Artigos de revistas sobre o tema "Canadian Security Intelligence Act (Proposed)"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Canadian Security Intelligence Act (Proposed)".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Salter, Mark B., e Geneviève Piché. "The Securitization of the US–Canada Border in American Political Discourse". Canadian Journal of Political Science 44, n.º 4 (dezembro de 2011): 929–51. http://dx.doi.org/10.1017/s0008423911000813.
Texto completo da fonteEDWARDS, J. LL J. "The Canadian Security Intelligence Act 1984—a Canadian appraisal". Oxford Journal of Legal Studies 5, n.º 1 (1985): 143–53. http://dx.doi.org/10.1093/ojls/5.1.143.
Texto completo da fonteGuilford, Katharine Briar. "Countering Foreign Terrorist Fighters: Warrantless Surveillance Powers of the New Zealand Security Intelligence Service". Victoria University of Wellington Law Review 47, n.º 1 (1 de junho de 2016): 95. http://dx.doi.org/10.26686/vuwlr.v47i1.4880.
Texto completo da fonteKumari, Rashmi, e Dr Priyanka Singh. "Weaponizing Artificial Intelligence". International Journal for Research in Applied Science and Engineering Technology 11, n.º 6 (30 de junho de 2023): 966–81. http://dx.doi.org/10.22214/ijraset.2023.53289.
Texto completo da fonteShchukina, Tatiana. "Canada's Digital Charter becomes law". Russia and America in the 21st Century, n.º 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Texto completo da fonteCarabash, Michael P. A. "Section 273.65 of the National Defence Act: Inappropriate and Unconstitutional". Constitutional Forum / Forum constitutionnel 15, n.º 1, 2 & 3 (24 de julho de 2011): 2006. http://dx.doi.org/10.21991/c9hq17.
Texto completo da fonteLaurin, Patrick. "Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service’s Handling of its Bulk Metadata Exploitation Program". Surveillance & Society 18, n.º 3 (19 de agosto de 2020): 370–86. http://dx.doi.org/10.24908/ss.v18i3.13428.
Texto completo da fonteMoraboena, Srikanthyadav, Gayatri Ketepalli e Padmaja Ragam. "A Deep Learning Approach to Network Intrusion Detection Using Deep Autoencoder". Revue d'Intelligence Artificielle 34, n.º 4 (30 de setembro de 2020): 457–63. http://dx.doi.org/10.18280/ria.340410.
Texto completo da fonteMonaghan, Jeffrey. "Security Traps and Discourses of Radicalization: Examining Surveillance Practices Targeting Muslims in Canada". Surveillance & Society 12, n.º 4 (19 de junho de 2014): 485–501. http://dx.doi.org/10.24908/ss.v12i4.4557.
Texto completo da fonteMeng, Mingming, e Yuancheng Li. "SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks". PeerJ Computer Science 8 (29 de junho de 2022): e1027. http://dx.doi.org/10.7717/peerj-cs.1027.
Texto completo da fonteNath, Seema, Subhranil Som e Mukesh Chandra Negi. "Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices". International Journal of Knowledge-based and Intelligent Engineering Systems 25, n.º 1 (9 de abril de 2021): 139–47. http://dx.doi.org/10.3233/kes-210059.
Texto completo da fonteDahake, Dr Rupali, e Dr Pallavi Mirajkar. "Integration Tool using Internet of Things in Smart Architecture of Passenger Processing at Airport Terminal". International Journal of Innovative Technology and Exploring Engineering 11, n.º 8 (30 de julho de 2022): 93–97. http://dx.doi.org/10.35940/ijitee.h9176.0711822.
Texto completo da fonteAlli, P., e J. Dinesh Peter. "A novel auto-encoder induced chaos based image encryption framework aiding DNA computing sequence". Journal of Intelligent & Fuzzy Systems 41, n.º 1 (11 de agosto de 2021): 181–98. http://dx.doi.org/10.3233/jifs-201224.
Texto completo da fonteCongdon, Jenna V., Mina Hosseini, Ezekiel F. Gading, Mahdi Masousi, Maria Franke e Suzanne E. MacDonald. "The Future of Artificial Intelligence in Monitoring Animal Identification, Health, and Behaviour". Animals 12, n.º 13 (1 de julho de 2022): 1711. http://dx.doi.org/10.3390/ani12131711.
Texto completo da fonteKreklewetz, Robert G., e Laura J. Burlock. "Policy Forum: Canada's Proposed Cryptoasset Legislation". Canadian Tax Journal/Revue fiscale canadienne 71, n.º 1 (abril de 2023): 73–81. http://dx.doi.org/10.32721/ctj.2023.71.1.pf.kreklewetz.
Texto completo da fontePohoretskyi, M. M. "HUMAN RIGHTS AND FREEDOMS IN ACTIVITY SECURITY SERVICES OF UKRAINE: ISSUES OF GUARANTEES". Herald of criminal justice, n.º 3-4 (2021): 100–111. http://dx.doi.org/10.17721/2413-5372.2021.3-4/100-111.
