Artykuły w czasopismach na temat „SECURITY DOMAIN ENFORCEMENT”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „SECURITY DOMAIN ENFORCEMENT”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Camp, L. Jean. "Reconceptualizing the Role of Security User". Daedalus 140, nr 4 (październik 2011): 93–107. http://dx.doi.org/10.1162/daed_a_00117.
Pełny tekst źródłavan Hoof, Joost, Jeroen Dikken, Willeke H. van Staalduinen, Suzan van der Pas, Rudy F. M. van den Hoven i Loes M. T. Hulsebosch-Janssen. "Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague". International Journal of Environmental Research and Public Health 19, nr 7 (26.03.2022): 3960. http://dx.doi.org/10.3390/ijerph19073960.
Pełny tekst źródłaGrubač, Momčilo. "Enforcement of judgments according to European legal standards". Glasnik Advokatske komore Vojvodine 75, nr 9-10 (2003): 18–33. http://dx.doi.org/10.5937/gakv0302018g.
Pełny tekst źródłavan Hardeveld, Gert Jan, Craig Webber i Kieron O’Hara. "Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets". American Behavioral Scientist 61, nr 11 (październik 2017): 1244–66. http://dx.doi.org/10.1177/0002764217734271.
Pełny tekst źródłaWang, Yufei, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa i Fei Fang. "Deep Reinforcement Learning for Green Security Games with Real-Time Information". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17.07.2019): 1401–8. http://dx.doi.org/10.1609/aaai.v33i01.33011401.
Pełny tekst źródłaYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang i Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics". Sensors 23, nr 7 (29.03.2023): 3566. http://dx.doi.org/10.3390/s23073566.
Pełny tekst źródłaCsaba, Zágon, i Zsolt Lippai. "The Borderline between Private and Public Security". Academic and Applied Research in Military and Public Management Science 20, nr 3 (26.05.2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.
Pełny tekst źródłaMatheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva i Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES". International Journal of Advanced Research 10, nr 11 (30.11.2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.
Pełny tekst źródłaKashmar, Nadine, Mehdi Adda i Hussein Ibrahim. "HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities". Journal of Cybersecurity and Privacy 2, nr 1 (14.02.2022): 42–64. http://dx.doi.org/10.3390/jcp2010004.
Pełny tekst źródłaLysychkina, �., O. Lysychkina i Ye Protsenko. "NATO SPECIAL TERMINOLOGY IN THE CONTEXT OF MILITARY TERMINOLOGICAL ACTIVITIES WITHIN THE LINGUISTIC SUPPORT". Scientific journal of the National Academy of National Guard "Honor and Law" 2, nr 81 (2022): 99–102. http://dx.doi.org/10.33405/2078-7480/2022/2/81/263803.
Pełny tekst źródłaGradoń, Kacper. "Countering lone-actor terrorism: specification of requirements for potential interventions". Studia Iuridica 72 (17.04.2018): 121–47. http://dx.doi.org/10.5604/01.3001.0011.7591.
Pełny tekst źródłaJain, Anil K., i Arun Ross. "Bridging the gap: from biometrics to forensics". Philosophical Transactions of the Royal Society B: Biological Sciences 370, nr 1674 (5.08.2015): 20140254. http://dx.doi.org/10.1098/rstb.2014.0254.
Pełny tekst źródłaCAN, Özgü, i Murat ÜNALIR. "Ontology Based Access Control: A Case Study through Ontology Based Data Access". Deu Muhendislik Fakultesi Fen ve Muhendislik 25, nr 74 (15.05.2023): 417–32. http://dx.doi.org/10.21205/deufmd.2023257413.
Pełny tekst źródłaStanković, Vladan, i Ana Opačić. "Brussels I regulation: Recognition and enforcement of foreign court decisions in civil and commercial matters". International Review, nr 3-4 (2022): 168–74. http://dx.doi.org/10.5937/intrev2204176s.
Pełny tekst źródłaDai, Xili, Cheng Yang, Bin Liu, Haigang Gong i Xiaojun Yuan. "An Easy Way to Deploy the Re-ID System on Intelligent City: Cross-Domain Few-Shot Person Reidentification". Mobile Information Systems 2022 (15.06.2022): 1–12. http://dx.doi.org/10.1155/2022/4522578.
Pełny tekst źródłaHorváth, Attila. "Possible Applications of High Altitude Platform Systems for the Security of South America and South Europe". Academic and Applied Research in Military and Public Management Science 20, Special Edition (2021): 79–94. http://dx.doi.org/10.32565/aarms.2021.2.ksz.6.
Pełny tekst źródłaTsyhanov, Oleh, Igor Chumachenko, Iryna Panova i Mykola Golub. "Public Policy in the Sphere of Activity of the Ministry of Internal Affairs of Ukraine: Approaches to Determining the Essence and Content". Revista Amazonia Investiga 9, nr 28 (21.04.2020): 159–65. http://dx.doi.org/10.34069/ai/2020.28.04.19.
