2023. http://dx.doi.org/10.1108/ics-10-2022-0165.
Testo completoWest, Leah. "‘Within or outside Canada’: The Charter’s application to the extraterritorial activities of the Canadian Security Intelligence Service". University of Toronto Law Journal, 5 gennaio 2022. http://dx.doi.org/10.3138/utlj-2021-0105.
Testo completoWest, Leah, e Craig Forcese. "Building Haystacks: Information Retention and Data Exploitation by the Canadian Security Intelligence Service". Alberta Law Review, 2 ottobre 2019, 175. http://dx.doi.org/10.29173/alr2573.
Testo completoCefaliello, Aude, e Miriam Kullmann. "Offering false security: How the draft artificial intelligence act undermines fundamental workers rights". European Labour Law Journal, 20 ottobre 2022, 203195252211144. http://dx.doi.org/10.1177/20319525221114474.
Testo completoAlthar, Raghavendra Rao, Debabrata Samanta, Sathvik Purushotham, Sandeep Singh Sengar e Chaminda Hewage. "Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System". SN Computer Science 4, n. 4 (15 aprile 2023). http://dx.doi.org/10.1007/s42979-023-01785-2.
Testo completoForcese, Craig, e Kent Roach. "Bill C-51 Backgrounder #2: The Canadian Security Intelligence Service's Proposed Power to 'Reduce' Security Threats Through Conduct that May Violate the Law and Charter". SSRN Electronic Journal, 2015. http://dx.doi.org/10.2139/ssrn.2564272.
Testo completoReyes, Luis, Diana Almeida e Ana Flores. "Information Technologies for Occupational Health and Safety". Athenea, 1 giugno 2022, 32–41. http://dx.doi.org/10.47460/10.47460/athenea.v3i8.40.
Testo completoVenkatesh Kumar, M., e C. Lakshmi. "A privacy preservation data collection and access control using entropy-based conic curve". Journal of Intelligent & Fuzzy Systems, 2 febbraio 2023, 1–14. http://dx.doi.org/10.3233/jifs-223141.
Testo completoKouroupis, Konstantinos. "The AI Act in light of the EU Digital Agenda: A critical approach". Journal of Data Protection & Privacy, 1 gennaio 2023. http://dx.doi.org/10.69554/fquz5239.
Testo completoAbdullah, Sura Mahmood, e Mustafa Musa Jaber. "Deep learning for content-based image retrieval in FHE algorithms". Journal of Intelligent Systems 32, n. 1 (1 gennaio 2023). http://dx.doi.org/10.1515/jisys-2022-0222.
Testo completoDubiniecki, Abigail. "The directive on security of networks and information systems (NISD): One more critical step towards a ‘connected digital single market’ for the EU". Journal of Data Protection & Privacy, 1 luglio 2018. http://dx.doi.org/10.69554/kdhf3147.
Testo completoAlsubai, Shtwai, Ashit Kumar Dutta, Abdul Rahaman Wahab Sait, Yasser Adnan Abu Jaish, Bader Hussain Alamer, Hussam Eldin Hussein Saad e Rashid Ayub. "Enhanced slime mould optimization with convolutional BLSTM autoencoder based malware classification in intelligent systems". Expert Systems, 4 febbraio 2024. http://dx.doi.org/10.1111/exsy.13557.
Testo completoK. Pazhanivel, S. Sakthi, R. Shilpa e E. Mounika. "AI Based Self Learning Intelligent Information Leak Protection System for TI Companies using LSTM". International Journal of Advanced Research in Science, Communication and Technology, 10 giugno 2022, 268–72. http://dx.doi.org/10.48175/ijarsct-4595.
Testo completoCleary, Frances, David C. Henshall e Sasitharan Balasubramaniam. "On-Body Edge Computing Through E-Textile Programmable Logic Array". Frontiers in Communications and Networks 2 (11 giugno 2021). http://dx.doi.org/10.3389/frcmn.2021.688419.
Testo completoFowles, Jib. "Television Violence and You". M/C Journal 3, n. 1 (1 marzo 2000). http://dx.doi.org/10.5204/mcj.1828.
Testo completoRose, Megan Catherine. "The Future Is Furby". M/C Journal 26, n. 2 (25 aprile 2023). http://dx.doi.org/10.5204/mcj.2955.
Testo completoFranks, Rachel. "Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”". M/C Journal 20, n. 2 (26 aprile 2017). http://dx.doi.org/10.5204/mcj.1214.
Testo completo