Journal articles on the topic 'Unauthorised access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Unauthorised access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bainbridge, David I. "Hacking-The Unauthorised Access of Computer Systems; the Legal Implications." Modern Law Review 52, no. 2 (March 1989): 236–45. http://dx.doi.org/10.1111/j.1468-2230.1989.tb02820.x.
Full textPeady, C. "Unauthorised access to the contents of a Graseby 3300 PCA pump." Anaesthesia 62, no. 1 (January 2007): 98–99. http://dx.doi.org/10.1111/j.1365-2044.2006.04929_1.x.
Full textOsagie, M. S. U., and Amenze Joy Osagie. "A Bit of Hacking Techniques for Vulnerable Subdomain." Journal of Advances in Computing, Communications and Information Technology 1 (April 25, 2021): 1–7. http://dx.doi.org/10.37121/jaccit.v1.133.
Full textKachaeva, G. I., A. D. Popov, and E. A. Rogozin. "FUNCTIONAL PERFORMANCE INDICATORS DURING SYSTEMS DEVELOPMENT TO PROTECT INFORMATION FROM UNAUTHORISED ACCESS." Herald of Dagestan State Technical University. Technical Sciences 45, no. 1 (June 13, 2018): 147–59. http://dx.doi.org/10.21822/2073-6185-2018-45-1-147-159.
Full textTaylor, Savitri. "Should unauthorised arrivals in Australia have free access to advice and assistance?" Australian Journal of Human Rights 6, no. 1 (February 2000): 34–58. http://dx.doi.org/10.1080/1323238x.2000.11911026.
Full textMiller, Shane, Kevin Curran, and Tom Lunney. "Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses." International Journal of Digital Crime and Forensics 13, no. 6 (November 2021): 1–20. http://dx.doi.org/10.4018/ijdcf.20211101.oa8.
Full textMaurushat, Alana, and Ron Yu. "When Internet protocols and legal provisions collide: Unauthorised access and Sierra v. Ritz." Computer Law & Security Review 25, no. 2 (January 2009): 185–88. http://dx.doi.org/10.1016/j.clsr.2009.02.005.
Full textAlferov, V. P., A. V. Butskikh, A. V. Krisilov, A. D. Popov, and E. A. Rogozin. "USE OF A NUMERICAL ANALYTICAL MODEL FOR ASSESSING THE FUNCTIONAL EFFECTIVENESS OF AN INFORMATION PROTECTION SYSTEM BY ANALYSING ITS PROBABILISTIC-TEMPORAL CHARACTERISTICS." Herald of Dagestan State Technical University. Technical Sciences 47, no. 1 (April 21, 2020): 58–71. http://dx.doi.org/10.21822/2073-6185-2020-47-1-58-71.
Full textSelvadurai, Niloufer, Md Rizwanul Islam, and Peter Gillies. "Unauthorised access to wireless local area networks: The limitations of the present Australian laws." Computer Law & Security Review 25, no. 6 (November 2009): 536–42. http://dx.doi.org/10.1016/j.clsr.2009.09.003.
Full textMarrow, Helen B., and Tiffany D. Joseph. "Excluded and Frozen Out: Unauthorised Immigrants’ (Non)Access to Care after US Health Care Reform." Journal of Ethnic and Migration Studies 41, no. 14 (July 17, 2015): 2253–73. http://dx.doi.org/10.1080/1369183x.2015.1051465.
Full textKaragiannopoulos, Vasileios. "Insider unauthorised use of authorised access: What are the alternatives to the Computer Misuse Act 1990?" International Journal of Law, Crime and Justice 47 (December 2016): 85–96. http://dx.doi.org/10.1016/j.ijlcj.2016.08.003.
Full textMalik, Aftab Ahmad. "Bank Frauds Using Digital Devices and the Role of Business Ethics." International Journal for Electronic Crime Investigation 2, no. 4 (December 7, 2018): 7. http://dx.doi.org/10.54692/ijeci.2018.020421.
Full textMalik, Aftab Ahmad. "Bank Frauds Using Digital Devices and the Role of Business Ethics." International Journal for Electronic Crime Investigation 2, no. 4 (December 7, 2018): 7. http://dx.doi.org/10.54692/ijeci.2019.030121.
Full textWeir, Michael. "Land access perspectives in unconventional gas—where is the balance?" APPEA Journal 52, no. 1 (2012): 367. http://dx.doi.org/10.1071/aj11029.
Full textBorovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.
Full textGoold, Benjamin J. "Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy." Surveillance & Society 1, no. 2 (September 1, 2002): 191–203. http://dx.doi.org/10.24908/ss.v1i2.3352.
