Academic literature on the topic 'Data Manipulation and Integrity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data Manipulation and Integrity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data Manipulation and Integrity"
Apurva, Shelke* Aditi Shinde Samruddhi Shinde Karan Shinde Saurabh Shinde S. D. Mankar. "Data Integrity in Pharmaceutical Sciences." International Journal of Pharmaceutical Sciences 3, no. 4 (2025): 1142–48. https://doi.org/10.5281/zenodo.15185271.
Full textService, R. F. "RESEARCH INTEGRITY: Pioneering Physics Papers Under Suspicion for Data Manipulation." Science 296, no. 5572 (2002): 1376–77. http://dx.doi.org/10.1126/science.296.5572.1376.
Full textSreevibhu, Sagi, and Teendra Pavan Kumar. "Application of Integrated RSA Encryption in Remote Data Integrity Check." Journal of Research in Science and Engineering 6, no. 8 (2024): 32–37. http://dx.doi.org/10.53469/jrse.2024.06(08).08.
Full textEka Mayasari and Sri Trisnaningsih. "Case Study: Manipulation of Financial Reports at PT. Adisarana Wanaartha Life Insurance (Wanaartha Life)." Formosa Journal of Applied Sciences 2, no. 10 (2023): 2541–50. http://dx.doi.org/10.55927/fjas.v2i10.6578.
Full textUllagaddi, P. "Safeguarding Data Integrity in Pharmaceutical Manufacturing." Journal of Advances in Medical and Pharmaceutical Sciences 26, no. 8 (2024): 64–75. http://dx.doi.org/10.9734/jamps/2024/v26i8708.
Full textARFEEN, RIMSHA. "Detection of Data Manipulation in Datasets Using Machine Learning." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50775.
Full textPutra, Ryan Adi, Rizka Ardiansyah, Mohammad Yazdi Pusadan, Anita Ahmad Kasim, and Yuri Yudhaswana Joefrie. "Developing Decentralized Data Storage Network Using Blockchain Technology to Prevent Data Alteration." Advance Sustainable Science, Engineering and Technology 6, no. 1 (2024): 02401017. http://dx.doi.org/10.26877/asset.v6i1.17772.
Full textJaiswal, Himani, Muddukrishna B. S., and Girish Pai Kulyadi. "Data Integrity Violations: A Challenge to the Pharmaceutical Industry." International Journal of Pharmaceutical Quality Assurance 11, no. 01 (2020): 196–98. http://dx.doi.org/10.25258/ijpqa.11.1.30.
Full textNovianti, Sinta, and Deannes Isynuwardhana. "Pengaruh Komisaris Independen, Leverage, Dan Kepemilikan Institusional Terhadap Integritas Laporan Keuangan." Jurnal Pendidikan Akuntansi & Keuangan 9, no. 1 (2021): 64–73. http://dx.doi.org/10.17509/jpak.v9i1.27003.
Full textElwaaey, Hossameldin Ali, and Ahmed Ibrahim Yousef. "Cybersecurity Aspects in Gamification: A Comprehensive Overview." International Journal Of Modern Engineering Research (IJMER) 14, no. 5 (2024): 79–87. https://doi.org/10.5281/zenodo.14048861.
Full textDissertations / Theses on the topic "Data Manipulation and Integrity"
Moss, Ben. "The data integrity problem and multi-layered document integrity." Thesis, University of Nottingham, 2007. http://eprints.nottingham.ac.uk/10538/.
Full textPutniņš, Tālis J. "Closing price manipulation and the integrity of stock exchanges." University of Sydney, 2010. http://hdl.handle.net/2123/5925.
Full textPutniņš, Tālis J. "Closing price manipulation and the integrity of stock exchanges." Thesis, The University of Sydney, 2009. http://hdl.handle.net/2123/5925.
Full textAlchazidis, Nikolaos. "Data integrity in RFID systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion-image.exe/06Sep%5FAlchazidis.pdf.
Full textIvan, Thomas R. "Comparison of data integrity models." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/43739.
