Статті в журналах з теми "SECURITY DOMAIN ENFORCEMENT"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "SECURITY DOMAIN ENFORCEMENT".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Camp, L. Jean. "Reconceptualizing the Role of Security User." Daedalus 140, no. 4 (October 2011): 93–107. http://dx.doi.org/10.1162/daed_a_00117.
Повний текст джерелаvan Hoof, Joost, Jeroen Dikken, Willeke H. van Staalduinen, Suzan van der Pas, Rudy F. M. van den Hoven, and Loes M. T. Hulsebosch-Janssen. "Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague." International Journal of Environmental Research and Public Health 19, no. 7 (March 26, 2022): 3960. http://dx.doi.org/10.3390/ijerph19073960.
Повний текст джерелаGrubač, Momčilo. "Enforcement of judgments according to European legal standards." Glasnik Advokatske komore Vojvodine 75, no. 9-10 (2003): 18–33. http://dx.doi.org/10.5937/gakv0302018g.
Повний текст джерелаvan Hardeveld, Gert Jan, Craig Webber, and Kieron O’Hara. "Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets." American Behavioral Scientist 61, no. 11 (October 2017): 1244–66. http://dx.doi.org/10.1177/0002764217734271.
Повний текст джерелаWang, Yufei, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, and Fei Fang. "Deep Reinforcement Learning for Green Security Games with Real-Time Information." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1401–8. http://dx.doi.org/10.1609/aaai.v33i01.33011401.
Повний текст джерелаYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors 23, no. 7 (March 29, 2023): 3566. http://dx.doi.org/10.3390/s23073566.
Повний текст джерелаCsaba, Zágon, and Zsolt Lippai. "The Borderline between Private and Public Security." Academic and Applied Research in Military and Public Management Science 20, no. 3 (May 26, 2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.
Повний текст джерелаMatheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva, and Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES." International Journal of Advanced Research 10, no. 11 (November 30, 2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.
Повний текст джерелаKashmar, Nadine, Mehdi Adda, and Hussein Ibrahim. "HEAD Access Control Metamodel: Distinct Design, Advanced Features, and New Opportunities." Journal of Cybersecurity and Privacy 2, no. 1 (February 14, 2022): 42–64. http://dx.doi.org/10.3390/jcp2010004.
Повний текст джерелаLysychkina, �., O. Lysychkina, and Ye Protsenko. "NATO SPECIAL TERMINOLOGY IN THE CONTEXT OF MILITARY TERMINOLOGICAL ACTIVITIES WITHIN THE LINGUISTIC SUPPORT." Scientific journal of the National Academy of National Guard "Honor and Law" 2, no. 81 (2022): 99–102. http://dx.doi.org/10.33405/2078-7480/2022/2/81/263803.
Повний текст джерелаGradoń, Kacper. "Countering lone-actor terrorism: specification of requirements for potential interventions." Studia Iuridica 72 (April 17, 2018): 121–47. http://dx.doi.org/10.5604/01.3001.0011.7591.
Повний текст джерелаJain, Anil K., and Arun Ross. "Bridging the gap: from biometrics to forensics." Philosophical Transactions of the Royal Society B: Biological Sciences 370, no. 1674 (August 5, 2015): 20140254. http://dx.doi.org/10.1098/rstb.2014.0254.
Повний текст джерелаCAN, Özgü, and Murat ÜNALIR. "Ontology Based Access Control: A Case Study through Ontology Based Data Access." Deu Muhendislik Fakultesi Fen ve Muhendislik 25, no. 74 (May 15, 2023): 417–32. http://dx.doi.org/10.21205/deufmd.2023257413.
Повний текст джерелаStanković, Vladan, and Ana Opačić. "Brussels I regulation: Recognition and enforcement of foreign court decisions in civil and commercial matters." International Review, no. 3-4 (2022): 168–74. http://dx.doi.org/10.5937/intrev2204176s.
Повний текст джерелаDai, Xili, Cheng Yang, Bin Liu, Haigang Gong, and Xiaojun Yuan. "An Easy Way to Deploy the Re-ID System on Intelligent City: Cross-Domain Few-Shot Person Reidentification." Mobile Information Systems 2022 (June 15, 2022): 1–12. http://dx.doi.org/10.1155/2022/4522578.
Повний текст джерелаHorváth, Attila. "Possible Applications of High Altitude Platform Systems for the Security of South America and South Europe." Academic and Applied Research in Military and Public Management Science 20, Special Edition (2021): 79–94. http://dx.doi.org/10.32565/aarms.2021.2.ksz.6.
Повний текст джерелаTsyhanov, Oleh, Igor Chumachenko, Iryna Panova, and Mykola Golub. "Public Policy in the Sphere of Activity of the Ministry of Internal Affairs of Ukraine: Approaches to Determining the Essence and Content." Revista Amazonia Investiga 9, no. 28 (April 21, 2020): 159–65. http://dx.doi.org/10.34069/ai/2020.28.04.19.
