Academic literature on the topic 'Unauthorized actions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorized actions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Unauthorized actions"
Voinik, Anna A., and Margarita R. Snegur. "Motives for participation of youth in unauthorized protest actions." Vestnik of Saint Petersburg University. Sociology 16, no. 3 (2023): 259–77. http://dx.doi.org/10.21638/spbu12.2023.302.
Full textРабенко, Татьяна Геннадьевна, and Анастасия Олеговна Терентьева. "The Dissemination Model of Unauthorized Information in the Virtual Communication Space (Based on the Material of the VKontakte Social Network)." Philology & Human, no. 1 (March 21, 2025): 7–26. https://doi.org/10.14258/filichel(2025)1-01.
Full textAkhramovych, Volodymyr, and Vadym Akhramovych. "Quantitative assessment of the probability of protective system functioning without unlawful actions." Collection "Information Technology and Security" 12, no. 2 (2024): 257–67. https://doi.org/10.20535/2411-1031.2024.12.2.315745.
Full textKrasnova, Anzhela, and Tat'yana Gribok. "TERRORISM AT DANGEROUS PRODUCTION FACILITIES. MEASURES OF PROTECTION AGAINST TERRORISM." Scientific Papers Collection of the Angarsk State Technical University 2020, no. 1 (2020): 338–43. http://dx.doi.org/10.36629/2686-7788-2020-1-338-343.
Full textPopov E. V., Popov E. V., Panteleev V. A. Panteleev V. A., Segal M. D. Segal M. D., Gavrilov S. L. Gavrilov S. L., Ovsynik A. I. Ovsynik A. I., and Lysenko I. A. Lysenko I. A. "THE RADIOLOGICAL CONSEQUENCES OF UNAUTHORIZED ACTIONS WITH RADIOISOTOPE SOURCES OF IONIZING RADIATION." Technology of technosphere safety 85 (2019): 115–26. http://dx.doi.org/10.25257/tts.2019.3.85.115-126.
Full textKhanov, T. A., and A. T. Sadvakasova. "COMPENSATION FOR DAMAGE CAUSED BY THE PRODUCTION OF ILLEGAL UNAUTHORIZED INVESTIGATIVE ACTIONS." Russian-Asian Legal Journal, no. 3 (September 28, 2020): 37–42. http://dx.doi.org/10.14258/ralj(2020)3.8.
Full textKudryavtseva, Vera, and Natalia Vasileva. "On some problems of the legal regime of unauthorized construction objects." MATEC Web of Conferences 212 (2018): 09002. http://dx.doi.org/10.1051/matecconf/201821209002.
Full textVarma, Jahith Sai Krishna. "EagleAI: AI Powered Real Time Restricted Area Surveillance." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3499–506. https://doi.org/10.22214/ijraset.2025.70612.
Full textDeen-Racsmány, Zsuzsanna. "A Redistribution of Authority Between the UN and Regional Organizations in the Field of the Maintenance of Peace and Security?" Leiden Journal of International Law 13, no. 2 (2000): 297–331. http://dx.doi.org/10.1017/s0922156500000212.
Full textKrismanto, Rachmat Satyo, and Luluk Lusiati Cahyarini. "The Legal Review Regarding Copyright Protection of Songs from Unauthorized Song Cover Actions." Jurnal Daulat Hukum 5, no. 3 (2022): 164. http://dx.doi.org/10.30659/jdh.v5i3.23078.
Full textDissertations / Theses on the topic "Unauthorized actions"
Балакін, Сергій В'ячеславович. "Методи та засоби підвищення достовірності ідентифікації несанкціонованих дій та атак в комп’ютерній мережі". Thesis, Національний авіаційний університет, 2018. http://er.nau.edu.ua/handle/NAU/37400.
Full textEdlander, Timmie. "Akademiskt fusk : En kvalitativ studie om hur studenter motiverar handlingar som har föranlett disciplinära åtgärder." Thesis, Karlstads universitet, Institutionen för sociala och psykologiska studier, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-57027.
Full textBarbero, Maria Victoria. "DACA, Immigrant Youth, and Education: An Analysis of Elite Narratives on Nationhood, Citizenship, and Belonging in the U.S." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405518424.
Full textChiou, Huey-Ling, and 邱惠玲. "The Scope of Disciplinary Measures for the Unauthorized Actions Conducted Illegally by Civil Servants." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/20465914841432475139.
Full textBooks on the topic "Unauthorized actions"
Villa, Brian Loring. Unauthorized action: Mountbatten and the Dieppe raid. 2nd ed. Oxford University Press, 1990.
Find full textVilla, Brian Loring. Unauthorized action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.
Find full textVilla, Brian Loring. Unauthorized Action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.
Find full textVilla, Brian Loring. Unauthorized action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.
Find full textLtd, Publications International, ed. Action Strategies for Mortal Kombat: An Unauthorized Players' Guide. Publications International, 1993.
Find full textNick, Roberts. Bomberman 64: Unauthorized Game Secrets. Prima Publishing, Prima Games, 1997.
Find full textAnthony, James. Blast Corps: Unauthorized Game Secrets. Prima Publishing, Prima Games, 1997.
Find full textService, United States Forest. National recreation residence review and action plan. Washington Office, Lands, 1993.
Find full textJohn, Marshall. GI Joe and other backyard heroes: An unauthorized guide. Schiffer Pub., 1997.
