Artykuły w czasopismach na temat „Canadian Security Intelligence Act (Proposed)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Canadian Security Intelligence Act (Proposed)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Salter, Mark B., i Geneviève Piché. "The Securitization of the US–Canada Border in American Political Discourse". Canadian Journal of Political Science 44, nr 4 (grudzień 2011): 929–51. http://dx.doi.org/10.1017/s0008423911000813.
Pełny tekst źródłaEDWARDS, J. LL J. "The Canadian Security Intelligence Act 1984—a Canadian appraisal". Oxford Journal of Legal Studies 5, nr 1 (1985): 143–53. http://dx.doi.org/10.1093/ojls/5.1.143.
Pełny tekst źródłaGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, nr 1 (1.06.2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Pełny tekst źródłaKumari, Rashmi, i Dr Priyanka Singh. "Weaponizing Artificial Intelligence". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 966–81. http://dx.doi.org/10.22214/ijraset.2023.53289.
Pełny tekst źródłaShchukina, Tatiana. "Canada's Digital Charter becomes law". Russia and America in the 21st Century, nr 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Pełny tekst źródłaCarabash, Michael P. A. "Section 273.65 of the National Defence Act: Inappropriate and Unconstitutional". Constitutional Forum / Forum constitutionnel 15, nr 1, 2 & 3 (24.07.2011): 2006. http://dx.doi.org/10.21991/c9hq17.
Pełny tekst źródłaLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, nr 3 (19.08.2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Pełny tekst źródłaMoraboena, Srikanthyadav, Gayatri Ketepalli i Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, nr 4 (30.09.2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Pełny tekst źródłaMonaghan, Jeffrey. "Security Traps and Discourses of Radicalization: Examining Surveillance Practices Targeting Muslims in Canada". Surveillance & Society 12, nr 4 (19.06.2014): 485–501. http://dx.doi.org/10.24908/ss.v12i4.4557.
Pełny tekst źródłaMeng, Mingming, i Yuancheng Li. "SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks". PeerJ Computer Science 8 (29.06.2022): e1027. http://dx.doi.org/10.7717/peerj-cs.1027.
Pełny tekst źródłaNath, Seema, Subhranil Som i Mukesh Chandra Negi. "Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices". International Journal of Knowledge-based and Intelligent Engineering Systems 25, nr 1 (9.04.2021): 139–47. http://dx.doi.org/10.3233/kes-210059.
Pełny tekst źródłaDahake, Dr Rupali, i Dr Pallavi Mirajkar. "Integration Tool using Internet of Things in Smart Architecture of Passenger Processing at Airport Terminal". International Journal of Innovative Technology and Exploring Engineering 11, nr 8 (30.07.2022): 93–97. http://dx.doi.org/10.35940/ijitee.h9176.0711822.
Pełny tekst źródłaAlli, P., i J. Dinesh Peter. "A novel auto-encoder induced chaos based image encryption framework aiding DNA computing sequence". Journal of Intelligent & Fuzzy Systems 41, nr 1 (11.08.2021): 181–98. http://dx.doi.org/10.3233/jifs-201224.
Pełny tekst źródłaCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke i Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour". Animals 12, nr 13 (1.07.2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Pełny tekst źródłaKreklewetz, Robert G., i Laura J. Burlock. "Policy Forum: Canada's Proposed Cryptoasset Legislation". Canadian Tax Journal/Revue fiscale canadienne 71, nr 1 (kwiecień 2023): 73–81. http://dx.doi.org/10.32721/ctj.2023.71.1.pf.kreklewetz.
Pełny tekst źródłaPohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES". Herald of criminal justice, nr 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Pełny tekst źródłaKim, Sung-Hwan, Nam-Uk Kim i Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling". Kybernetes 44, nr 1 (12.01.2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Pełny tekst źródłaKilcullen, Jack K. "Groping for the Reins: ERISA, HMO Malpractice, and Enterprise Liability". American Journal of Law & Medicine 22, nr 1 (1996): 7–50. http://dx.doi.org/10.1017/s0098858800010285.
Pełny tekst źródłaHerbst, Jan, Matthias Rüb, Sogo Pierre Sanon, Christoph Lipps i Hans D. Schotten. "Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach". Network 4, nr 2 (9.04.2024): 133–49. http://dx.doi.org/10.3390/network4020007.
Pełny tekst źródłaKaiser, Stefan A. "Legal Challenges of Automated and Autonomous Systems". Volume 60 · 2017 60, nr 1 (1.01.2018): 173–201. http://dx.doi.org/10.3790/gyil.60.1.173.