Full textSinghal, Rohit. "Data integrity for on-chip interconnects." Texas A&M University, 2003. http://hdl.handle.net/1969.1/5929.
Full textMallur, Vikram. "A Model for Managing Data Integrity." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20233.
Full textSalawu, Olusegun Saheed. "Structural integrity assessment using vibration data." Thesis, University of Plymouth, 1994. http://hdl.handle.net/10026.1/2614.
Full textTriebel, Marvin. "Preserving Data Integrity in Distributed Systems." Doctoral thesis, Humboldt-Universität zu Berlin, 2018. http://dx.doi.org/10.18452/19590.
Full textRahman, Rizwan Tanvir. "Market integrity issues in financial markets." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/12552.
Full textBooks on the topic "Data Manipulation and Integrity"
Herrero, Rolando, ed. Networking Data Integrity and Manipulation in Cyber-Physical and Communication Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83149-2.
Full textVojvodić, Mira. Managing data integrity. National Library of Canada = Bibliothèque nationale du Canada, 1993.
Find full textSpector, Phil. Data Manipulation with R. Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-74731-6.
Full textDeardurff, John. T-SQL Data Manipulation. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4993-2.
Full textDooley, Bill. Ensuring data integrity at Bell Atlantic. Information Management Forum, 1998.
Find full textSong, Shaoxu, and Lei Chen. Integrity Constraints on Rich Data Types. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-27177-9.
Full textJ, Thomas Stephen, ed. Asset data integrity is serious business. Industrial Press, Inc., 2010.
Find full textWilkinson, T. A. WATFILE/Plus data manipulation system tutorial and reference. WATCOM Publications, 1986.
Find full textWilkinson, T. A. WATFILE/Plus data manipulation system tutorial and reference. 3rd ed. WATCOM Publications, 1987.
Find full textTechnology), Invitational Workshop on Data Integrity (1989 National Institute of Standards and. Report of the Invitational Workshop on Data Integrity. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.
Find full textBook chapters on the topic "Data Manipulation and Integrity"
Herrero, Rolando. "Introduction to Networking Data Integrity and Manipulation in Cyber-Physical and Communication Systems." In Engineering Cyber-Physical Systems and Critical Infrastructures. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83149-2_1.
Full textVijayalakshmi K, N. V. S. K., J. Sasikala, and C. Shanmuganathan. "Exposing Manipulation: Deep Learning for Copy-Paste Forgery Detection in Images and Medical Data Integrity." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3725-6_36.
Full textDionysopoulos, Lambis. "Historic Overview and Future Outlook of Blockchain Interoperability." In Big Data and Artificial Intelligence in Digital Finance. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94590-9_6.
Full textMüller, Rainer, Ali Kanso, and Fabian Adler. "An Approach to Integrate a Blockchain-Based Payment Model and Independent Secure Documentation for a Robot as a Service." In Annals of Scientific Society for Assembly, Handling and Industrial Robotics 2021. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-74032-0_15.
Full textSeadle, Michael. "Quantifying Image Manipulation." In Quantifying Research Integrity. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-031-02306-4_5.
Full textGorman, Tim. "Data Manipulation." In Beginning Oracle SQL. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6557-3_6.
Full textde Haan, Lex, Daniel Fink, Tim Gorman, Inger Jørgensen, and Karen Morton. "Data Manipulation." In Beginning Oracle SQL. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-7196-3_6.
Full textLafler, Kirk Paul. "Data Manipulation." In Power SAS: A Survival Guide. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-1155-6_4.
Full textVenkateshan, S. P. "Data Manipulation." In Mechanical Measurements. John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781119115571.ch15.
Full textVenables, W. N., and B. D. Ripley. "Data Manipulation." In Modern Applied Statistics with S. Springer New York, 2002. http://dx.doi.org/10.1007/978-0-387-21706-2_2.
Full textConference papers on the topic "Data Manipulation and Integrity"
Maddhi, Sunitha, Ratnam Dodda, T. Layaraj, and C. Raghavendra. "Safeguarding Log Data Integrity: Employing DES Encryption Against Manipulation Attempts." In 2024 4th International Conference on Intelligent Technologies (CONIT). IEEE, 2024. http://dx.doi.org/10.1109/conit61985.2024.10627320.