Full textGARCÍA ADEVA, JUAN JOSÉ, and JUAN MANUEL PIKATZA ATXA. "WEB MISUSE DETECTION THROUGH TEXT CATEGORISATION OF APPLICATION SERVER LOGS." International Journal on Artificial Intelligence Tools 15, no. 05 (October 2006): 849–54. http://dx.doi.org/10.1142/s0218213006002989.
Full textMohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (March 10, 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.
Full textGeeraert, Jérémy. "Sick and Vulnerable Migrants in French Public Hospitals. The Administrative and Budgetary Dimension of Un/Deservingness." Social Policy and Society 20, no. 3 (February 10, 2021): 487–96. http://dx.doi.org/10.1017/s1474746420000767.
Full textJansone, Anita, Kaspars Lauris, and Ivars Šaudinis. "Multi factor authentication as a necessary solution in the fight with information technology security threats." Environment. Technology. Resources. Proceedings of the International Scientific and Practical Conference 3 (June 16, 2015): 114. http://dx.doi.org/10.17770/etr2015vol3.183.
Full textPawlik, Marek, and Marcin Kowalski. "Rail safety in the context of relationships between directives on safety and interoperability - analysis from the point of view of the essential requirements of the essential 'security'." Transportation Overview - Przeglad Komunikacyjny 2016, no. 12 (December 1, 2016): 17–26. http://dx.doi.org/10.35117/a_eng_16_12_03.
Full textIrshad, Shareen, Muhammad Nawaz Brohi, and Tariq Rahim Soomro. "Block-ED: The Proposed Blockchain Solution for Effectively Utilising Educational Resources." Applied Computer Systems 25, no. 1 (May 1, 2020): 1–10. http://dx.doi.org/10.2478/acss-2020-0001.
Full textMiller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (July 2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.
Full textGreacen, Tim, David Friboulet, Lionel Fugon, Serge Hefez, Nicolas Lorente, and Bruno Spire. "Access to and use of unauthorised online HIV self-tests by internet-using French-speaking men who have sex with men." Sexually Transmitted Infections 88, no. 5 (March 21, 2012): 368–74. http://dx.doi.org/10.1136/sextrans-2011-050405.
Full textMugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." International Journal of Information Systems for Crisis Response and Management 10, no. 2 (April 2018): 49–78. http://dx.doi.org/10.4018/ijiscram.2018040103.
Full textOlapade, Daramola Thompson, Benjamin Gbolahan Ekemode, and Abel Olaleye. "Considerations for the design and management of property database in opaque markets." Journal of Property Investment & Finance 37, no. 5 (August 5, 2019): 445–54. http://dx.doi.org/10.1108/jpif-10-2018-0080.
Full textOmelchuk, Oleh M., Mariia P. Muzyka, Mykola O. Stefanchuk, Iryna P. Storozhuk, and Inna A. Valevska. "Legal grounds for restricting access to information: a philosophical aspect." Journal of the National Academy of Legal Sciences of Ukraine 28, no. 3 (September 17, 2021): 64–73. http://dx.doi.org/10.37635/jnalsu.28(3).2021.64-73.
Full textLytvynenko, Anatoliy A. "The Concept of the Patient’s Autonomy: From the Vaults of Civil Law." ATHENS JOURNAL OF LAW 8, no. 1 (December 29, 2021): 83–106. http://dx.doi.org/10.30958/ajl.8-1-5.
Full textHussain, Hafezali Iqbal, Fakarudin Kamarudin, Zuraidah Mohd-Sanusi, Shuhaida Mohamed Shuhidan, Ahmed Abdullah Saad Al-Dhubaibi, and Mohd Shahril Ahmad Razimi. "Governance in the Internet of Vehicles (IoV) Context: Examination of Information Privacy, Transport Anxiety, Intention, and Usage." Journal of Advanced Transportation 2021 (April 23, 2021): 1–10. http://dx.doi.org/10.1155/2021/5563260.
Full textMorrison, Michael, Chantal Wight, and Emily Evans. "Report on excavation of a shell mound site at Mandjungaar, western Cape York Peninsula." Queensland Archaeological Research 21 (May 2, 2018): 13–26. http://dx.doi.org/10.25120/qar.21.2018.3637.
Full textRogozin, E. A., D. G. Silka, and O. A. Gulyaev. "METHODOLOGY FOR ASSESSING THE SECURITY OF INFORMATION PASSED THROUGH THE TECHNICAL CHANNELS OF A SPECIAL-PURPOSE INFORMATISATION OBJECT." Herald of Dagestan State Technical University. Technical Sciences 46, no. 4 (January 2, 2020): 123–33. http://dx.doi.org/10.21822/2073-6185-2019-46-4-123-133.