Pełny tekst źródłaRiahla, Mohamed Amine, Sihem Goumiri, Karim Tamine i M'hamed Hamadouche. "A New Cooperation Model for Dynamic Networks". International Journal of Business Data Communications and Networking 17, nr 2 (lipiec 2021): 1–15. http://dx.doi.org/10.4018/ijbdcn.286704.
Pełny tekst źródłaLamsal, Hiranya Lal. "Effectiveness Of Military Diplomacy Towards Nationalism, National Security and Unity". Unity Journal 3, nr 01 (6.03.2022): 82–96. http://dx.doi.org/10.3126/unityj.v3i01.43317.
Pełny tekst źródłaEgorov, Gennady. "Legal Forms of Ensuring Information Security on the Internet". Legal Concept, nr 4 (grudzień 2022): 70–76. http://dx.doi.org/10.15688/lc.jvolsu.2022.4.9.
Pełny tekst źródłaS, Vasudha, Neelamma K. Patil i Dr Lokesh R. Boregowda. "Performance Improvement of Face Recognition System using Selective Local Feature Vectors". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, nr 2 (10.08.2013): 1330–38. http://dx.doi.org/10.24297/ijct.v10i2.3299.
Pełny tekst źródłaMalik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh i Mohammad A. Alqarni. "From Conventional to State-of-the-Art IoT Access Control Models". Electronics 9, nr 10 (15.10.2020): 1693. http://dx.doi.org/10.3390/electronics9101693.
Pełny tekst źródłaLoncar-Turukalo, Tatjana, Eftim Zdravevski, José Machado da Silva, Ioanna Chouvarda i Vladimir Trajkovik. "Literature on Wearable Technology for Connected Health: Scoping Review of Research Trends, Advances, and Barriers". Journal of Medical Internet Research 21, nr 9 (5.09.2019): e14017. http://dx.doi.org/10.2196/14017.
Pełny tekst źródłaRAJ, RISHI, T. K. DAS, RAMANJIT KAUR, RAJ SINGH i KAPILA SHEKHAWAT. "Invasive noxious weed management research in India with special reference to Cyperus rotundus, Eichhornia crassipes and Lantana camara". Indian Journal of Agricultural Sciences 88, nr 2 (27.04.2018): 181–96. http://dx.doi.org/10.56093/ijas.v88i2.79160.
Pełny tekst źródłaKashmar, Nadine, Mehdi Adda, Hussein Ibrahim, Jean-François Morin i Tony Ducheman. "Instantiation and Implementation of HEAD Metamodel in an Industrial Environment: Non-IoT and IoT Case Studies". Electronics 12, nr 15 (25.07.2023): 3216. http://dx.doi.org/10.3390/electronics12153216.
Pełny tekst źródłaSanchez, Gabriella. "Critical Perspectives on Clandestine Migration Facilitation: An Overview of Migrant Smuggling Research". Journal on Migration and Human Security 5, nr 1 (marzec 2017): 9–27. http://dx.doi.org/10.1177/233150241700500102.
Pełny tekst źródłaTsai, Jason, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld i Milind Tambe. "Urban Security: Game-Theoretic Resource Allocation in Networked Domains". Proceedings of the AAAI Conference on Artificial Intelligence 24, nr 1 (4.07.2010): 881–86. http://dx.doi.org/10.1609/aaai.v24i1.7612.
Pełny tekst źródłaIstván, Zsolt, Soujanya Ponnapalli i Vijay Chidambaram. "Software-defined data protection". Proceedings of the VLDB Endowment 14, nr 7 (marzec 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Pełny tekst źródłaNaja, Rola, Nadia Mouawad i Ali J. Ghandour. "Spatio-temporal optimal law enforcement using Stackelberg games." Lebanese Science Journal 18, nr 2 (27.12.2017): 244–54. http://dx.doi.org/10.22453/lsj-018.2.244-254.
Pełny tekst źródłaWeiss, Moritz, i Simon Dalferth. "Security Re-Divided: The Distinctiveness of Policy-Making in ESDP and JHA". Cooperation and Conflict 44, nr 3 (20.08.2009): 268–87. http://dx.doi.org/10.1177/0010836709106216.
Pełny tekst źródłaAwad, Mamoun, Latifur Khan i Bhavani Thuraisingham. "Policy Enforcement System for Inter-Organizational Data Sharing". International Journal of Information Security and Privacy 4, nr 3 (lipiec 2010): 22–39. http://dx.doi.org/10.4018/jisp.2010070102.
Pełny tekst źródłaPerko, Igor, i Peter Ototsky. "Big Data for Business Ecosystem Players". Naše gospodarstvo/Our economy 62, nr 2 (1.06.2016): 12–24. http://dx.doi.org/10.1515/ngoe-2016-0008.
Pełny tekst źródłaBerlato, Stefano, Roberto Carbone, Adam J. Lee i Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud". ACM Transactions on Privacy and Security 25, nr 1 (28.02.2022): 1–37. http://dx.doi.org/10.1145/3474056.
