Articoli di riviste sul tema "Canadian Security Intelligence Service (Proposed)"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Canadian Security Intelligence Service (Proposed)".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Weller, Geoffrey R. "The Canadian Security Intelligence Service under stress". Canadian Public Administration/Administration publique du Canada 31, n. 2 (luglio 1988): 279–302. http://dx.doi.org/10.1111/j.1754-7121.1988.tb01318.x.
Testo completoRankin, Murray. "National Security: Information, Accountability, and the Canadian Security Intelligence Service". University of Toronto Law Journal 36, n. 3 (1986): 249. http://dx.doi.org/10.2307/825575.
Testo completoSenior CSIS Executive. "THREE ASPECTS OF ACCOUNTABILITY FOR THE CANADIAN INTELLIGENCE PUBLIC SERVICE". Journal of Intelligence, Conflict, and Warfare 6, n. 3 (31 gennaio 2024): 243–46. http://dx.doi.org/10.21810/jicw.v6i3.6406.
Testo completoHewitt, Steve. "Intelligence at the Learneds: The RCMP, the Learneds, and the Canadian Historical Association". Ottawa 1998 9, n. 1 (9 febbraio 2006): 267–86. http://dx.doi.org/10.7202/030501ar.
Testo completoWest, Leah, e Craig Forcese. "Twisted into knots: Canada’s challenges in lawful access to encrypted communications". Common Law World Review 49, n. 3-4 (22 gennaio 2020): 182–98. http://dx.doi.org/10.1177/1473779519891597.
Testo completoWilczynski, Artur. "Equity, Diversity, and Inclusion in National Security Intelligence". Journal of Intelligence, Conflict, and Warfare 4, n. 3 (27 febbraio 2022): 222–26. http://dx.doi.org/10.21810/jicw.v4i3.4197.
Testo completoGratton, Phil. "Leadership, Technology and National Security". Journal of Intelligence, Conflict, and Warfare 4, n. 3 (31 gennaio 2022): 147–51. http://dx.doi.org/10.21810/jicw.v4i3.4164.
Testo completoYoung, Bob. "Foreign Interference / Influence in Canada: A Way Forward". Journal of Intelligence, Conflict, and Warfare 6, n. 2 (24 novembre 2023): 79–83. http://dx.doi.org/10.21810/jicw.v6i2.6250.
Testo completoRyan, Joseph F. "Review of the Canadian security intelligence service: A suitable model for the United Kingdom?" Intelligence and National Security 5, n. 3 (luglio 1990): 200–206. http://dx.doi.org/10.1080/02684529008432070.
Testo completoPark, Keundug, e Heung-Youl Youm. "Proposal of a Service Model for Blockchain-Based Security Tokens". Big Data and Cognitive Computing 8, n. 3 (12 marzo 2024): 30. http://dx.doi.org/10.3390/bdcc8030030.
Testo completoSarkar, Manash, Soumya Banerjee, Youakim Badr e Arun Kumar Sangaiah. "Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence". International Journal of Ambient Computing and Intelligence 8, n. 3 (luglio 2017): 1–21. http://dx.doi.org/10.4018/ijaci.2017070101.
Testo completoGratton, Phil. "THREAT RESILIENCE IN THE REALM OF MISINFORMATION, DISINFORMATION, AND TRUST". Journal of Intelligence, Conflict, and Warfare 5, n. 3 (31 gennaio 2023): 96–100. http://dx.doi.org/10.21810/jicw.v5i3.5126.
Testo completoTessier, Michelle. "LEVERAGING DIVERSITY, EQUALITY, AND INCLUSION (DEI) IN MEETING MODERN INTELLIGENCE CHALLENGES". Journal of Intelligence, Conflict, and Warfare 5, n. 3 (31 gennaio 2023): 122–25. http://dx.doi.org/10.21810/jicw.v5i3.5180.
Testo completoVelliangiri, S., P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari e Yasser Alzamil. "Intelligence Amplification-Based Smart Health Record Chain for Enterprise Management System". Information 14, n. 5 (11 maggio 2023): 284. http://dx.doi.org/10.3390/info14050284.
Testo completoGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, n. 1 (1 giugno 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Testo completoPark, Keundug, e Heung-Youl Youm. "Proposal of Decentralized P2P Service Model for Transfer between Blockchain-Based Heterogeneous Cryptocurrencies and CBDCs". Big Data and Cognitive Computing 6, n. 4 (19 dicembre 2022): 159. http://dx.doi.org/10.3390/bdcc6040159.