Pełny tekst źródłaMalgwi, Yusuf Musa, Ibrahim Goni i Bamanga Mahmud Ahmad. "Artificial Neural Network Model for Intrusion Detection System". Mediterranean Journal of Basic and Applied Sciences 06, nr 01 (2022): 20–26. http://dx.doi.org/10.46382/mjbas.2022.6103.
Pełny tekst źródłaChatziamanetoglou, Dimitrios, i Konstantinos Rantos. "Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus". Security and Communication Networks 2023 (13.02.2023): 1–20. http://dx.doi.org/10.1155/2023/3303122.
Pełny tekst źródłaMudaraddi, Kiran, Keerthi T, Likitha Yadav, M. Varsha i Nivedita M. "Weapon Detection System". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 3482–87. http://dx.doi.org/10.22214/ijraset.2023.52381.
Pełny tekst źródłaKrishna, R. Venkat, V. Vijayalakshmi i M. Vignesh Balaji. "A Robust Emotion Detection and Music Recommendation System using Mini Xception CNN". International Journal for Research in Applied Science and Engineering Technology 10, nr 12 (31.12.2022): 2158–63. http://dx.doi.org/10.22214/ijraset.2022.48387.
Pełny tekst źródłaGopinath, S., S. Pragadeswaran, P. Subaranjani, R. Mounitha i N. Parameshwari. "Ai Based Dual Authentication System". 4 2, nr 4 (1.12.2022): 158–62. http://dx.doi.org/10.46632/daai/2/4/29.
Pełny tekst źródłaSalonen, Jarno, i Alessandro Guarino. "Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics". International Conference on Cyber Warfare and Security 19, nr 1 (21.03.2024): 617–20. http://dx.doi.org/10.34190/iccws.19.1.2066.
Pełny tekst źródłaLi, Yu, Daofang Chang, Yinping Gao, Ying Zou i Chunteng Bao. "Automated Container Terminal Production Operation and Optimization via an AdaBoost-Based Digital Twin Framework". Journal of Advanced Transportation 2021 (7.09.2021): 1–16. http://dx.doi.org/10.1155/2021/1936764.
Pełny tekst źródłaRajeswari, A. R., K. Kulothungan, Sannasi Ganapathy i Arputharaj Kannan. "Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT". Journal of Intelligent & Fuzzy Systems 40, nr 5 (22.04.2021): 9197–211. http://dx.doi.org/10.3233/jifs-201633.
Pełny tekst źródłaMuravskyi, Volodymyr. "The impact of global technological trends on accounting". Herald of Ternopil National Economic University, nr 4 (86) (12.12.2017): 138–48. http://dx.doi.org/10.35774/visnyk2017.04.138.
Pełny tekst źródłaRamasamy, Mathiyalagan, i Pamela Vinitha Eric. "A novel classification and clustering algorithms for intrusion detection system on convolutional neural network". Bulletin of Electrical Engineering and Informatics 11, nr 5 (1.10.2022): 2845–55. http://dx.doi.org/10.11591/eei.v11i5.4145.
Pełny tekst źródłaRodríguez Marco, José Enrique, Manuel Sánchez Rubio, José Javier Martínez Herráiz, Rafael González Armengod i Juan Carlos Plaza Del Pino. "Contributions to Image Transmission in Icing Conditions on Unmanned Aerial Vehicles". Drones 7, nr 9 (5.09.2023): 571. http://dx.doi.org/10.3390/drones7090571.
Pełny tekst źródłaChuang, Hsiu-Min, Fanpyn Liu i Chung-Hsien Tsai. "Early Detection of Abnormal Attacks in Software-Defined Networking Using Machine Learning Approaches". Symmetry 14, nr 6 (8.06.2022): 1178. http://dx.doi.org/10.3390/sym14061178.
Pełny tekst źródłaZavistovskyi, O. "Professional, service and service-combat activity of the National Police: essence and definition of concepts". Analytical and Comparative Jurisprudence, nr 5 (30.12.2022): 258–62. http://dx.doi.org/10.24144/2788-6018.2022.05.47.
Pełny tekst źródłaKalodanis, Konstantinos, Panagiotis Rizomiliotis i Dimosthenis Anagnostopoulos. "European Artificial Intelligence Act: an AI security approach". Information & Computer Security, 23.11.2023. http://dx.doi.org/10.1108/ics-10-2022-0165.
