Academic literature on the topic 'Unauthorized actions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorized actions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Unauthorized actions"

1

Voinik, Anna A., and Margarita R. Snegur. "Motives for participation of youth in unauthorized protest actions." Vestnik of Saint Petersburg University. Sociology 16, no. 3 (2023): 259–77. http://dx.doi.org/10.21638/spbu12.2023.302.

Full text
Abstract:
In-depth study of real motives for participation in protest actions could contribute a lot to increase effectiveness of educational activities and preventive maintenance with youth. Young people as a socio-demographic group have a high potential for civic participation and they are going to determine the strategy of the country’s political development in a few decades. The thesis deals with the analysis of the results of the field research on motives for the participation in unauthorized protest actions, conducted in July — September 2021 for the Committee on Youth Policy and Interaction with
APA, Harvard, Vancouver, ISO, and other styles
2

Рабенко, Татьяна Геннадьевна, and Анастасия Олеговна Терентьева. "The Dissemination Model of Unauthorized Information in the Virtual Communication Space (Based on the Material of the VKontakte Social Network)." Philology & Human, no. 1 (March 21, 2025): 7–26. https://doi.org/10.14258/filichel(2025)1-01.

Full text
Abstract:
The article presents aninteractive model for the dissemination of unauthorized information in a virtual communication space. Based on the interrelated dialogue of communication participants, this model is structured by the speech actions of the subjects of the virtual dialogue, defined as communicative actions or communicative moves. Acommunicative move is a verbal and/or non-verbal action of communication participants, a minimal significant element that either develops the interaction of dialogue participants and promotes their communication towards achieving a common communicative goal, or b
APA, Harvard, Vancouver, ISO, and other styles
3

Akhramovych, Volodymyr, and Vadym Akhramovych. "Quantitative assessment of the probability of protective system functioning without unlawful actions." Collection "Information Technology and Security" 12, no. 2 (2024): 257–67. https://doi.org/10.20535/2411-1031.2024.12.2.315745.

Full text
Abstract:
Information security, also known as InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information. The primary goal of information security is to achieve a balanced protection of data confidentiality, integrity, and availability, while considering the expediency of application and without any harm to the organization's productivity. In this paper, the security levels (threats) T of the k-th threat to the properties of information circulating in the information and telecommunications system (ITS) are obtained from the parame
APA, Harvard, Vancouver, ISO, and other styles
4

Krasnova, Anzhela, and Tat'yana Gribok. "TERRORISM AT DANGEROUS PRODUCTION FACILITIES. MEASURES OF PROTECTION AGAINST TERRORISM." Scientific Papers Collection of the Angarsk State Technical University 2020, no. 1 (2020): 338–43. http://dx.doi.org/10.36629/2686-7788-2020-1-338-343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Popov E. V., Popov E. V., Panteleev V. A. Panteleev V. A., Segal M. D. Segal M. D., Gavrilov S. L. Gavrilov S. L., Ovsynik A. I. Ovsynik A. I., and Lysenko I. A. Lysenko I. A. "THE RADIOLOGICAL CONSEQUENCES OF UNAUTHORIZED ACTIONS WITH RADIOISOTOPE SOURCES OF IONIZING RADIATION." Technology of technosphere safety 85 (2019): 115–26. http://dx.doi.org/10.25257/tts.2019.3.85.115-126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khanov, T. A., and A. T. Sadvakasova. "COMPENSATION FOR DAMAGE CAUSED BY THE PRODUCTION OF ILLEGAL UNAUTHORIZED INVESTIGATIVE ACTIONS." Russian-Asian Legal Journal, no. 3 (September 28, 2020): 37–42. http://dx.doi.org/10.14258/ralj(2020)3.8.

Full text
Abstract:
The article highlights the problematic issues associated with the lack of clear legal regulation of theprocedure for compensation for harm caused as a result of the production of covert investigative actions,which were recognized by the court as illegal. The authors provide arguments in support of the fact thatthe damage in question should be compensated for in civil proceedings. To eliminate the identified gaps, itis proposed that appropriate amendments be made to the criminal procedure legislation of the Republic ofKazakhstan.
APA, Harvard, Vancouver, ISO, and other styles
7

Kudryavtseva, Vera, and Natalia Vasileva. "On some problems of the legal regime of unauthorized construction objects." MATEC Web of Conferences 212 (2018): 09002. http://dx.doi.org/10.1051/matecconf/201821209002.

