Academic literature on the topic 'Internet des objets – Protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet des objets – Protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Internet des objets – Protection"
AR, Azhari. "Perlindungan Hukum Terhadap Karya Cipta Di Media Internet." Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat 22, no. 2 (2023): 278–90. http://dx.doi.org/10.30743/jhk.v22i2.6492.
Full textHaza, Marion. "Objets culturels dystopiques et adolescence." Topique 160, no. 1 (2024): 97–110. http://dx.doi.org/10.3917/top.160.0097.
Full textSargaldakova, Zh Z., and D. A. Kutmanalieva. "PROTECTION OF COPYRIGHT OBJECTS ON THE INTERNET." Vestnik of the Kyrgyz-Russian Slavic University 24, no. 3 (2024): 96–100. http://dx.doi.org/10.36979/1694-500x-2024-24-3-96-100.
Full textMeiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management." Sécurité et stratégie 32, no. 4 (2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Full textWANG, Haixiang, Jingyi CAO, and Zhe LIU. "Energy Internet and Its Trusted Protection Architecture." Wuhan University Journal of Natural Sciences 27, no. 2 (2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.
Full textSamahalska, Y. "Personal data protection in the Internet." Uzhhorod National University Herald. Series: Law 2, no. 82 (2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.
Full textKUCHUK, Andrii, and Yuliia SIHALOVA. "LEGAL REGULATION OF COPYRIGHT ON THE INTERNET: GENERAL STATE." Naukovyy Visnyk Dnipropetrovs kogo Derzhavnogo Universytety Vnutrishnikh Sprav, no. 1 (October 2, 2024): 102–7. http://dx.doi.org/10.31733/2078-3566-2023-5-102-107.
Full textLogvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p21.
Full textLogvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p:21.
Full textKurniawan Sihombing, Agung, Rika Ratna Permata, and Tasya Safiranita Ramli. "Comparison of Digital Copyright Protection on Over the Top (OTT) Streaming Content Media in Indonesia and the United States." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, no. 2 (2021): 183–212. http://dx.doi.org/10.22304/pjih.v8n2.a2.
Full textDissertations / Theses on the topic "Internet des objets – Protection"
Nicomette, Vincent. "La protection dans les systèmes à objets répartis." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 1996. http://tel.archives-ouvertes.fr/tel-00175252.
Full textMorel, Victor. "Enhancing transparency and consent in the internet of things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI073.
Full textOuld, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242.
Full textOuld, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets." Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.
Full textCelosia, Guillaume. "Privacy challenges in wireless communications of the Internet of Things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI069.
Full textLanna, Maximilien. "La protection des données à caractère personnel à l’épreuve de l’automesure connectée." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020026.
Full textJunges, Pierre-Marie. "Évaluation à l'échelle de l'Internet du niveau d'exposition des objets connectés face aux risques de sécurité." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0078.
Full textMoreira, da Costa Thiago. "OPP_IoT An ontology-based privacy preservation approach for the Internet of Things." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM003/document.
Full textDiop, Aïda Abdou. "Cryptographic mechanisms for device authentication and attestation in the internet of things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS023.
Full textKouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Full textBooks on the topic "Internet des objets – Protection"
Piette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Lexis Nexis, 2015.
Find full textMaksurov, Aleksey. The use of special knowledge in proving cases of crimes and offenses on the Internet. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1915941.
Full textMoura Vicente, Dário, and Sofia de Vasconcelos Casimiro, eds. Data Protection in the Internet. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-28049-9.
Full textGaliardo, Antonio Cayón. Internet y derecho. Gobierno de Aragon, Departamento de Presidencia y Relaciones Institucionales, 2001.
Find full textZiegler, Sébastien, ed. Internet of Things Security and Data Protection. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.
Full textAngel, Davara Rodríguez Miguel, and Davara & Davara., eds. Código de Internet. 3rd ed. Thomson/Aranzadi, 2007.
Find full textAngel, Davara Rodríguez Miguel, and Davara & Davara, eds. Código de Internet. Aranzadi, 2002.
Find full textPlaza, Anxo Tato, José Antonio Gómez Segade, and Angel Fernández-Albor Baltar. Comercio electrónico en Internet. Marcial Pons, 2001.
Find full textAlbers, Marion, and Ingo Wolfgang Sarlet, eds. Personality and Data Protection Rights on the Internet. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-90331-2.
Full textBook chapters on the topic "Internet des objets – Protection"
Eswaran, Subha P. "Intelligent Environment Protection." In Internet of Things (IoT). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37468-6_18.
Full textBell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "Children's Internet Protection Act." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-15.
Full textAbadi, Martín. "Protection in Programming-Language Translations." In Secure Internet Programming. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_2.
Full textGiannopoulou, Alexandra, and Valeria Ferrari. "Distributed Data Protection and Liability on Blockchains." In Internet Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17705-8_17.
Full textRoth, Volker. "Mutual Protection of Co-operating Agents." In Secure Internet Programming. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_13.