Full textWong, Sin-Man, Cheng-Shian Lin, and Chien-Chang Chen. "Weather Sensor Data Manipulation Detection." In 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2024. http://dx.doi.org/10.1109/icce-taiwan62264.2024.10674389.
Full textHan, Zhijie, Xingbo Xie, Xiaoyu Du, Ying Du, and Xin He. "Blockchain-Based Data Integrity Verification." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00043.
Full textBhattacharjee, Shameek, Mehrdad Salimitari, Mainak Chatterjee, Kevin Kwiat, and Charles Kamhoua. "Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.87.
Full textSakamoto, Junichi, Shungo Hayashi, Daisuke Fujimoto, and Tsutomu Matsumoto. "How to Code Data Integrity Verification Secure Against Single-Spot-Laser-Induced Instruction Manipulation Attacks." In 2020 IEEE/ACS 17th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2020. http://dx.doi.org/10.1109/aiccsa50499.2020.9316521.
Full textLoertthiraporn, Thirut, Passaworn Silakorn, Kunachat Witoonsoontorn, Athipkiat Lertthanasart, Suthisak Thepsriha, and Chatchai Laemkhowthong. "Plant Integrity Assurance by the Development and Deployment of Advanced NDE and Digitalization." In International Petroleum Technology Conference. IPTC, 2023. http://dx.doi.org/10.2523/iptc-22869-ms.
Full textZhuo, Fan, Ying He, Fei Yu, Pengteng Li, Zheyi Zhao, and Xilong Sun. "ABM: Attention before Manipulation." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/201.
Full textS. Jabor, Maytham, Aqeel Salman Azez, Azhar Hasan Nsaif, Azhar Sabah Abdulaziz, and Worud Mahdi Saleh. "Security Challenges and Threats in Wireless Sensor Networks: A Review." In IX. International Scientific Congress of Pure, Applied and Technological Sciences. Rimar Academy, 2023. http://dx.doi.org/10.47832/minarcongress9-21.
Full textPetronijević, Jovan, Nikola Radić, and Milan Gavrilović. "Dependence on technology and market manipulation as potential risks of using artificial intelligence in finance." In Employment, Education and Entrepreneurship 2024. Faculty of Business Economics and Entrepreneurship, 2024. https://doi.org/10.5937/eee24084p.
Full textStolicki, Dariusz, Wojciech Słomczyński, and Stanisław Szufa. "Nonparametric Detection of Gerrymandering in Multiparty Plurality Elections." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/329.
Full textReports on the topic "Data Manipulation and Integrity"
Burnsides, Dennis, Patrick Files, and Jennifer Whitestone. Integrate 1.28: A Software Tool for Visualizing, Analyzing, and Manipulating Three-Dimensional Data. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada388662.
Full textChatterjee, A., and A. Segev. Data manipulation in heterogeneous databases. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/5607873.
Full textChatterjee, A., and A. Segev. Data manipulation in heterogeneous databases. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/10130641.
Full textRubin, A. Location-Independent Data/Software Integrity Protocol. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1805.
Full textFales, J. F., and R. S. Vincent. Datamatrix and PDF417 data integrity test. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/10188706.
Full textJaos, Leo, and Davide Braga. Characterization of LVDS Transmission Data Integrity. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1618054.
Full textBallard, W. P. xdamp: An IDL{reg_sign}-based Data Manipulation Program. Office of Scientific and Technical Information (OSTI), 1995. http://dx.doi.org/10.2172/62940.
Full textIrvine, Cynthia E., and Timothy E. Levin. Data Integrity Limitations in Highly Secure Systems. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada423489.
Full textRigotti, Christophe, Patrick Marcel, and Mohand-Saïd Hacid. A Rule-Based Data Manipulation Language for OLAP Systems. Aachen University of Technology, 1997. http://dx.doi.org/10.25368/2022.76.
Full textWampler, Jason, and Garrett Payer. Blockchain for High Performance Data Integrity and Provenance. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1497843.
Full text