Full textvan Waas, Laura. "The Children of Irregular Migrants: A Stateless Generation?" Netherlands Quarterly of Human Rights 25, no. 3 (September 2007): 437–58. http://dx.doi.org/10.1177/016934410702500303.
Full textZajcew, Oleg, and Aleksander Yepikhin. "The Subject Matter of Criminal Evidence Relating to the Disclosure of Information on Security Measures Applicable to Law Enforcement or Control Officials." Internal Security 10, no. 1 (November 27, 2018): 261–70. http://dx.doi.org/10.5604/01.3001.0012.7526.
Full textSadikin, Mohamad Ali, and Rini Wisnu Wardhani. "Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application." CommIT (Communication and Information Technology) Journal 10, no. 2 (October 31, 2016): 63. http://dx.doi.org/10.21512/commit.v10i2.1549.
Full textBanu, Anees. "Improved Algorithm of Steganography Combined with Cryptography." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3793–804. http://dx.doi.org/10.22214/ijraset.2021.35792.
Full textRachappa, Halkar. "Experimental Analysis of Latest Biometric Security Strategies and Its Impact on Authentication Methods." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 10 (October 31, 2019): 08–12. http://dx.doi.org/10.17762/ijritcc.v7i10.5516.
Full textShafack, Rosemary M. "Securing Library and Information Resources: The Situation in Two State University Libraries in Cameroon." European Journal of Education and Pedagogy 2, no. 1 (January 11, 2021): 25–31. http://dx.doi.org/10.24018/ejedu.2021.2.1.13.
Full textAl-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System." International Journal of Environmental Research and Public Health 16, no. 9 (April 27, 2019): 1490. http://dx.doi.org/10.3390/ijerph16091490.
Full textSong, Qun, Yuhao Chen, Yan Zhong, Kun Lan, Simon Fong, and Rui Tang. "A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–24. http://dx.doi.org/10.1145/3409798.
Full textAlhaqbani, Bandar, and Colin Fidge. "Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance." International Journal of Information Security and Privacy 4, no. 4 (October 2010): 35–59. http://dx.doi.org/10.4018/jisp.2010100103.
Full textFattah, Kazi Nazrul, and Peter Walters. "“A Good Place for the Poor!” Counternarratives to Territorial Stigmatisation from Two Informal Settlements in Dhaka." Social Inclusion 8, no. 1 (February 27, 2020): 55–65. http://dx.doi.org/10.17645/si.v8i1.2318.
Full textKelkar, Vishakha, Kushal Tuckley, and Hitesh Nemade. "Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity." Journal of Healthcare Engineering 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/3538979.
Full textvan Scheers, Louise, Johan Botha, and Jacques van Scheers. "Small and medium enterprise (SME) internet marketing challenges in the Tshwane area, South Africa." Journal of Governance and Regulation 4, no. 4 (2015): 590–95. http://dx.doi.org/10.22495/jgr_v4_i4_c5_p3.
Full textLewis, Harry. "Review of unauthorized access." ACM SIGACT News 45, no. 1 (March 17, 2014): 16–19. http://dx.doi.org/10.1145/2596583.2596588.
Full textMulligan, Ea, and Moira Paterson. "Patients rarely detect breaches of confidence." Australian Health Review 26, no. 3 (2003): 73. http://dx.doi.org/10.1071/ah030073a.
Full textNepelski, Mariusz, and Dominik Hryszkiewicz. "Intranet Communication on the Example of an IT System for Research and Decision‑making Analysis “SINDBAD”." Internal Security 8, no. 2 (December 31, 2016): 0. http://dx.doi.org/10.5604/01.3001.0010.2276.
Full textRehman, Amjad, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Adeel Anjum. "Data hiding technique in steganography for information security using number theory." Journal of Information Science 45, no. 6 (December 6, 2018): 767–78. http://dx.doi.org/10.1177/0165551518816303.
Full textKuts, D. V., and S. V. Porshnev. "THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS." Journal of the Ural Federal District. Information security 20, no. 3 (2020): 27–33. http://dx.doi.org/10.14529/secur200303.
Full textBrushwood, David B. "Unauthorized police access to PDMP data." Pharmacy Today 19, no. 7 (July 2013): 49. http://dx.doi.org/10.1016/s1042-0991(15)31271-8.
Full textRees, Frank. "ABS vulnerable to unauthorized computer access." Computer Fraud & Security Bulletin 1993, no. 12 (December 1993): 3. http://dx.doi.org/10.1016/0142-0496(93)90251-q.
Full text