Full text
Abstract:
In real socio-economic conditions, unauthorized construction is a phenomenon quite common in contemporary society. Construction remains the main type of land use and planning of the populated areas, especially in the prevailing conditions, when every year the population in large cities of Russia is growing, which leads to a steady expansion of borders and an increase in the area occupied by cities. At the same time, in the absence of a clear, proper urban planning, and the development of urban and rural settlements, the number of buildings being built illegally will increase. In order to preve
APA, Harvard, Vancouver, ISO, and other styles
8

Varma, Jahith Sai Krishna. "EagleAI: AI Powered Real Time Restricted Area Surveillance." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3499–506. https://doi.org/10.22214/ijraset.2025.70612.

Full text
Abstract:
Abstract: Traditional security measures often fail to provide accurate and efficient monitoring, leading to vulnerabilities in restricted areas. This project implements an advanced real-time facial recognition-based surveillance system to enhance security and address these shortcomings. The system uses facial recognition technology for live monitoring, identifying authorized personnel and detecting unauthorized individuals. Attendance is recorded automatically in an Excel file, with timestamps for entry and exit. For unauthorized access, the system triggers multiple actions, including capturin
APA, Harvard, Vancouver, ISO, and other styles
9

Deen-Racsmány, Zsuzsanna. "A Redistribution of Authority Between the UN and Regional Organizations in the Field of the Maintenance of Peace and Security?" Leiden Journal of International Law 13, no. 2 (2000): 297–331. http://dx.doi.org/10.1017/s0922156500000212.

Full text
Abstract:
The UN Charter and customary law contain significant ambiguities concerning the prohibition of enforcement measures by regional organizations. This fact – coupled with practical necessity – appears to have been responsible for the failure of the UN to condemn the unauthorized use of force by regional organizations in Liberia and Sierra Leone. These cases and legal doctrine suggested increasing regional autonomy in this field. Although reactions to Operation Allied Force in Kosovo cooled the enthusiasm of those who wished for the legitimization of such actions, evidence suggests that under cert
APA, Harvard, Vancouver, ISO, and other styles
10

Krismanto, Rachmat Satyo, and Luluk Lusiati Cahyarini. "The Legal Review Regarding Copyright Protection of Songs from Unauthorized Song Cover Actions." Jurnal Daulat Hukum 5, no. 3 (2022): 164. http://dx.doi.org/10.30659/jdh.v5i3.23078.

Full text
Abstract:
The copyright infringement is an act prohibited by the law, in practice copyright infringement is divided into several forms of song piracy in Indonesia which results in losses from the creator and the state, therefore the government tries to enforce copyright law. Problems in writing this scientific paper are related to forms of violations, arrangements and legal protection efforts for the rights of songwriters in Indonesia. This research uses a normative juridical approach. Meanwhile, the conclusion of this study is that an activity does not include copyright infringement as long as the acts
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Unauthorized actions"

1

Балакін, Сергій В'ячеславович. "Методи та засоби підвищення достовірності ідентифікації несанкціонованих дій та атак в комп’ютерній мережі". Thesis, Національний авіаційний університет, 2018. http://er.nau.edu.ua/handle/NAU/37400.

Full text
Abstract:
ЗМІСТ ПЕРЕЛІК УМОВНИХ ПОЗНАЧЕНЬ…………………..……………………… 15 ВСТУП………………………………………..…………………………………… 16 РОЗДІЛ 1. АНАЛІЗ СТАНУ ПИТАННЯ І ПОСТАНОВКА ЗАВДАНЬ ДОСЛІДЖЕННЯ…………………………………………..……………………… 22 1.1 Науково-технічні проблеми виявлення несанкціонованих дій в комп’ютерних мережах………….…………………………………………… 22 1.2 Аналіз існуючих інструментальних засобів виявлення несанкціонованих дій і атак в комп’ютерних мережах…………………………………...…………………………………… 28 1.2.1 Сигнатурний аналіз……………………………..……………………… 30 1.2.2 Евристичний аналіз……………………………..……………………… 32 1.3 Порівняння методів і засобів підвищення надійності в
APA, Harvard, Vancouver, ISO, and other styles
2

Edlander, Timmie. "Akademiskt fusk : En kvalitativ studie om hur studenter motiverar handlingar som har föranlett disciplinära åtgärder." Thesis, Karlstads universitet, Institutionen för sociala och psykologiska studier, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-57027.

