Artykuły w czasopismach na temat „Canadian Security Intelligence Service (Proposed)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Canadian Security Intelligence Service (Proposed)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Weller, Geoffrey R. "The Canadian Security Intelligence Service under stress". Canadian Public Administration/Administration publique du Canada 31, nr 2 (lipiec 1988): 279–302. http://dx.doi.org/10.1111/j.1754-7121.1988.tb01318.x.
Pełny tekst źródłaRankin, Murray. "National Security: Information, Accountability, and the Canadian Security Intelligence Service". University of Toronto Law Journal 36, nr 3 (1986): 249. http://dx.doi.org/10.2307/825575.
Pełny tekst źródłaSenior CSIS Executive. "THREE ASPECTS OF ACCOUNTABILITY FOR THE CANADIAN INTELLIGENCE PUBLIC SERVICE". Journal of Intelligence, Conflict, and Warfare 6, nr 3 (31.01.2024): 243–46. http://dx.doi.org/10.21810/jicw.v6i3.6406.
Pełny tekst źródłaHewitt, Steve. "Intelligence at the Learneds: The RCMP, the Learneds, and the Canadian Historical Association". Ottawa 1998 9, nr 1 (9.02.2006): 267–86. http://dx.doi.org/10.7202/030501ar.
Pełny tekst źródłaWest, Leah, i Craig Forcese. "Twisted into knots: Canada’s challenges in lawful access to encrypted communications". Common Law World Review 49, nr 3-4 (22.01.2020): 182–98. http://dx.doi.org/10.1177/1473779519891597.
Pełny tekst źródłaWilczynski, Artur. "Equity, Diversity, and Inclusion in National Security Intelligence". Journal of Intelligence, Conflict, and Warfare 4, nr 3 (27.02.2022): 222–26. http://dx.doi.org/10.21810/jicw.v4i3.4197.
Pełny tekst źródłaGratton, Phil. "Leadership, Technology and National Security". Journal of Intelligence, Conflict, and Warfare 4, nr 3 (31.01.2022): 147–51. http://dx.doi.org/10.21810/jicw.v4i3.4164.
Pełny tekst źródłaYoung, Bob. "Foreign Interference / Influence in Canada: A Way Forward". Journal of Intelligence, Conflict, and Warfare 6, nr 2 (24.11.2023): 79–83. http://dx.doi.org/10.21810/jicw.v6i2.6250.
Pełny tekst źródłaRyan, Joseph F. "Review of the Canadian security intelligence service: A suitable model for the United Kingdom?" Intelligence and National Security 5, nr 3 (lipiec 1990): 200–206. http://dx.doi.org/10.1080/02684529008432070.
Pełny tekst źródłaPark, Keundug, i Heung-Youl Youm. "Proposal of a Service Model for Blockchain-Based Security Tokens". Big Data and Cognitive Computing 8, nr 3 (12.03.2024): 30. http://dx.doi.org/10.3390/bdcc8030030.
Pełny tekst źródłaSarkar, Manash, Soumya Banerjee, Youakim Badr i Arun Kumar Sangaiah. "Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence". International Journal of Ambient Computing and Intelligence 8, nr 3 (lipiec 2017): 1–21. http://dx.doi.org/10.4018/ijaci.2017070101.
Pełny tekst źródłaGratton, Phil. "THREAT RESILIENCE IN THE REALM OF MISINFORMATION, DISINFORMATION, AND TRUST". Journal of Intelligence, Conflict, and Warfare 5, nr 3 (31.01.2023): 96–100. http://dx.doi.org/10.21810/jicw.v5i3.5126.
Pełny tekst źródłaTessier, Michelle. "LEVERAGING DIVERSITY, EQUALITY, AND INCLUSION (DEI) IN MEETING MODERN INTELLIGENCE CHALLENGES". Journal of Intelligence, Conflict, and Warfare 5, nr 3 (31.01.2023): 122–25. http://dx.doi.org/10.21810/jicw.v5i3.5180.
Pełny tekst źródłaVelliangiri, S., P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari i Yasser Alzamil. "Intelligence Amplification-Based Smart Health Record Chain for Enterprise Management System". Information 14, nr 5 (11.05.2023): 284. http://dx.doi.org/10.3390/info14050284.
Pełny tekst źródłaGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, nr 1 (1.06.2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Pełny tekst źródłaPark, Keundug, i Heung-Youl Youm. "Proposal of Decentralized P2P Service Model for Transfer between Blockchain-Based Heterogeneous Cryptocurrencies and CBDCs". Big Data and Cognitive Computing 6, nr 4 (19.12.2022): 159. http://dx.doi.org/10.3390/bdcc6040159.
