Artigos de revistas sobre o tema "Internet des objets – Protection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Internet des objets – Protection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Haza, Marion. "Objets culturels dystopiques et adolescence". Topique 160, n.º 1 (1 de janeiro de 2024): 97–110. http://dx.doi.org/10.3917/top.160.0097.
Texto completo da fonteMeiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, n.º 4 (19 de março de 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Texto completo da fonteWANG, Haixiang, Jingyi CAO e Zhe LIU. "Energy Internet and Its Trusted Protection Architecture". Wuhan University Journal of Natural Sciences 27, n.º 2 (abril de 2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.
Texto completo da fonteSamahalska, Y. "Personal data protection in the Internet". Uzhhorod National University Herald. Series: Law 2, n.º 82 (10 de junho de 2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.
Texto completo da fonteLogvynenko, M. I., I. V. Karikh e A. V. Dykovets. "Problems of protection of copyright objects in the network Internet". Legal Horizons 15, n.º 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p21.
Texto completo da fonteLogvynenko, M. I., I. V. Karikh e A. V. Dykovets. "Problems of protection of copyright objects in the network Internet". Legal Horizons 15, n.º 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p:21.
Texto completo da fonteMoskalenko, I. A. "Registration of works as a tool to protect copyright in cross-border relations (Internet)". Actual Problems of Russian Law, n.º 3 (4 de maio de 2019): 142–50. http://dx.doi.org/10.17803/1994-1471.2019.100.3.142-150.
Texto completo da fonteKurniawan Sihombing, Agung, Rika Ratna Permata e Tasya Safiranita Ramli. "Comparison of Digital Copyright Protection on Over the Top (OTT) Streaming Content Media in Indonesia and the United States". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, n.º 2 (2021): 183–212. http://dx.doi.org/10.22304/pjih.v8n2.a2.
Texto completo da fonteIdrisov, Hussein V. "Certain issues of legal regulation of the placement of intellectual property objects on the Internet: problematic aspects and search for solutions". Current Issues of the State and Law, n.º 4 (2022): 556–66. http://dx.doi.org/10.20310/2587-9340-2022-6-4-556-566.
Texto completo da fonteEt. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 11 (10 de maio de 2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.
Texto completo da fonteUtama, Andrew Shandy, Sandra Dewi e Bagio Kadaryanto. "PERLINDUNGAN HUKUM TERHADAP PELANGGARAN HAK CIPTA MELALUI MEDIA INTERNET BERDASARKAN UNDANG-UNDANG NOMOR 28 TAHUN 2014 TENTANG HAK CIPTA". Jurnal Ilmu Hukum 7, n.º 2 (5 de agosto de 2018): 209. http://dx.doi.org/10.30652/jih.v7i2.5652.
Texto completo da fonteFilinovych, Valeriia. "VIOLATION OF COPYRIGHT AND RELATED RIGHTS ON THE INTERNET: HOW TO PROTECT YOURSELF AND YOUR CREATION". Scientific works of National Aviation University. Series: Law Journal "Air and Space Law" 4, n.º 61 (30 de dezembro de 2021): 144–50. http://dx.doi.org/10.18372/2307-9061.61.16362.
Texto completo da fonteSidi Ahmed, Sidi Mohamed, e Sonny Zulhuda. "DATA PROTECTION CHALLENGES IN THE INTERNET OF THINGS ERA: AN ASSESSMENT OF PROTECTION OFFERED BY PDPA 2010". International Journal of Law, Government and Communication 4, n.º 17 (15 de dezembro de 2019): 01–12. http://dx.doi.org/10.35631/ijlgc.417001.
Texto completo da fonteKharchenko, Olesia, Olha Kronda, Inha Kryvosheyina e Kostiantyn Zerov. "Protection of intellectual property rights on the Internet: new challenges". Revista Amazonia Investiga 10, n.º 41 (29 de junho de 2021): 224–36. http://dx.doi.org/10.34069/ai/2021.41.05.22.
Texto completo da fonteE.B. Arzymatova. "PROBLEMS OF COPYRIGHT VIOLATIONS ON INTERNET". Herald of KSUCTA n a N Isanov, n.º 4 (16 de dezembro de 2019): 614–17. http://dx.doi.org/10.35803/1694-5298.2019.4.614-617.
Texto completo da fonteSpasova, Ekaterina, Olha Kulinich, Svitlana Mazurenko, Andrii Ivanytskyi e Olesia Izbash. "Peculiarities of protection of personal non-property intellectual rights on the internet". Cuestiones Políticas 41, n.º 78 (28 de agosto de 2023): 628–48. http://dx.doi.org/10.46398/cuestpol.4178.43.
Texto completo da fonteTeleshev, S. "Peculiarities of civil law protection of honor, dignity and business reputation on the internet as objects of the right of an individual to information regarding himself". Uzhhorod National University Herald. Series: Law 1, n.º 78 (28 de agosto de 2023): 239–50. http://dx.doi.org/10.24144/2307-3322.2023.78.1.39.