Full text
Abstract:
This is a qualitative study that has reviewed decision reports on academic cheating with content analysis as a method, aimed to investigate the actions that has led to disciplinary action and illustrate how students motivate their actions. The result shows that plagiarism is the main act that has led to disciplinary action. In the cheating plagiarism, the approach varies from the fact that the plagiarized texts may originate from students from other universities, classmates or it may be the result of collaboration between students. In the other cheating form unauthorised aids, the procedure is
APA, Harvard, Vancouver, ISO, and other styles
3

Barbero, Maria Victoria. "DACA, Immigrant Youth, and Education: An Analysis of Elite Narratives on Nationhood, Citizenship, and Belonging in the U.S." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405518424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chiou, Huey-Ling, and 邱惠玲. "The Scope of Disciplinary Measures for the Unauthorized Actions Conducted Illegally by Civil Servants." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/20465914841432475139.

Full text
Abstract:
碩士<br>國立臺灣大學<br>政治學研究所<br>105<br>The Public Functionary Discipline Act was amended on May 20, 2015. It was implemented from May 2, 2016. The amended Article 2 stipulates that unauthorized and illegal actions conducted by a civil servant shall not be disciplined, unless it seriously jeopardizes the credibility of the Government. Because it is an uncertain concept, we try to establish the scope of the disciplinary measures. First, the scope of the unauthorized actions conducted illegally by the civil servant is outside of the performance of his/her duty (including tardiness in carrying out
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Unauthorized actions"

1

Villa, Brian Loring. Unauthorized action: Mountbatten and the Dieppe raid. 2nd ed. Oxford University Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Villa, Brian Loring. Unauthorized action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Villa, Brian Loring. Unauthorized Action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Villa, Brian Loring. Unauthorized action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ltd, Publications International, ed. Action Strategies for Mortal Kombat: An Unauthorized Players' Guide. Publications International, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nick, Roberts. Bomberman 64: Unauthorized Game Secrets. Prima Publishing, Prima Games, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Anthony, James. Blast Corps: Unauthorized Game Secrets. Prima Publishing, Prima Games, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

BradyGames. Totally Unauthorized Guide to Donkey Kong Country. BradyGames, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Service, United States Forest. National recreation residence review and action plan. Washington Office, Lands, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

John, Marshall. GI Joe and other backyard heroes: An unauthorized guide. Schiffer Pub., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Unauthorized actions"

1

Sgambati, Domenico, Erica Moura, Ala Eddine Said, et al. "Monitoraggio, conservazione e informazione nella Baia Di Ieranto: un modello circolare per la gestione delle Aree Marine Protette." In Proceedings e report. Firenze University Press, 2020. http://dx.doi.org/10.36253/978-88-5518-147-1.60.

Full text
Abstract:
The 7 years monitoring-conservation-information program in the special B zone of Ieranto bay (belonging to the Marine Protected Area Punta Campanella - Naples, Italy) shows good results in terms of reducing illegal activities (such as illegal fishing, unauthorized boating, pollution and anchoring) and promoting environmental awareness for visitors. This 3-way management model represents one of the best practices of the MPA that could be applied to other MPAs in order to improve the correct usage of a protected area and to decrease/control the illegal actions and protect the environment
APA, Harvard, Vancouver, ISO, and other styles
2

Kosar, Kosar, Mohamed Fauzi Packeer Mohamed, Naeemul Islam, Rabiul Hasan Tarek, and Md Fahim Shahrier Khan. "GSM Based Bank Vault Surveillance Process with Finger Print and Password and Preventative Action Against Unauthorized Person." In Lecture Notes in Electrical Engineering. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8129-5_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mei, Rui, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu, and Weiping Wen. "Considerations on Evaluation of Practical Cloud Data Protection." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_4.

Full text
Abstract:
AbstractWith the continuous growth of enterprises’ digital transformation, business-driven cloud computing has seen tremendous growth. The security community has proposed a large body of technical mechanisms, operational processes, and practical solutions to achieve cloud security. In addition, diverse jurisdictions also present regulatory requirements on data protection to mitigate possible risks, for instance, unauthorized access, data leakage, sensitive information and privacy disclosure. In view of this, several practical standards, frameworks, and best practices in the industry are propos
APA, Harvard, Vancouver, ISO, and other styles
4

Christensen, Anne L., Jane Cote, and Claire K. Latham. "Unauthorized electronic access: Students’ ethics, attitudes, and actions." In Advances in Accounting Education. Emerald Group Publishing Limited, 2010. http://dx.doi.org/10.1108/s1085-4622(2010)0000011014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barr, Warren, and John Picton. "36. Limitation of action." In Pearce & Stevens' Trusts and Equitable Obligations. Oxford University Press, 2022. http://dx.doi.org/10.1093/he/9780198867494.003.0036.