Full textRahim, Eva Rose. "Information Security in the Internet Age." In Beyond Data Protection. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_9.
Full textAppleman, Dan. "Passwords: Your Key to the Internet." In Always Use Protection. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0904-1_11.
Full textWu, Chuan-Kun. "Privacy Protection in IoT Applications." In Internet of Things Security. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_9.
Full textMoura Vicente, Dário, and Sofia de Vasconcelos Casimiro. "Data Protection in the Internet." In Ius Comparatum - Global Studies in Comparative Law. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_22.
Full textLeonti, Wolfgang C. "Protection of Internet Domain Names." In Key Aspects of German Business Law. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-540-24776-0_11.
Full textConference papers on the topic "Internet des objets – Protection"
Burton, S. A., and M. Bonner. "Elastomeric Corrosion Protection Performance and Compatibility with Cathodic Protection Systems." In CORROSION 1985. NACE International, 1985. https://doi.org/10.5006/c1985-85286.
Full textMa, Ying, Yaguang Wang, and Yujie Xiao. "Personalized Continuous Location Privacy Protection in Internet of Vehicles." In 2025 IEEE 6th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT). IEEE, 2025. https://doi.org/10.1109/ainit65432.2025.11035145.
Full textLiu, Dan, Lingrao Wang, Shenglin Xu, Peng Dong, and Hongzhi Su. "A prediction method of relay protection defects." In 2024 IEEE 8th Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2024. https://doi.org/10.1109/ei264398.2024.10991385.
Full textDing, Xiaobing, Shenxing Shi, Jiang Yu, et al. "Exploration of New Power System Protection Architecture." In 2024 IEEE 8th Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2024. https://doi.org/10.1109/ei264398.2024.10990568.
Full textFleck, Andreas, and Florian Kammüller. "Implementing Privacy with Erlang Active Objects." In 2010 Fifth International Conference on Internet Monitoring and Protection. IEEE, 2010. http://dx.doi.org/10.1109/icimp.2010.27.
Full textSaiz-Laudo, Raul, and Marc Sanchez-Artigas. "Egeon: Software-Defined Data Protection for Object Storage." In 2022 22nd International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE, 2022. http://dx.doi.org/10.1109/ccgrid54584.2022.00019.
Full textQiu, Zhen, Takeshi Ikenaga, and Satoshi Goto. "Robust Scalable Video Transmission using Object-Oriented Unequal Loss Protection over Internet." In APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/apccas.2006.342547.
Full textKambovski, Igor. "SIGURNOST ČUVANjA I PRENOSA PODATAKA I INFORMACIJA KOD ELEKTRONSKE TRGOVINE I ELEKTRONSKOG (INTERNET) BANKARSTVA." In XV Majsko savetovanje: Sloboda pružanja usluga i pravna sigurnost. University of Kragujevac, Faculty of Law, 2019. http://dx.doi.org/10.46793/xvmajsko.899k.
Full textZHELEZNYAKOV, R. A., A. A. KHACHATRYAN, M. A. BERBEROVA, and E. V. KURNASOV. "SECURITY TOOLS AND DATABASE PROTECTION IN THE IOT OF A MODERN UNIVERSITY." In GRAPHICON 2024. Omsk State Technical University, 2024. http://dx.doi.org/10.25206/978-5-8149-3873-2-2024-1036-1041.
Full textDidero, Rachele, and Giovanni Maria Conti. "CAPABLE: Engineering, textile, and fashion Collaboration, for citizens' Awareness and Privacy Protection." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001536.
Full textReports on the topic "Internet des objets – Protection"
Zhuo, Ran, Bradley Huffaker, KC Claffy, and Shane Greenstein. The Impact of the General Data Protection Regulation on Internet Interconnection. National Bureau of Economic Research, 2019. http://dx.doi.org/10.3386/w26481.
Full textCunha e Melo, Mariana, and Jonas de Abreu Castro. Section 230 and the future of the internet. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ejp3ba.
Full textAubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin, and Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, 2023. http://dx.doi.org/10.51203/rapport.nu.000003.
Full textSerafica, Ramonette, and Queen Cel Oren. Should the Philippines Adopt Net Neutrality Regulations? Philippine Institute for Development Studies, 2024. http://dx.doi.org/10.62986/pn2024.08.
Full textKrishnaswamy, Sudhir, and Jayna Kothari. Rights in Review: The Supreme Court in 2015. Centre for Law and Policy Research, 2016. http://dx.doi.org/10.54999/yvjn7797.
Full textPark, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, et al. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0003930.
Full textJones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.
Full textSokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, 2024. http://dx.doi.org/10.12731/er0785.29012024.
Full textSaha, Devanik. Shockproof and Inclusive Fiscal Policies. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/core.2023.005.
Full textBACCELLI, François, Sébastien CANDEL, Guy PERRIN, and Jean-Loup PUGET. Large Satellite Constellations: Challenges and Impact. Académie des sciences, 2024. http://dx.doi.org/10.62686/3.
Full text