Pełny tekst źródłaWest, Leah. "‘Within or outside Canada’: The Charter’s application to the extraterritorial activities of the Canadian Security Intelligence Service". University of Toronto Law Journal, 5.01.2022. http://dx.doi.org/10.3138/utlj-2021-0105.
Pełny tekst źródłaWest, Leah, i Craig Forcese. "Building Haystacks: Information Retention and Data Exploitation by the Canadian Security Intelligence Service". Alberta Law Review, 2.10.2019, 175. http://dx.doi.org/10.29173/alr2573.
Pełny tekst źródłaCefaliello, Aude, i Miriam Kullmann. "Offering false security: How the draft artificial intelligence act undermines fundamental workers rights". European Labour Law Journal, 20.10.2022, 203195252211144. http://dx.doi.org/10.1177/20319525221114474.
Pełny tekst źródłaAlthar, Raghavendra Rao, Debabrata Samanta, Sathvik Purushotham, Sandeep Singh Sengar i Chaminda Hewage. "Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System". SN Computer Science 4, nr 4 (15.04.2023). http://dx.doi.org/10.1007/s42979-023-01785-2.
Pełny tekst źródłaForcese, Craig, i Kent Roach. "Bill C-51 Backgrounder #2: The Canadian Security Intelligence Service's Proposed Power to 'Reduce' Security Threats Through Conduct that May Violate the Law and Charter". SSRN Electronic Journal, 2015. http://dx.doi.org/10.2139/ssrn.2564272.
Pełny tekst źródłaReyes, Luis, Diana Almeida i Ana Flores. "Information Technologies for Occupational Health and Safety". Athenea, 1.06.2022, 32–41. http://dx.doi.org/10.47460/10.47460/athenea.v3i8.40.
Pełny tekst źródłaVenkatesh Kumar, M., i C. Lakshmi. "A privacy preservation data collection and access control using entropy-based conic curve". Journal of Intelligent & Fuzzy Systems, 2.02.2023, 1–14. http://dx.doi.org/10.3233/jifs-223141.
Pełny tekst źródłaKouroupis, Konstantinos. "The AI Act in light of the EU Digital Agenda: A critical approach". Journal of Data Protection & Privacy, 1.01.2023. http://dx.doi.org/10.69554/fquz5239.
Pełny tekst źródłaAbdullah, Sura Mahmood, i Mustafa Musa Jaber. "Deep learning for content-based image retrieval in FHE algorithms". Journal of Intelligent Systems 32, nr 1 (1.01.2023). http://dx.doi.org/10.1515/jisys-2022-0222.
Pełny tekst źródłaDubiniecki, Abigail. "The directive on security of networks and information systems (NISD): One more critical step towards a ‘connected digital single market’ for the EU". Journal of Data Protection & Privacy, 1.07.2018. http://dx.doi.org/10.69554/kdhf3147.
Pełny tekst źródłaAlsubai, Shtwai, Ashit Kumar Dutta, Abdul Rahaman Wahab Sait, Yasser Adnan Abu Jaish, Bader Hussain Alamer, Hussam Eldin Hussein Saad i Rashid Ayub. "Enhanced slime mould optimization with convolutional BLSTM autoencoder based malware classification in intelligent systems". Expert Systems, 4.02.2024. http://dx.doi.org/10.1111/exsy.13557.
Pełny tekst źródłaK. Pazhanivel, S. Sakthi, R. Shilpa i E. Mounika. "AI Based Self Learning Intelligent Information Leak Protection System for TI Companies using LSTM". International Journal of Advanced Research in Science, Communication and Technology, 10.06.2022, 268–72. http://dx.doi.org/10.48175/ijarsct-4595.
Pełny tekst źródłaCleary, Frances, David C. Henshall i Sasitharan Balasubramaniam. "On-Body Edge Computing Through E-Textile Programmable Logic Array". Frontiers in Communications and Networks 2 (11.06.2021). http://dx.doi.org/10.3389/frcmn.2021.688419.
Pełny tekst źródłaFowles, Jib. "Television Violence and You". M/C Journal 3, nr 1 (1.03.2000). http://dx.doi.org/10.5204/mcj.1828.
Pełny tekst źródłaRose, Megan Catherine. "The Future Is Furby". M/C Journal 26, nr 2 (25.04.2023). http://dx.doi.org/10.5204/mcj.2955.
Pełny tekst źródłaFranks, Rachel. "Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”". M/C Journal 20, nr 2 (26.04.2017). http://dx.doi.org/10.5204/mcj.1214.
Pełny tekst źródła