Full text
Abstract:
This chapter considers the defence of limitation in regard to an action for compensation for breach of trust, which are governed by the Limitation Act 1980. Actions normally have to be brought within a six-year limitation period, though there are exceptions such as fraud, where no limitation period is imposed. The related doctrine of laches (unreasonable delay) is also explored. It also considers those provisions as they apply to actions against fiduciaries who have received an unauthorized profit, which has proved more difficult because the legislation does not make any express provision for
APA, Harvard, Vancouver, ISO, and other styles
6

Makhutov Nikolay A. and Gadenin Mikhail M. "Comparative Methods For The Assessment Of Threats Of Terrorist and Unauthorized Actions." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2012. https://doi.org/10.3233/978-1-61499-131-1-1.

Full text
Abstract:
The methodological foundation and methods for risk reduction have been developed in all countries of the world in the framework of the analysis of natural and technogenic risks. The problem was also intensively addressed to in Russia during the realization of the State Scientific Program &amp;ldquo;Safety of People and National Economy Assets in view of Risks of Accidents and Catastrophes&amp;rdquo; (1990-2000) and the Federal Research Program &amp;ldquo;Reduction of Risks and Mitigation of Consequences of Natural and Technogenic Emergencies in the RF until 2010.&amp;rdquo; In 1990-s it was su
APA, Harvard, Vancouver, ISO, and other styles
7

Bhimavarapu, Usharani. "Defending Against Phishing Attacks on Social Media." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch005.

Full text
Abstract:
Phishing in the Age of Mobile Devices and Social Media presents a growing threat to online security, as attackers increasingly target users through social platforms and mobile applications. The widespread use of these technologies has created new vulnerabilities, as phishing schemes exploit both personal data and trust-based interactions. This paper proposes a novel security system designed to protect social network users from unauthorized access by leveraging advanced authentication mechanisms, real-time monitoring, and proactive countermeasures. The system integrates features such as passwor
APA, Harvard, Vancouver, ISO, and other styles
8

Saini, Anil, Manoj Singh Gaur, and Vijay Laxmi. "A Taxonomy of Browser Attacks." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch019.

Full text
Abstract:
Browser attacks over the years have stormed the Internet world with so many malicious activities. They provide unauthorized access and damage or disrupt user information within or outside the browser. This chapter focuses on the complete attack actions adopted by an attacker while crafting an attack on Web browser. The knowledge gained from the attacker's actions can be framed into a suitable taxonomy, which can then be used as a framework for examining the browser attack footprints, vulnerability in browser design, and helps one to understand the characteristics and nature of an attacker. Thi
APA, Harvard, Vancouver, ISO, and other styles
9

Chitadze, Nika. "Basic Principles of Information and Cyber Security." In Analyzing New Forms of Social Disorders in Modern Virtual Environments. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-5760-3.ch009.

Full text
Abstract:
Cybercrime is any illegal act committed using a computer system in cyberspace. Along with rapid technological progress in the 21st century, the number of cyber risks is increasing significantly. In modern times, quite common cases of cybercrime are online fraud, unauthorized access to a computer system, online child pornography, unauthorized use of computer systems and data, etc. As for information security, it includes the following components: 1) protection of information, services, systems, and telecommunications in any form and 2) protection (maintenance) of confidentiality, integrity (int
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Srishti, and Yogita Gigras. "A Survey." In Detecting and Mitigating Robotic Cyber Security Risks. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2154-9.ch006.

Full text
Abstract:
The cloud computing field is an emerging field and continuously growing at a fast pace. The data stored on the public cloud is not safe as the attackers can hack or gain unauthorized access to the data and can modify its contents to harm the organizations and the users as well. They pose security threats and risks at various levels. These threats need to be removed and security actions need to be taken at right time to protect the cloud data and resources from being misused by the attackers. Some of the security measures are summarized in order to protect the data.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Unauthorized actions"

1

Byl, M. F., M. B. Frish, R. T. Wainner, et al. "Pipeline Evaluation Network for Protection from Third-Party Intrusion." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11307.