Pełny tekst źródłaMoraboena, Srikanthyadav, Gayatri Ketepalli i Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, nr 4 (30.09.2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Pełny tekst źródłaLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, nr 3 (19.08.2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Pełny tekst źródłaStepanovskyi, V. S. "The activity of The Security Service of Ukraine as a subject of ensuring national security in the conditions of martial law". Analytical and Comparative Jurisprudence, nr 3 (18.07.2023): 298–302. http://dx.doi.org/10.24144/2788-6018.2023.03.54.
Pełny tekst źródłaGuan, Allen Lim Chong, Goi Chai Lee i Peter Dell. "Increasing the Adoption of Canadian Retail Businesses’ Websites: Canadian Young Generation Consumers' Enticement". Global Disclosure of Economics and Business 10, nr 1 (20.05.2021): 17–36. http://dx.doi.org/10.18034/gdeb.v10i1.596.
Pełny tekst źródłaL, Santhanalakshmi, i Sakkaravarthi R. "INTRUSION DEFENSE MECHANISM USING ARTIFICIAL IMMUNE SYSTEM IN CLOUD COMPUTING (CLOUD SECURITY USING COMPUTATIONAL INTELLIGENCE)". Asian Journal of Pharmaceutical and Clinical Research 10, nr 13 (1.04.2017): 153. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19602.
Pełny tekst źródłaManin, Iaroslav, i Aleksandra Evgen'evna Klimashina. "State security of Israel: international and national legal aspects". Национальная безопасность / nota bene, nr 2 (luty 2023): 1–19. http://dx.doi.org/10.7256/2454-0668.2023.2.39932.
Pełny tekst źródłaLiu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence". Mathematical Problems in Engineering 2022 (22.08.2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.
Pełny tekst źródłaAlrubayyi, Hadeel, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem i Mona Jaber. "Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications". Future Internet 16, nr 3 (29.02.2024): 85. http://dx.doi.org/10.3390/fi16030085.
Pełny tekst źródłaMlato, Stanley, Yesaya Gabriel, Prince Chirwa i Hyunsung Kim. "Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment". International journal of Computer Networks & Communications 16, nr 2 (29.03.2024): 87–106. http://dx.doi.org/10.5121/ijcnc.2024.16206.
Pełny tekst źródłaFranchuk, Vasyl, i Volodymyr Hobela. "THE STRATEGIC VECTOR OF UKRAINE'S FINANCIAL INTELLIGENCE CONSTRUCTION". Науковий вісник Львівського державного університету внутрішніх справ (серія економічна), nr 1 (28.10.2022): 3–11. http://dx.doi.org/10.32782/2311-844x/2022-1-1.
Pełny tekst źródłaJamil, Harun, Faiza Qayyum, Naeem Iqbal, Murad Ali Khan, Syed Shehryar Ali Naqvi, Salabat Khan i Do Hyeun Kim. "Secure Hydrogen Production Analysis and Prediction Based on Blockchain Service Framework for Intelligent Power Management System". Smart Cities 6, nr 6 (22.11.2023): 3192–224. http://dx.doi.org/10.3390/smartcities6060142.
Pełny tekst źródłaSiddique, Iqtiar Md, Selim Molla, MD Rakib Hasan i Anamika Ahmed Siddique. "Deployment of Advanced and Intelligent Logistics Vehicles with Enhanced Tracking and Security Features". Journal of IoT and Machine Learning 1, nr 1 (9.02.2024): 22–29. http://dx.doi.org/10.48001/joitml.2024.1122-29.
Pełny tekst źródłaYengkangyi, Millicent, Kwadwo Bioh Agyei i George Asumadu. "Contemporary Challenges Associated With Border Security Operations to Promote Socio-Economic Development at Aflao Border in Ghana". International Journal of Public Policy and Administration 5, nr 3 (29.11.2023): 46–69. http://dx.doi.org/10.47941/ijppa.1531.
Pełny tekst źródłaKaushik, Shivkant, Ramesh Chandra Poonia, Sunil Kumar Khatri, Debabrata Samanta i Partha Chakraborty. "Transmit Range Adjustment Using Artificial Intelligence for Enhancement of Location Privacy and Data Security in Service Location Protocol of VANET". Wireless Communications and Mobile Computing 2022 (16.09.2022): 1–13. http://dx.doi.org/10.1155/2022/9642774.
Pełny tekst źródłaPohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES". Herald of criminal justice, nr 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Pełny tekst źródłaBuriachok, Volodymyr L., Volodymyr М. Bogush, Yurii V. Borsukovskii, Pavlo M. Skladannyi i Victoria Yu Borsukovska. "МОДЕЛЬ ПІДГОТОВКИ ФАХІВЦІВ У СФЕРІ ІНФОРМАЦІЙНОЇ ТА КІБЕРНЕТИЧНОЇ БЕЗПЕКИ В ЗАКЛАДАХ ВИЩОЇ ОСВІТИ УКРАЇНИ". Information Technologies and Learning Tools 67, nr 5 (30.10.2018): 277. http://dx.doi.org/10.33407/itlt.v67i5.2347.