Texto completo da fonteXu, De Gang, Lei Hua Qin e Jing Li Zhou. "Internet of Things: Security-Based Application Level Lookup Protocol". Applied Mechanics and Materials 411-414 (setembro de 2013): 625–28. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.625.
Texto completo da fonteVasiljević, Ivana, Ratko Obradović, Isidora Đurić, Branislav Popkonstantinović, Igor Budak, Luka Kulić e Zoran Milojević. "Copyright Protection of 3D Digitized Artistic Sculptures by Adding Unique Local Inconspicuous Errors by Sculptors". Applied Sciences 11, n.º 16 (14 de agosto de 2021): 7481. http://dx.doi.org/10.3390/app11167481.
Texto completo da fonteKivalov, Serhii. "Human Rights on the Internet under quarantine (on the example of E-Commerce): problematic aspects". Dixi 25, n.º 1 (1 de dezembro de 2022): 1–21. http://dx.doi.org/10.16925/2357-5891.2023.01.07.
Texto completo da fonteLin, Qingxin, Kuai Xu, Yikun Huang, Feng Yu e Xiaoding Wang. "Privacy-Enhanced Data Fusion for Federated Learning Empowered Internet of Things". Mobile Information Systems 2022 (3 de outubro de 2022): 1–8. http://dx.doi.org/10.1155/2022/3850246.
Texto completo da fonteNatalia V., Buzova, e Karelina Marina M. "Some Issues of Judicial Protection of Intellectual Rights with Internet-Technologies". Rossijskoe pravosudie, n.º 5 (25 de abril de 2022): 50–59. http://dx.doi.org/10.37399/issn2072-909x.2022.5.50-59.
Texto completo da fonteWong, Kok-Seng, e Myung Ho Kim. "Towards Self-Awareness Privacy Protection for Internet of Things Data Collection". Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/827959.
Texto completo da fonteLong, Rong, Xiaohui Fan, Kai Wei, Junxuan Bai e Shanpeng Xiao. "Internet-of-Things object model". Digital Twin 2 (12 de abril de 2022): 5. http://dx.doi.org/10.12688/digitaltwin.17562.1.
Texto completo da fonteSun, Lei, Hong Mei Xing e Shu Yan Zhang. "The Present Botnet Protection Situation of the Data Center". Advanced Materials Research 1044-1045 (outubro de 2014): 1411–13. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1411.
Texto completo da fonteKovalenko, I. "Some types of works posted on the internet, and the peculiarities of their protection by Ukrainian copyright compared to US law". Uzhhorod National University Herald. Series: Law, n.º 70 (18 de junho de 2022): 181–85. http://dx.doi.org/10.24144/2307-3322.2022.70.26.
Texto completo da fonteUlitina, Olha. "Features of copyright protection of some specific works of contemporary art". Theory and Practice of Intellectual Property, n.º 5 (11 de junho de 2021): 36–42. http://dx.doi.org/10.33731/52020.233731.
Texto completo da fonteArora, Yojna, Aarti Chugh e Charu Jain. "An Application Module of IOT for Environment Protection". ECS Transactions 107, n.º 1 (24 de abril de 2022): 5263–70. http://dx.doi.org/10.1149/10701.5263ecst.
Texto completo da fonteSalsabila, Adhek Inarania. "Legal Protection For Victims Of Crime Of Hacking". LIGAHUKUM 1, n.º 2 (31 de janeiro de 2021): 148–57. http://dx.doi.org/10.33005/ligahukum.v1i2.26.
Texto completo da fonteYuldashov, Abdumumin. "LEGAL NORMS ON THE PROTECTION OF COPYRIGHT AND RELATED RIGHTS IN THE DIGITAL ENVIRONMENT IN THE LEGISLATION OF UZBEKISTAN AND INTERNATIONAL TREATIES". Jurisprudence 3, n.º 2 (29 de abril de 2023): 47–54. http://dx.doi.org/10.51788/tsul.jurisprudence.3.2./qfxg5673.
Texto completo da fonteKoos, Stefan. "THE INDIVIDUAL AND THE PROPERTY IN VIRTUAL WORLDS". Veritas et Justitia 8, n.º 2 (26 de dezembro de 2022): 267–86. http://dx.doi.org/10.25123/vej.v8i2.5627.
Texto completo da fonteNan, Gong. "Protection of personal data in China: Legislation in the digital age". Vestnik of Saint Petersburg University. Law 14, n.º 1 (2023): 159–72. http://dx.doi.org/10.21638/spbu14.2023.110.
Texto completo da fonteTan, Hua Shan, e Yang Yang. "A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption". Advanced Materials Research 756-759 (setembro de 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.