Pełny tekst źródłaRublovskis, Raimonds. "RE-THINKING OF NATIONAL SECURITY IN THE AGE OF PANDEMICS". Baltic Journal of Legal and Social Sciences, nr 2 (4.04.2022): 15–25. http://dx.doi.org/10.30525/2592-8813-2021-2-2.
Pełny tekst źródłaSamimian-Darash, Limor, i Meg Stalcup. "Anthropology of security and security in anthropology: Cases of counterterrorism in the United States". Anthropological Theory 17, nr 1 (7.11.2016): 60–87. http://dx.doi.org/10.1177/1463499616678096.
Pełny tekst źródłaApostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras i Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions". Open Research Europe 1 (21.01.2022): 87. http://dx.doi.org/10.12688/openreseurope.13715.2.
Pełny tekst źródłaKasum, Josip, Marko Pilić, Nebojša Jovanović i Harrison Pienaar. "Model of Forensic Hydrography". Transactions on Maritime Science 8, nr 2 (21.10.2019): 246–52. http://dx.doi.org/10.7225/toms.v08.n02.010.
Pełny tekst źródłaSchwab, Abraham P., Hung S. Luu, Jason Wang i Jason Y. Park. "Genomic Privacy". Clinical Chemistry 64, nr 12 (1.12.2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Pełny tekst źródłaKampas, Giorgos, Aggelos Vasileiou, Marios Antonakakis, Michalis Zervakis, Emmanouil Spanakis, Vangelis Sakkalis, Peter Leškovský i in. "Design of Sensors’ Technical Specifications for Airborne Surveillance at Borders". Journal of Defence & Security Technologies 5, nr 1 (2022): 58–83. http://dx.doi.org/10.46713/jdst.005.04.
Pełny tekst źródłaCurl, Cynthia L., Lisa Meierotto i Rebecca L. Som Castellano. "Understanding Challenges to Well-Being among Latina FarmWorkers in Rural Idaho Using in an Interdisciplinary, Mixed-Methods Approach". International Journal of Environmental Research and Public Health 18, nr 1 (29.12.2020): 169. http://dx.doi.org/10.3390/ijerph18010169.
Pełny tekst źródłaDiamantopoulou, Vasiliki, i Haralambos Mouratidis. "Practical evaluation of a reference architecture for the management of privacy level agreements". Information & Computer Security 27, nr 5 (11.11.2019): 711–30. http://dx.doi.org/10.1108/ics-04-2019-0052.
Pełny tekst źródłaYadav, Priya R. "Review Paper on Introduction to Cyber Forensics". International Journal for Research in Applied Science and Engineering Technology 9, nr 8 (31.08.2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.
Pełny tekst źródłaApostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras i Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions". Open Research Europe 1 (30.07.2021): 87. http://dx.doi.org/10.12688/openreseurope.13715.1.
Pełny tekst źródłaDahlberg, Rasmus, Tobias Pulls, Tom Ritter i Paul Syverson. "Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor". Proceedings on Privacy Enhancing Technologies 2021, nr 2 (29.01.2021): 194–213. http://dx.doi.org/10.2478/popets-2021-0024.
Pełny tekst źródłaLajaunie, Claire, Burkhard Schafer i Pierre Mazzega. "Big Data Enters Environmental Law". Transnational Environmental Law 8, nr 3 (31.10.2019): 523–45. http://dx.doi.org/10.1017/s2047102519000335.
Pełny tekst źródłaBROŽIČ, LILIANA. "CONTEMPORARY MILITARY CHALLENGES IN ENGLISH – A PROBLEM OR AN OPPORTUNITY". CONTEMPORARY MILITARY CHALLENGES 2011, nr 13/4 (15.10.2011): 11–14. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.13.4.00.
Pełny tekst źródłaStaller, Mario S., i Swen Körner. "Regression, Progression and Renewal: The Continuous Redevelopment of Expertise in Police Use of Force Coaching". European Journal for Security Research, 16.10.2020. http://dx.doi.org/10.1007/s41125-020-00069-7.
Pełny tekst źródłaFigini, Silvia. "MACHINE LEARNING PER CARATTERIZZARE GLI ATTACCHI TERRORISTICI". Istituto Lombardo - Accademia di Scienze e Lettere - Rendiconti di Lettere, 15.07.2020. http://dx.doi.org/10.4081/let.2018.680.
Pełny tekst źródła"Enforcement of Women's Rights through Education". International Journal of Recent Technology and Engineering 8, nr 4 (30.11.2019): 5397–402. http://dx.doi.org/10.35940/ijrte.d7619.118419.
Pełny tekst źródła"A Prototype Design for a Framework to Analyse the Traffic Flow in Darknet". International Journal of Innovative Technology and Exploring Engineering 8, nr 6S4 (26.07.2019): 1449–52. http://dx.doi.org/10.35940/ijitee.f1295.0486s419.
Pełny tekst źródła