Testo completoMoraboena, Srikanthyadav, Gayatri Ketepalli e Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, n. 4 (30 settembre 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Testo completoLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, n. 3 (19 agosto 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Testo completoStepanovskyi, V. S. "The activity of The Security Service of Ukraine as a subject of ensuring national security in the conditions of martial law". Analytical and Comparative Jurisprudence, n. 3 (18 luglio 2023): 298–302. http://dx.doi.org/10.24144/2788-6018.2023.03.54.
Testo completoGuan, Allen Lim Chong, Goi Chai Lee e Peter Dell. "Increasing the Adoption of Canadian Retail Businesses’ Websites: Canadian Young Generation Consumers' Enticement". Global Disclosure of Economics and Business 10, n. 1 (20 maggio 2021): 17–36. http://dx.doi.org/10.18034/gdeb.v10i1.596.
Testo completoL, Santhanalakshmi, e Sakkaravarthi R. "INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)". Asian Journal of Pharmaceutical and Clinical Research 10, n. 13 (1 aprile 2017): 153. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19602.
Testo completoManin, Iaroslav, e Aleksandra Evgen'evna Klimashina. "State security of Israel: international and national legal aspects". Национальная безопасность / nota bene, n. 2 (febbraio 2023): 1–19. http://dx.doi.org/10.7256/2454-0668.2023.2.39932.
Testo completoLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence". Mathematical Problems in Engineering 2022 (22 agosto 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Testo completoAlrubayyi, Hadeel, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem e Mona Jaber. "Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications". Future Internet 16, n. 3 (29 febbraio 2024): 85. http://dx.doi.org/10.3390/fi16030085.
Testo completoMlato, Stanley, Yesaya Gabriel, Prince Chirwa e Hyunsung Kim. "Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment". International journal of Computer Networks & Communications 16, n. 2 (29 marzo 2024): 87–106. http://dx.doi.org/10.5121/ijcnc.2024.16206.
Testo completoFranchuk, Vasyl, e Volodymyr Hobela. "THE STRATEGIC VECTOR OF UKRAINE'S FINANCIAL INTELLIGENCE CONSTRUCTION". Науковий вісник Львівського державного університету внутрішніх справ (серія економічна), n. 1 (28 ottobre 2022): 3–11. http://dx.doi.org/10.32782/2311-844x/2022-1-1.
Testo completoJamil, Harun, Faiza Qayyum, Naeem Iqbal, Murad Ali Khan, Syed Shehryar Ali Naqvi, Salabat Khan e Do Hyeun Kim. "Secure Hydrogen Production Analysis and Prediction Based on Blockchain Service Framework for Intelligent Power Management System". Smart Cities 6, n. 6 (22 novembre 2023): 3192–224. http://dx.doi.org/10.3390/smartcities6060142.
Testo completoSiddique, Iqtiar Md, Selim Molla, MD Rakib Hasan e Anamika Ahmed Siddique. "Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features". Journal of IoT and Machine Learning 1, n. 1 (9 febbraio 2024): 22–29. http://dx.doi.org/10.48001/joitml.2024.1122-29.
Testo completoYengkangyi, Millicent, Kwadwo Bioh Agyei e George Asumadu. "Contemporary Challenges Associated With Border Security Operations to Promote Socio-Economic Development at Aflao Border in Ghana". International Journal of Public Policy and Administration 5, n. 3 (29 novembre 2023): 46–69. http://dx.doi.org/10.47941/ijppa.1531.
Testo completoKaushik, Shivkant, Ramesh Chandra Poonia, Sunil Kumar Khatri, Debabrata Samanta e Partha Chakraborty. "Transmit Range Adjustment Using Artificial Intelligence for Enhancement of Location Privacy and Data Security in Service Location Protocol of VANET". Wireless Communications and Mobile Computing 2022 (16 settembre 2022): 1–13. http://dx.doi.org/10.1155/2022/9642774.