Texto completo da fonteLiu, Huan, e Yanling Wang. "Social Media Use and Privacy Concerns: How do College Students view Internet Privacy and Information Protection". European Journal of Humanities and Social Sciences 3, n.º 2 (10 de abril de 2023): 93–102. http://dx.doi.org/10.24018/ejsocial.2023.3.2.429.
Texto completo da fonteDudykevych, V., H. Mykytyn, L. Bortnik e T. Stosyk. "SECURITY METHODOLOGY OF CYBER-PHYSICAL SYSTEMS AND THE INTERNET OF THINGS IN INTELLECTUALIZATION OF INFRASTRUCTURE OBJECTS". Computer systems and network 6, n.º 1 (junho de 2024): 44–53. http://dx.doi.org/10.23939/csn2024.01.044.
Texto completo da fonteLisitsa, Valeriy. "Intellectual property statute in Private International Law". Gosudarstvo i pravo, n.º 7 (2023): 139. http://dx.doi.org/10.31857/s102694520026811-3.
Texto completo da fonteBAKAI, Yuliia, e Yuliia HUDZENKO. "Copyright in private international law: protection, objects, types". Economics. Finances. Law 10/1, n.º - (28 de outubro de 2022): 18–21. http://dx.doi.org/10.37634/efp.2022.10(1).4.
Texto completo da fonteShi, Mengyi. "ANALYSIS OF THE APPLICATION OF NON-COMPETE FOR INTERNET MARKETERS". Socio Economy and Policy Studies 3, n.º 2 (13 de junho de 2023): 77–79. http://dx.doi.org/10.26480/seps.02.2023.77.79.
Texto completo da fonteVeeraiah, Duggineni, Rajanikanta Mohanty, Shakti Kundu, Dharmesh Dhabliya, Mohit Tiwari, Sajjad Shaukat Jamal e Awal Halifa. "Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques". Computational Intelligence and Neuroscience 2022 (5 de setembro de 2022): 1–9. http://dx.doi.org/10.1155/2022/4003403.
Texto completo da fonteSehnálek, David. "Sharenting and Children’s Privacy Protection in International, EU, and Czech Law". Central European Journal of Comparative Law 4, n.º 1 (14 de junho de 2023): 111–32. http://dx.doi.org/10.47078/2023.1.111-132.
Texto completo da fonteJafary, Peyman, Antti Supponen e Sami Repo. "Network Architecture for IEC61850-90-5 Communication: Case Study of Evaluating R-GOOSE over 5G for Communication-Based Protection". Energies 15, n.º 11 (25 de maio de 2022): 3915. http://dx.doi.org/10.3390/en15113915.
Texto completo da fonteBindu, Gottumukkala Hima, Chinta Anuradha e Patnala S. R. Chandra Murthy. "A Survey on Multimedia Content Protection Mechanisms". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 6 (1 de dezembro de 2018): 4204. http://dx.doi.org/10.11591/ijece.v8i6.pp4204-4211.
Texto completo da fonteAbdulghani, Hezam Akram, Niels Alexander Nijdam, Anastasija Collen e Dimitri Konstantas. "A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective". Symmetry 11, n.º 6 (10 de junho de 2019): 774. http://dx.doi.org/10.3390/sym11060774.
Texto completo da fonteAl-Hakeem, Mazin S., Wasan A. Al-Hamami e Alaa H. Al-Hamami. "Developing Smart City security through Upgrade Internet of Things Layers security". Journal Port Science Research 6, special (28 de janeiro de 2024): 39–44. http://dx.doi.org/10.36371/port.2023.special.6.
Texto completo da fonteXiaolin Guo. "Intelligent Internet of Things and Privacy Protection Technology for IPE Data Analysis". Journal of Electrical Systems 20, n.º 7s (4 de maio de 2024): 75–83. http://dx.doi.org/10.52783/jes.3250.
Texto completo da fonteMudrytska, Kateryna. "SPECIFICITY OF PROOF IN CASES OF INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS ON SITES ON THE INTERNET". ScienceRise, n.º 5 (11 de novembro de 2020): 103–10. http://dx.doi.org/10.21303/2313-8416.2020.001494.
Texto completo da fonteKoppula, Sumanth, e Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 3 (1 de junho de 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.9420.
Texto completo da fonteKoppula, Sumanth, e Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 3 (1 de junho de 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.pp1002-1010.
Texto completo da fonteTzafestas, Spyros. "Ethics and Law in the Internet of Things World". Smart Cities 1, n.º 1 (12 de outubro de 2018): 98–120. http://dx.doi.org/10.3390/smartcities1010006.
Texto completo da fonteZulham. "A Critical Review of Consumer Protection Online Shopping, False Advertising, and Legal Protection". Journal of Law and Sustainable Development 11, n.º 5 (28 de agosto de 2023): e740. http://dx.doi.org/10.55908/sdgs.v11i5.740.
Texto completo da fonte