Texto completo da fonteKim, Sung-Hwan, Nam-Uk Kim e Tai-Myoung Chung. "Study on sensitive information leakage vulnerability modeling". Kybernetes 44, n.º 1 (12 de janeiro de 2015): 77–88. http://dx.doi.org/10.1108/k-05-2014-0106.
Texto completo da fonteKilcullen, Jack K. "Groping for the Reins: ERISA, HMO Malpractice, and Enterprise Liability". American Journal of Law & Medicine 22, n.º 1 (1996): 7–50. http://dx.doi.org/10.1017/s0098858800010285.
Texto completo da fonteHerbst, Jan, Matthias Rüb, Sogo Pierre Sanon, Christoph Lipps e Hans D. Schotten. "Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach". Network 4, n.º 2 (9 de abril de 2024): 133–49. http://dx.doi.org/10.3390/network4020007.
Texto completo da fonteKaiser, Stefan A. "Legal Challenges of Automated and Autonomous Systems". Volume 60 · 2017 60, n.º 1 (1 de janeiro de 2018): 173–201. http://dx.doi.org/10.3790/gyil.60.1.173.
Texto completo da fonteMalgwi, Yusuf Musa, Ibrahim Goni e Bamanga Mahmud Ahmad. "Artificial Neural Network Model for Intrusion Detection System". Mediterranean Journal of Basic and Applied Sciences 06, n.º 01 (2022): 20–26. http://dx.doi.org/10.46382/mjbas.2022.6103.
Texto completo da fonteChatziamanetoglou, Dimitrios, e Konstantinos Rantos. "Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus". Security and Communication Networks 2023 (13 de fevereiro de 2023): 1–20. http://dx.doi.org/10.1155/2023/3303122.
Texto completo da fonteMudaraddi, Kiran, Keerthi T, Likitha Yadav, M. Varsha e Nivedita M. "Weapon Detection System". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de maio de 2023): 3482–87. http://dx.doi.org/10.22214/ijraset.2023.52381.
Texto completo da fonteKrishna, R. Venkat, V. Vijayalakshmi e M. Vignesh Balaji. "A Robust Emotion Detection and Music Recommendation System using Mini Xception CNN". International Journal for Research in Applied Science and Engineering Technology 10, n.º 12 (31 de dezembro de 2022): 2158–63. http://dx.doi.org/10.22214/ijraset.2022.48387.
Texto completo da fonteGopinath, S., S. Pragadeswaran, P. Subaranjani, R. Mounitha e N. Parameshwari. "Ai Based Dual Authentication System". 4 2, n.º 4 (1 de dezembro de 2022): 158–62. http://dx.doi.org/10.46632/daai/2/4/29.
Texto completo da fonteSalonen, Jarno, e Alessandro Guarino. "Art Crime Does not pay: Multiplexed Social Network Analysis in Cultural Heritage Trafficking Forensics". International Conference on Cyber Warfare and Security 19, n.º 1 (21 de março de 2024): 617–20. http://dx.doi.org/10.34190/iccws.19.1.2066.
Texto completo da fonteLi, Yu, Daofang Chang, Yinping Gao, Ying Zou e Chunteng Bao. "Automated Container Terminal Production Operation and Optimization via an AdaBoost-Based Digital Twin Framework". Journal of Advanced Transportation 2021 (7 de setembro de 2021): 1–16. http://dx.doi.org/10.1155/2021/1936764.
Texto completo da fonteRajeswari, A. R., K. Kulothungan, Sannasi Ganapathy e Arputharaj Kannan. "Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT". Journal of Intelligent & Fuzzy Systems 40, n.º 5 (22 de abril de 2021): 9197–211. http://dx.doi.org/10.3233/jifs-201633.
Texto completo da fonteMuravskyi, Volodymyr. "The impact of global technological trends on accounting". Herald of Ternopil National Economic University, n.º 4 (86) (12 de dezembro de 2017): 138–48. http://dx.doi.org/10.35774/visnyk2017.04.138.
Texto completo da fonteRamasamy, Mathiyalagan, e Pamela Vinitha Eric. "A novel classification and clustering algorithms for intrusion detection system on convolutional neural network". Bulletin of Electrical Engineering and Informatics 11, n.º 5 (1 de outubro de 2022): 2845–55. http://dx.doi.org/10.11591/eei.v11i5.4145.
Texto completo da fonteRodríguez Marco, José Enrique, Manuel Sánchez Rubio, José Javier Martínez Herráiz, Rafael González Armengod e Juan Carlos Plaza Del Pino. "Contributions to Image Transmission in Icing Conditions on Unmanned Aerial Vehicles". Drones 7, n.º 9 (5 de setembro de 2023): 571. http://dx.doi.org/10.3390/drones7090571.
Texto completo da fonteChuang, Hsiu-Min, Fanpyn Liu e Chung-Hsien Tsai. "Early Detection of Abnormal Attacks in Software-Defined Networking Using Machine Learning Approaches". Symmetry 14, n.º 6 (8 de junho de 2022): 1178. http://dx.doi.org/10.3390/sym14061178.
Texto completo da fonteZavistovskyi, O. "Professional, service and service-combat activity of the National Police: essence and definition of concepts". Analytical and Comparative Jurisprudence, n.º 5 (30 de dezembro de 2022): 258–62. http://dx.doi.org/10.24144/2788-6018.2022.05.47.