Full text
Abstract:
Abstract Third-party intrusion, i.e. unauthorized excavation that accidentally strikes and damages or ruptures a pipeline, is a primary cause of loss to gas pipeline integrity. The NYSEARCH/Northeast Gas Association, American Innovations and Physical Sciences Inc. are jointly developing an autonomous distributed sensor alarm and notification system that provides pipeline operators with a real-time warning of unauthorized right-of-way encroachment and excavation activity near a pipeline. Early warning provides pipeline owners the ability to respond to an intrusion in time to prevent pipeline da
APA, Harvard, Vancouver, ISO, and other styles
2

Abdenov, Amirsa Zh, Yuri A. Kotov, and Victor A. Trushin. "Analysis and Classification of Potentially Unauthorized Actions to Information in Automatic and Automated Systems Resource Areas." In 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE). IEEE, 2018. http://dx.doi.org/10.1109/apeie.2018.8545518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Sophia, Jaap Bouman, and Damodaran Raghu. "Flange Quality Investigation to Prevent Brittle Fracture." In ASME 2017 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/pvp2017-66179.

Full text
Abstract:
A quality investigation was done on ASTM A350 flanges after discovery of unauthorized repairs for a deepwater project in the Gulf of Mexico. The investigation also revealed low Charpy impact values which can potentially cause brittle fracture at low service temperatures. Therefore, additional flanges from the same supply chain (various manufacturers) were quarantined and tested by the destructive Charpy impact method as well as by the non-destructive Automated Ball Indentation (ABI) method. Based on the results of the quarantined flanges, the remaining flanges that were already installed were
APA, Harvard, Vancouver, ISO, and other styles
4

Walusiak, Lukasz, Natalia Rylko, and Maciej Zdanski. "Analyze the encryption and decryption methods using the catalan sequence." In 38th ECMS International Conference on Modelling and Simulation. ECMS, 2024. http://dx.doi.org/10.7148/2024-0286.

Full text
Abstract:
This paper concerns the project and implementation of a cryptographic tool based on the Catalan sequence. It explains the beginnings of cryptography and how people’s approach to transmitting messages has changed over the years. With the development of society, the need to conceal the meaning of messages from unauthorized individuals has grown. The paper addresses the issue of symmetric affine cipher, its complexity, and the secure transmission of the secret key through individuals using the tool. The key can be entered by the user-sender or generated automatically using the Catalan sequence. I
APA, Harvard, Vancouver, ISO, and other styles
5

Mikulski, Dariusz, and Steven R. Russo. "MICROTOKEN EXCHANGE (MTE) FOR SECURING DIGITAL DATA FROM CYBER WARFARE ATTACKS." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3681.

Full text
Abstract:
&lt;title&gt;Abstract&lt;/title&gt; &lt;p&gt;New technological advancements call for innovative cybersecurity assurance measures in preventing increased vulnerabilities through cyber-attacks and cyber warfare. Current encryption processes are no longer failsafe in secure data management architectures, especially with accessibility to Advanced Encryption Algorithms (AES). Through new technological advancements, including informational technology architectures and autonomous vehicle implementation, it is imperative to provide new paradigms of security against cybersecurity breaches. In all realm
APA, Harvard, Vancouver, ISO, and other styles
6

Ponomarev, Andrey, Oleg Serebrennikov, Gleb Guglya, Oleg Korotkevich, and Andrey Proletarskiy. "THE USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES TO IMPLEMENT A MULTI-FACTOR ANALYSIS OF A STUDENT'S ACTIONS DURING AN EXAM." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-143.

Full text
Abstract:
Conducting an exam after the course is always a very complicated process, the main problem of which is the credibility of the student's knowledge evaluation. In this article, we will discuss the problem that affects the assessment most critically - cheating. The elimination of this factor will help to increase the quality of knowledge evaluation, and later the quality of the curriculum itself. It is difficult for one teacher to maintain the procedure of examination during special verification activities. The more students taking the exam at the same time, the more difficult it is to control th
APA, Harvard, Vancouver, ISO, and other styles
7

Andrade, César, Paulo Henrique Gonçalves, Hendrio Bragança, and Eduardo Souto. "Autenticação Contínua de Usuários Utilizando Contadores de Desempenho do Sistema Operacional." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13979.

Full text
Abstract:
Computer authentication systems based on login and password have been vulnerable to the action of unauthorized users. Currently, authentication techniques based on behavioral models predominantly use information extracted from mouse and/or keyboard to authenticate users. Operating system performance indicators can be used as an alternative. This work proposes an approach using data from performance indicators such as source data, CNN/LSTM networks for data classification, and reliability-based assessment methodology for the purpose of authenticating the user on an ongoing basis. The results ob
APA, Harvard, Vancouver, ISO, and other styles
8

C, Saranya, Sanjana S, Monika G S, Meghana Reddy M G, and Monika G K. "Guarding Against the Invisible Threats: Insights into Cybersecurity Risks and Solutions." In International Conference on Recent Trends in Computing & Communication Technologies (ICRCCT’2K24). International Journal of Advanced Trends in Engineering and Management, 2024. http://dx.doi.org/10.59544/uacm2592/icrcct24p56.