Pełny tekst źródłaHwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee i Donghyun Kim. "Current Status and Security Trend of OSINT". Wireless Communications and Mobile Computing 2022 (18.02.2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.
Pełny tekst źródłaRathod, Tejal, Nilesh Kumar Jadav, Mohammad Dahman Alshehri, Sudeep Tanwar, Ravi Sharma, Raluca-Andreea Felseghi i Maria Simona Raboaca. "Blockchain for Future Wireless Networks: A Decade Survey". Sensors 22, nr 11 (31.05.2022): 4182. http://dx.doi.org/10.3390/s22114182.
Pełny tekst źródłaHussain, Muhammad Iftikhar, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain i Muhammad Salman Pathan. "An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls". Journal of Intelligent & Fuzzy Systems 41, nr 1 (11.08.2021): 125–36. http://dx.doi.org/10.3233/jifs-200835.
Pełny tekst źródłaHaddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali i Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework". Eastern-European Journal of Enterprise Technologies 6, nr 9 (120) (30.12.2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.
Pełny tekst źródłaYang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology". Scientific Programming 2022 (26.04.2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.
Pełny tekst źródłaYang, Guixing. "Optimization of University Financial Services Using the Blockchain Technology". Scientific Programming 2022 (26.04.2022): 1–8. http://dx.doi.org/10.1155/2022/2680366.
Pełny tekst źródłaSinha, Keshav, Annu Priya i Partha Paul. "K-RSA: Secure data storage technique for multimedia in cloud data server". Journal of Intelligent & Fuzzy Systems 39, nr 3 (7.10.2020): 3297–314. http://dx.doi.org/10.3233/jifs-191687.
Pełny tekst źródłaCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke i Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour". Animals 12, nr 13 (1.07.2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Pełny tekst źródłaSylla, Tidiane, Mohamed Aymen Chalouf, Francine Krief i Karim Samaké. "SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things". Security and Communication Networks 2021 (14.04.2021): 1–24. http://dx.doi.org/10.1155/2021/6632747.
Pełny tekst źródłaKhan, Muhammad Salman, Ken Ferens i Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks". International Journal of Cognitive Informatics and Natural Intelligence 8, nr 3 (lipiec 2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.
Pełny tekst źródłaMoyo, Moses, i Marianne Loock. "Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa". Information 12, nr 3 (17.03.2021): 128. http://dx.doi.org/10.3390/info12030128.
Pełny tekst źródłaManderna, Ankit, Sushil Kumar, Upasana Dohare, Mohammad Aljaidi, Omprakash Kaiwartya i Jaime Lloret. "Vehicular Network Intrusion Detection Using a Cascaded Deep Learning Approach with Multi-Variant Metaheuristic". Sensors 23, nr 21 (27.10.2023): 8772. http://dx.doi.org/10.3390/s23218772.
Pełny tekst źródłaArroyo-Figueroa, Gustavo. "Artificial Intelligence the Strategic Key of Cybersecurity". International Journal of Combinatorial Optimization Problems and Informatics 14, nr 3 (31.12.2023): 16–23. http://dx.doi.org/10.61467/2007.1558.2023.v14i3.372.
Pełny tekst źródłaShobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim i M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services". International Journal of Software Engineering and Computer Systems 9, nr 1 (31.01.2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.
Pełny tekst źródłaVimala, K., i Dr D. Maruthanayagam. "Comparative Analysis of Routing Algorithms to Enhance the Quality of Service in MANET". International Journal of Recent Technology and Engineering (IJRTE) 11, nr 1 (30.05.2022): 108–15. http://dx.doi.org/10.35940/ijrte.a6949.0511122.
Pełny tekst źródłaNajib, Warsun, Selo Sulistyo i Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment". Communications in Science and Technology 9, nr 1 (16.07.2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.
Pełny tekst źródłaManikandan, Kayalvizhi, i Ramamoorthy Sriramulu. "Optimized Path Planning Strategy to Enhance Security under Swarm of Unmanned Aerial Vehicles". Drones 6, nr 11 (2.11.2022): 336. http://dx.doi.org/10.3390/drones6110336.
Pełny tekst źródłaZhang, Yunpeng, i Xin Liu. "An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network". International Journal of Software Engineering and Knowledge Engineering 30, nr 11n12 (listopad 2020): 1851–65. http://dx.doi.org/10.1142/s0218194020500400.
Pełny tekst źródła