Texto completo da fonteKalodanis, Konstantinos, Panagiotis Rizomiliotis e Dimosthenis Anagnostopoulos. "European Artificial Intelligence Act: an AI security approach". Information & Computer Security, 23 de novembro de 2023. http://dx.doi.org/10.1108/ics-10-2022-0165.
Texto completo da fonteWest, Leah. "‘Within or outside Canada’: The Charter’s application to the extraterritorial activities of the Canadian Security Intelligence Service". University of Toronto Law Journal, 5 de janeiro de 2022. http://dx.doi.org/10.3138/utlj-2021-0105.
Texto completo da fonteWest, Leah, e Craig Forcese. "Building Haystacks: Information Retention and Data Exploitation by the Canadian Security Intelligence Service". Alberta Law Review, 2 de outubro de 2019, 175. http://dx.doi.org/10.29173/alr2573.
Texto completo da fonteCefaliello, Aude, e Miriam Kullmann. "Offering false security: How the draft artificial intelligence act undermines fundamental workers rights". European Labour Law Journal, 20 de outubro de 2022, 203195252211144. http://dx.doi.org/10.1177/20319525221114474.
Texto completo da fonteAlthar, Raghavendra Rao, Debabrata Samanta, Sathvik Purushotham, Sandeep Singh Sengar e Chaminda Hewage. "Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System". SN Computer Science 4, n.º 4 (15 de abril de 2023). http://dx.doi.org/10.1007/s42979-023-01785-2.
Texto completo da fonteForcese, Craig, e Kent Roach. "Bill C-51 Backgrounder #2: The Canadian Security Intelligence Service's Proposed Power to 'Reduce' Security Threats Through Conduct that May Violate the Law and Charter". SSRN Electronic Journal, 2015. http://dx.doi.org/10.2139/ssrn.2564272.
Texto completo da fonteReyes, Luis, Diana Almeida e Ana Flores. "Information Technologies for Occupational Health and Safety". Athenea, 1 de junho de 2022, 32–41. http://dx.doi.org/10.47460/10.47460/athenea.v3i8.40.
Texto completo da fonteVenkatesh Kumar, M., e C. Lakshmi. "A privacy preservation data collection and access control using entropy-based conic curve". Journal of Intelligent & Fuzzy Systems, 2 de fevereiro de 2023, 1–14. http://dx.doi.org/10.3233/jifs-223141.
Texto completo da fonteKouroupis, Konstantinos. "The AI Act in light of the EU Digital Agenda: A critical approach". Journal of Data Protection & Privacy, 1 de janeiro de 2023. http://dx.doi.org/10.69554/fquz5239.
Texto completo da fonteAbdullah, Sura Mahmood, e Mustafa Musa Jaber. "Deep learning for content-based image retrieval in FHE algorithms". Journal of Intelligent Systems 32, n.º 1 (1 de janeiro de 2023). http://dx.doi.org/10.1515/jisys-2022-0222.
Texto completo da fonteDubiniecki, Abigail. "The directive on security of networks and information systems (NISD): One more critical step towards a ‘connected digital single market’ for the EU". Journal of Data Protection & Privacy, 1 de julho de 2018. http://dx.doi.org/10.69554/kdhf3147.
Texto completo da fonteAlsubai, Shtwai, Ashit Kumar Dutta, Abdul Rahaman Wahab Sait, Yasser Adnan Abu Jaish, Bader Hussain Alamer, Hussam Eldin Hussein Saad e Rashid Ayub. "Enhanced slime mould optimization with convolutional BLSTM autoencoder based malware classification in intelligent systems". Expert Systems, 4 de fevereiro de 2024. http://dx.doi.org/10.1111/exsy.13557.
Texto completo da fonteK. Pazhanivel, S. Sakthi, R. Shilpa e E. Mounika. "AI Based Self Learning Intelligent Information Leak Protection System for TI Companies using LSTM". International Journal of Advanced Research in Science, Communication and Technology, 10 de junho de 2022, 268–72. http://dx.doi.org/10.48175/ijarsct-4595.
Texto completo da fonteCleary, Frances, David C. Henshall e Sasitharan Balasubramaniam. "On-Body Edge Computing Through E-Textile Programmable Logic Array". Frontiers in Communications and Networks 2 (11 de junho de 2021). http://dx.doi.org/10.3389/frcmn.2021.688419.
Texto completo da fonteFowles, Jib. "Television Violence and You". M/C Journal 3, n.º 1 (1 de março de 2000). http://dx.doi.org/10.5204/mcj.1828.
Texto completo da fonteRose, Megan Catherine. "The Future Is Furby". M/C Journal 26, n.º 2 (25 de abril de 2023). http://dx.doi.org/10.5204/mcj.2955.
Texto completo da fonteFranks, Rachel. "Building a Professional Profile: Charles Dickens and the Rise of the “Detective Force”". M/C Journal 20, n.º 2 (26 de abril de 2017). http://dx.doi.org/10.5204/mcj.1214.
Texto completo da fonte