Повний текст джерелаRiahla, Mohamed Amine, Sihem Goumiri, Karim Tamine, and M'hamed Hamadouche. "A New Cooperation Model for Dynamic Networks." International Journal of Business Data Communications and Networking 17, no. 2 (July 2021): 1–15. http://dx.doi.org/10.4018/ijbdcn.286704.
Повний текст джерелаLamsal, Hiranya Lal. "Effectiveness Of Military Diplomacy Towards Nationalism, National Security and Unity." Unity Journal 3, no. 01 (March 6, 2022): 82–96. http://dx.doi.org/10.3126/unityj.v3i01.43317.
Повний текст джерелаEgorov, Gennady. "Legal Forms of Ensuring Information Security on the Internet." Legal Concept, no. 4 (December 2022): 70–76. http://dx.doi.org/10.15688/lc.jvolsu.2022.4.9.
Повний текст джерелаS, Vasudha, Neelamma K. Patil, and Dr Lokesh R. Boregowda. "Performance Improvement of Face Recognition System using Selective Local Feature Vectors." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 2 (August 10, 2013): 1330–38. http://dx.doi.org/10.24297/ijct.v10i2.3299.
Повний текст джерелаMalik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, and Mohammad A. Alqarni. "From Conventional to State-of-the-Art IoT Access Control Models." Electronics 9, no. 10 (October 15, 2020): 1693. http://dx.doi.org/10.3390/electronics9101693.
Повний текст джерелаLoncar-Turukalo, Tatjana, Eftim Zdravevski, José Machado da Silva, Ioanna Chouvarda, and Vladimir Trajkovik. "Literature on Wearable Technology for Connected Health: Scoping Review of Research Trends, Advances, and Barriers." Journal of Medical Internet Research 21, no. 9 (September 5, 2019): e14017. http://dx.doi.org/10.2196/14017.
Повний текст джерелаRAJ, RISHI, T. K. DAS, RAMANJIT KAUR, RAJ SINGH, and KAPILA SHEKHAWAT. "Invasive noxious weed management research in India with special reference to Cyperus rotundus, Eichhornia crassipes and Lantana camara." Indian Journal of Agricultural Sciences 88, no. 2 (April 27, 2018): 181–96. http://dx.doi.org/10.56093/ijas.v88i2.79160.
Повний текст джерелаKashmar, Nadine, Mehdi Adda, Hussein Ibrahim, Jean-François Morin, and Tony Ducheman. "Instantiation and Implementation of HEAD Metamodel in an Industrial Environment: Non-IoT and IoT Case Studies." Electronics 12, no. 15 (July 25, 2023): 3216. http://dx.doi.org/10.3390/electronics12153216.
Повний текст джерелаSanchez, Gabriella. "Critical Perspectives on Clandestine Migration Facilitation: An Overview of Migrant Smuggling Research." Journal on Migration and Human Security 5, no. 1 (March 2017): 9–27. http://dx.doi.org/10.1177/233150241700500102.
Повний текст джерелаTsai, Jason, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, and Milind Tambe. "Urban Security: Game-Theoretic Resource Allocation in Networked Domains." Proceedings of the AAAI Conference on Artificial Intelligence 24, no. 1 (July 4, 2010): 881–86. http://dx.doi.org/10.1609/aaai.v24i1.7612.
Повний текст джерелаIstván, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.
Повний текст джерелаNaja, Rola, Nadia Mouawad, and Ali J. Ghandour. "Spatio-temporal optimal law enforcement using Stackelberg games." Lebanese Science Journal 18, no. 2 (December 27, 2017): 244–54. http://dx.doi.org/10.22453/lsj-018.2.244-254.
Повний текст джерелаWeiss, Moritz, and Simon Dalferth. "Security Re-Divided: The Distinctiveness of Policy-Making in ESDP and JHA." Cooperation and Conflict 44, no. 3 (August 20, 2009): 268–87. http://dx.doi.org/10.1177/0010836709106216.
Повний текст джерелаAwad, Mamoun, Latifur Khan, and Bhavani Thuraisingham. "Policy Enforcement System for Inter-Organizational Data Sharing." International Journal of Information Security and Privacy 4, no. 3 (July 2010): 22–39. http://dx.doi.org/10.4018/jisp.2010070102.
Повний текст джерелаPerko, Igor, and Peter Ototsky. "Big Data for Business Ecosystem Players." Naše gospodarstvo/Our economy 62, no. 2 (June 1, 2016): 12–24. http://dx.doi.org/10.1515/ngoe-2016-0008.
Повний текст джерелаBerlato, Stefano, Roberto Carbone, Adam J. Lee, and Silvio Ranise. "Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud." ACM Transactions on Privacy and Security 25, no. 1 (February 28, 2022): 1–37. http://dx.doi.org/10.1145/3474056.