Testo completoPohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES". Herald of criminal justice, n. 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Testo completoBuriachok, Volodymyr L., Volodymyr М. Bogush, Yurii V. Borsukovskii, Pavlo M. Skladannyi e Victoria Yu Borsukovska. "МОДЕЛЬ ПІДГОТОВКИ ФАХІВЦІВ У СФЕРІ ІНФОРМАЦІЙНОЇ ТА КІБЕРНЕТИЧНОЇ БЕЗПЕКИ В ЗАКЛАДАХ ВИЩОЇ ОСВІТИ УКРАЇНИ". Information Technologies and Learning Tools 67, n. 5 (30 ottobre 2018): 277. http://dx.doi.org/10.33407/itlt.v67i5.2347.
Testo completoHwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee e Donghyun Kim. "Current Status and Security Trend of OSINT". Wireless Communications and Mobile Computing 2022 (18 febbraio 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.
Testo completoRathod, Tejal, Nilesh Kumar Jadav, Mohammad Dahman Alshehri, Sudeep Tanwar, Ravi Sharma, Raluca-Andreea Felseghi e Maria Simona Raboaca. "Blockchain for Future Wireless Networks: A Decade Survey". Sensors 22, n. 11 (31 maggio 2022): 4182. http://dx.doi.org/10.3390/s22114182.
Testo completoHussain, Muhammad Iftikhar, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain e Muhammad Salman Pathan. "An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls". Journal of Intelligent & Fuzzy Systems 41, n. 1 (11 agosto 2021): 125–36. http://dx.doi.org/10.3233/jifs-200835.
Testo completoHaddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali e Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework". Eastern-European Journal of Enterprise Technologies 6, n. 9 (120) (30 dicembre 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.
Testo completoYang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology". Scientific Programming 2022 (26 aprile 2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.
Testo completoYang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology". Scientific Programming 2022 (26 aprile 2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.
Testo completoSinha, Keshav, Annu Priya e Partha Paul. "K-RSA: Secure data storage technique for multimedia in cloud data server". Journal of Intelligent & Fuzzy Systems 39, n. 3 (7 ottobre 2020): 3297–314. http://dx.doi.org/10.3233/jifs-191687.
Testo completoCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke e Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour". Animals 12, n. 13 (1 luglio 2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Testo completoSylla, Tidiane, Mohamed Aymen Chalouf, Francine Krief e Karim Samaké. "SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things". Security and Communication Networks 2021 (14 aprile 2021): 1–24. http://dx.doi.org/10.1155/2021/6632747.
Testo completoKhan, Muhammad Salman, Ken Ferens e Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks". International Journal of Cognitive Informatics and Natural Intelligence 8, n. 3 (luglio 2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.
Testo completoMoyo, Moses, e Marianne Loock. "Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa". Information 12, n. 3 (17 marzo 2021): 128. http://dx.doi.org/10.3390/info12030128.
Testo completoManderna, Ankit, Sushil Kumar, Upasana Dohare, Mohammad Aljaidi, Omprakash Kaiwartya e Jaime Lloret. "Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic". Sensors 23, n. 21 (27 ottobre 2023): 8772. http://dx.doi.org/10.3390/s23218772.
Testo completoArroyo-Figueroa, Gustavo. "Artificial Intelligence the Strategic Key of Cybersecurity". International Journal of Combinatorial Optimization Problems and Informatics 14, n. 3 (31 dicembre 2023): 16–23. http://dx.doi.org/10.61467/2007.1558.2023.v14i3.372.
Testo completoShobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim e M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services". International Journal of Software Engineering and Computer Systems 9, n. 1 (31 gennaio 2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.
Testo completoVimala, K., e Dr D. Maruthanayagam. "Comparative Analysis of Routing Algorithms to Enhance the Quality of Service in MANET". International Journal of Recent Technology and Engineering (IJRTE) 11, n. 1 (30 maggio 2022): 108–15. http://dx.doi.org/10.35940/ijrte.a6949.0511122.
Testo completoNajib, Warsun, Selo Sulistyo e Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment". Communications in Science and Technology 9, n. 1 (16 luglio 2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.
Testo completoManikandan, Kayalvizhi, e Ramamoorthy Sriramulu. "Optimized Path Planning Strategy to Enhance Security under Swarm of Unmanned Aerial Vehicles". Drones 6, n. 11 (2 novembre 2022): 336. http://dx.doi.org/10.3390/drones6110336.
Testo completoZhang, Yunpeng, e Xin Liu. "An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network". International Journal of Software Engineering and Knowledge Engineering 30, n. 11n12 (novembre 2020): 1851–65. http://dx.doi.org/10.1142/s0218194020500400.
Testo completo