Full text
Abstract:
Rising threats from cybercriminals in an increasingly connected world require critical examination in four areas: fake Apple charging cables, the Dark Web, One Time Password (OTP) use, and Bluetooth security have been assessed. First, fake original charging cables with Wi-Fi units integrated inside the cable can be used to perform MITM attacks that cause unauthorized access to compromised connected devices, interception of transmitted data, injection of malware to corrupt devices, and subsequent listening to the data streams of the connected gadgets. However, lacking stringent security measure
APA, Harvard, Vancouver, ISO, and other styles
9

Берберова, Мария, Mariya Berberova, Антон Обоймов, et al. "Risk-informed Security System. The Use of Surveillance Cameras for the Particularly Hazardous Facilities Safety." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-2-321-325.

Full text
Abstract:
In the context of a difficult criminal situation in the world, taking into account the globalization of world development processes, international political and economic relations, which pose new risks for the development of the individual, society and the state. In the Russian Federation, as well as throughout the world, threats to the safety of industrial facilities are steadily increasing. Moreover, in connection with the improvement of organization and the expansion of the technical equipment of potential violators (terrorists, extremists, etc.), the improvement of methods and methods of i
APA, Harvard, Vancouver, ISO, and other styles
10

Ćurčić, Milica, Marija Janković, and Slavko Dimović. "Possibility of Insider Threat to Nuclear Power Plants." In International Conference IcETRAN. ETRAN Society, Academic Mind, Belgrade, 2024. https://doi.org/10.69994/11ic24030.

Full text
Abstract:
Nuclear power plants represent critical infrastructure assets essential for global energy production, embodying both immense potential for state and significant risks. This paper examines the possibility of insider threats within nuclear power plants, clarifying the complex interplay among human factors, security measures, and technical vulnerabilities. By synthesizing existing literature, this study explains the multifaceted nature of insider threats, encompassing malicious actions by employees, contractors, or other trusted entities operating within the facility. The analysis delves into var
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Unauthorized actions"

1

Harrington, Matthew, Amanda Lanik, and Chad Hults. Paleontological resource monitoring at Kaguyak Point, Katmai National Park and Preserve. National Park Service, 2023. http://dx.doi.org/10.36967/2298794.

Full text
Abstract:
Fieldwork was conducted during the summers of 2017 and 2021 to assess the risk of unauthorized collection and erosion to ammonite fossils located at Kaguyak Point in Katmai National Park and Preserve. Past reports indicated that unauthorized fossil collecting may have occurred at Kaguyak Point. Our monitoring found no signs of unauthorized collecting during the summer of 2021 and our findings also indicate that it is unlikely that collecting occurred between 2017 and 2021. If unauthorized fossil collecting occurred in the past at Kaguyak Point, it appears to have now stopped. The best way to p
APA, Harvard, Vancouver, ISO, and other styles
2

Maletta, Giovanna, and Lauriane Héau. Funding Arms Transfers through the European Peace Facility: Preventing Risks of Diversion and Misuse. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/oelz9733.

Full text
Abstract:
Since it was established in March 2021, the European Peace Facility (EPF) has become the main source of funding for European Union (EU) external actions in the field of crisis management and conflict prevention with defence and military implications. These include initiatives such as EU military missions, support to military peace operations led by other actors and assistance to strengthen third states’ military capacities. In addition, through the EPF, EU security assistance can also fund, for the first time, the supply of lethal military equipment and, thus, weapons. Arms transfers to countr
APA, Harvard, Vancouver, ISO, and other styles
3

Fedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzsp5617.

Full text
Abstract:
The attacks on nuclear installations in Ukraine by the Russian military in 2022 were unprecedented. Nuclear security aims at prevention, detection and response to malicious or unauthorized acts by non-state actors, not the armed forces of a state. However, an international armed conflict creates new circumstances in which a national nuclear security regime must operate. In March 2022 the director general of the International Atomic Energy Agency (IAEA) highlighted ‘seven indispensable pillars of nuclear safety and security’ in extraordinary circumstances. There are three further areas in which
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!