Повний текст джерелаRublovskis, Raimonds. "RE-THINKING OF NATIONAL SECURITY IN THE AGE OF PANDEMICS." Baltic Journal of Legal and Social Sciences, no. 2 (April 4, 2022): 15–25. http://dx.doi.org/10.30525/2592-8813-2021-2-2.
Повний текст джерелаSamimian-Darash, Limor, and Meg Stalcup. "Anthropology of security and security in anthropology: Cases of counterterrorism in the United States." Anthropological Theory 17, no. 1 (November 7, 2016): 60–87. http://dx.doi.org/10.1177/1463499616678096.
Повний текст джерелаApostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras, and Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions." Open Research Europe 1 (January 21, 2022): 87. http://dx.doi.org/10.12688/openreseurope.13715.2.
Повний текст джерелаKasum, Josip, Marko Pilić, Nebojša Jovanović, and Harrison Pienaar. "Model of Forensic Hydrography." Transactions on Maritime Science 8, no. 2 (October 21, 2019): 246–52. http://dx.doi.org/10.7225/toms.v08.n02.010.
Повний текст джерелаSchwab, Abraham P., Hung S. Luu, Jason Wang, and Jason Y. Park. "Genomic Privacy." Clinical Chemistry 64, no. 12 (December 1, 2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Повний текст джерелаKampas, Giorgos, Aggelos Vasileiou, Marios Antonakakis, Michalis Zervakis, Emmanouil Spanakis, Vangelis Sakkalis, Peter Leškovský, et al. "Design of Sensors’ Technical Specifications for Airborne Surveillance at Borders." Journal of Defence & Security Technologies 5, no. 1 (2022): 58–83. http://dx.doi.org/10.46713/jdst.005.04.
Повний текст джерелаCurl, Cynthia L., Lisa Meierotto, and Rebecca L. Som Castellano. "Understanding Challenges to Well-Being among Latina FarmWorkers in Rural Idaho Using in an Interdisciplinary, Mixed-Methods Approach." International Journal of Environmental Research and Public Health 18, no. 1 (December 29, 2020): 169. http://dx.doi.org/10.3390/ijerph18010169.
Повний текст джерелаDiamantopoulou, Vasiliki, and Haralambos Mouratidis. "Practical evaluation of a reference architecture for the management of privacy level agreements." Information & Computer Security 27, no. 5 (November 11, 2019): 711–30. http://dx.doi.org/10.1108/ics-04-2019-0052.
Повний текст джерелаYadav, Priya R. "Review Paper on Introduction to Cyber Forensics." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1939–42. http://dx.doi.org/10.22214/ijraset.2021.37684.
Повний текст джерелаApostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras, and Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions." Open Research Europe 1 (July 30, 2021): 87. http://dx.doi.org/10.12688/openreseurope.13715.1.
Повний текст джерелаDahlberg, Rasmus, Tobias Pulls, Tom Ritter, and Paul Syverson. "Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 194–213. http://dx.doi.org/10.2478/popets-2021-0024.
Повний текст джерелаLajaunie, Claire, Burkhard Schafer, and Pierre Mazzega. "Big Data Enters Environmental Law." Transnational Environmental Law 8, no. 3 (October 31, 2019): 523–45. http://dx.doi.org/10.1017/s2047102519000335.
Повний текст джерелаBROŽIČ, LILIANA. "CONTEMPORARY MILITARY CHALLENGES IN ENGLISH – A PROBLEM OR AN OPPORTUNITY." CONTEMPORARY MILITARY CHALLENGES 2011, no. 13/4 (October 15, 2011): 11–14. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.13.4.00.
Повний текст джерелаStaller, Mario S., and Swen Körner. "Regression, Progression and Renewal: The Continuous Redevelopment of Expertise in Police Use of Force Coaching." European Journal for Security Research, October 16, 2020. http://dx.doi.org/10.1007/s41125-020-00069-7.
Повний текст джерелаFigini, Silvia. "MACHINE LEARNING PER CARATTERIZZARE GLI ATTACCHI TERRORISTICI." Istituto Lombardo - Accademia di Scienze e Lettere - Rendiconti di Lettere, July 15, 2020. http://dx.doi.org/10.4081/let.2018.680.
Повний текст джерела"Enforcement of Women's Rights through Education." International Journal of Recent Technology and Engineering 8, no. 4 (November 30, 2019): 5397–402. http://dx.doi.org/10.35940/ijrte.d7619.118419.
Повний текст джерела"A Prototype Design for a Framework to Analyse the Traffic Flow in Darknet." International Journal of Innovative Technology and Exploring Engineering 8, no. 6S4 (July 26, 2019): 1449–52. http://dx.doi.org/10.35940/ijitee.f1295.0486s419.
Повний текст джерела