Find full textBook chapters on the topic "Unauthorized actions"
Sgambati, Domenico, Erica Moura, Ala Eddine Said, et al. "Monitoraggio, conservazione e informazione nella Baia Di Ieranto: un modello circolare per la gestione delle Aree Marine Protette." In Proceedings e report. Firenze University Press, 2020. http://dx.doi.org/10.36253/978-88-5518-147-1.60.
Full textKosar, Kosar, Mohamed Fauzi Packeer Mohamed, Naeemul Islam, Rabiul Hasan Tarek, and Md Fahim Shahrier Khan. "GSM Based Bank Vault Surveillance Process with Finger Print and Password and Preventative Action Against Unauthorized Person." In Lecture Notes in Electrical Engineering. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8129-5_64.
Full textMei, Rui, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu, and Weiping Wen. "Considerations on Evaluation of Practical Cloud Data Protection." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_4.
Full textChristensen, Anne L., Jane Cote, and Claire K. Latham. "Unauthorized electronic access: Students’ ethics, attitudes, and actions." In Advances in Accounting Education. Emerald Group Publishing Limited, 2010. http://dx.doi.org/10.1108/s1085-4622(2010)0000011014.
Full textBarr, Warren, and John Picton. "36. Limitation of action." In Pearce & Stevens' Trusts and Equitable Obligations. Oxford University Press, 2022. http://dx.doi.org/10.1093/he/9780198867494.003.0036.
Full textMakhutov Nikolay A. and Gadenin Mikhail M. "Comparative Methods For The Assessment Of Threats Of Terrorist and Unauthorized Actions." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2012. https://doi.org/10.3233/978-1-61499-131-1-1.
Full textBhimavarapu, Usharani. "Defending Against Phishing Attacks on Social Media." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch005.
Full textSaini, Anil, Manoj Singh Gaur, and Vijay Laxmi. "A Taxonomy of Browser Attacks." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch019.
Full textChitadze, Nika. "Basic Principles of Information and Cyber Security." In Analyzing New Forms of Social Disorders in Modern Virtual Environments. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-5760-3.ch009.
Full textSharma, Srishti, and Yogita Gigras. "A Survey." In Detecting and Mitigating Robotic Cyber Security Risks. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2154-9.ch006.
Full textConference papers on the topic "Unauthorized actions"
Byl, M. F., M. B. Frish, R. T. Wainner, et al. "Pipeline Evaluation Network for Protection from Third-Party Intrusion." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11307.
Full textAbdenov, Amirsa Zh, Yuri A. Kotov, and Victor A. Trushin. "Analysis and Classification of Potentially Unauthorized Actions to Information in Automatic and Automated Systems Resource Areas." In 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE). IEEE, 2018. http://dx.doi.org/10.1109/apeie.2018.8545518.
Full textZhu, Sophia, Jaap Bouman, and Damodaran Raghu. "Flange Quality Investigation to Prevent Brittle Fracture." In ASME 2017 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/pvp2017-66179.
Full textWalusiak, Lukasz, Natalia Rylko, and Maciej Zdanski. "Analyze the encryption and decryption methods using the catalan sequence." In 38th ECMS International Conference on Modelling and Simulation. ECMS, 2024. http://dx.doi.org/10.7148/2024-0286.
Full textMikulski, Dariusz, and Steven R. Russo. "MICROTOKEN EXCHANGE (MTE) FOR SECURING DIGITAL DATA FROM CYBER WARFARE ATTACKS." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3681.
Full textPonomarev, Andrey, Oleg Serebrennikov, Gleb Guglya, Oleg Korotkevich, and Andrey Proletarskiy. "THE USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES TO IMPLEMENT A MULTI-FACTOR ANALYSIS OF A STUDENT'S ACTIONS DURING AN EXAM." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-143.
Full textAndrade, César, Paulo Henrique Gonçalves, Hendrio Bragança, and Eduardo Souto. "Autenticação Contínua de Usuários Utilizando Contadores de Desempenho do Sistema Operacional." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13979.
Full textC, Saranya, Sanjana S, Monika G S, Meghana Reddy M G, and Monika G K. "Guarding Against the Invisible Threats: Insights into Cybersecurity Risks and Solutions." In International Conference on Recent Trends in Computing & Communication Technologies (ICRCCT’2K24). International Journal of Advanced Trends in Engineering and Management, 2024. http://dx.doi.org/10.59544/uacm2592/icrcct24p56.
Full textБерберова, Мария, Mariya Berberova, Антон Обоймов, et al. "Risk-informed Security System. The Use of Surveillance Cameras for the Particularly Hazardous Facilities Safety." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-2-321-325.
Full textĆurčić, Milica, Marija Janković, and Slavko Dimović. "Possibility of Insider Threat to Nuclear Power Plants." In International Conference IcETRAN. ETRAN Society, Academic Mind, Belgrade, 2024. https://doi.org/10.69994/11ic24030.
Full textReports on the topic "Unauthorized actions"
Harrington, Matthew, Amanda Lanik, and Chad Hults. Paleontological resource monitoring at Kaguyak Point, Katmai National Park and Preserve. National Park Service, 2023. http://dx.doi.org/10.36967/2298794.
Full textMaletta, Giovanna, and Lauriane Héau. Funding Arms Transfers through the European Peace Facility: Preventing Risks of Diversion and Misuse. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/oelz9733.
Full textFedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzsp5617.
Full text