Journal articles on the topic 'Unauthorized actions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Unauthorized actions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Voinik, Anna A., and Margarita R. Snegur. "Motives for participation of youth in unauthorized protest actions." Vestnik of Saint Petersburg University. Sociology 16, no. 3 (2023): 259–77. http://dx.doi.org/10.21638/spbu12.2023.302.
Full textРабенко, Татьяна Геннадьевна, and Анастасия Олеговна Терентьева. "The Dissemination Model of Unauthorized Information in the Virtual Communication Space (Based on the Material of the VKontakte Social Network)." Philology & Human, no. 1 (March 21, 2025): 7–26. https://doi.org/10.14258/filichel(2025)1-01.
Full textAkhramovych, Volodymyr, and Vadym Akhramovych. "Quantitative assessment of the probability of protective system functioning without unlawful actions." Collection "Information Technology and Security" 12, no. 2 (2024): 257–67. https://doi.org/10.20535/2411-1031.2024.12.2.315745.
Full textKrasnova, Anzhela, and Tat'yana Gribok. "TERRORISM AT DANGEROUS PRODUCTION FACILITIES. MEASURES OF PROTECTION AGAINST TERRORISM." Scientific Papers Collection of the Angarsk State Technical University 2020, no. 1 (2020): 338–43. http://dx.doi.org/10.36629/2686-7788-2020-1-338-343.
Full textPopov E. V., Popov E. V., Panteleev V. A. Panteleev V. A., Segal M. D. Segal M. D., Gavrilov S. L. Gavrilov S. L., Ovsynik A. I. Ovsynik A. I., and Lysenko I. A. Lysenko I. A. "THE RADIOLOGICAL CONSEQUENCES OF UNAUTHORIZED ACTIONS WITH RADIOISOTOPE SOURCES OF IONIZING RADIATION." Technology of technosphere safety 85 (2019): 115–26. http://dx.doi.org/10.25257/tts.2019.3.85.115-126.
Full textKhanov, T. A., and A. T. Sadvakasova. "COMPENSATION FOR DAMAGE CAUSED BY THE PRODUCTION OF ILLEGAL UNAUTHORIZED INVESTIGATIVE ACTIONS." Russian-Asian Legal Journal, no. 3 (September 28, 2020): 37–42. http://dx.doi.org/10.14258/ralj(2020)3.8.
Full textKudryavtseva, Vera, and Natalia Vasileva. "On some problems of the legal regime of unauthorized construction objects." MATEC Web of Conferences 212 (2018): 09002. http://dx.doi.org/10.1051/matecconf/201821209002.
Full textVarma, Jahith Sai Krishna. "EagleAI: AI Powered Real Time Restricted Area Surveillance." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3499–506. https://doi.org/10.22214/ijraset.2025.70612.
Full textDeen-Racsmány, Zsuzsanna. "A Redistribution of Authority Between the UN and Regional Organizations in the Field of the Maintenance of Peace and Security?" Leiden Journal of International Law 13, no. 2 (2000): 297–331. http://dx.doi.org/10.1017/s0922156500000212.
Full textKrismanto, Rachmat Satyo, and Luluk Lusiati Cahyarini. "The Legal Review Regarding Copyright Protection of Songs from Unauthorized Song Cover Actions." Jurnal Daulat Hukum 5, no. 3 (2022): 164. http://dx.doi.org/10.30659/jdh.v5i3.23078.
Full textMasterov, S. V., V. B. Glebov, А. А. Krasnoborodko, and А. B. Bateev. "CONCEPTUAL APPROACH TO ANALYSIS OF THE RISK OF NUCLEAR MATERIALS USE FOR NON-ENERGY PURPOSES." Strategic decisions and risk management, no. 5 (October 26, 2014): 92–98. http://dx.doi.org/10.17747/2078-8886-2012-5-92-98.
Full textРомановский, М. В., and А. И. Солдатов. "ACOUSTIC SIGNALS PROCESSING IN UNAUTHORIZED OPERATION ON THE MAIN PIPELINE." Proceedings in Cybernetics 23, no. 1 (2024): 60–67. http://dx.doi.org/10.35266/1999-7604-2024-1-8.
Full textLototskyi, Mykhailo. "«Other» persons as participants in secret investigators (detective) actions (criminal control)." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi 1, no. 15(27) (2023): 257–63. http://dx.doi.org/10.33098/2078-6670.2023.15.27.1.257-263.
Full textLototskyi, M., and L. Dzundza. "«Other» persons as participants in secret investigators (detective) actions (criminal control)." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi, no. 16(28) (December 13, 2023): 126–32. http://dx.doi.org/10.33098/2078-6670.2023.16.28.126-132.
Full textBeitz, Charles R. "Covert Intervention as a Moral Problem." Ethics & International Affairs 3 (March 1989): 45–60. http://dx.doi.org/10.1111/j.1747-7093.1989.tb00211.x.
Full textAitkozha, Z., and D. Nazyrova. "ECONOMIC CONSEQUENCES OF UNAUTHORIZED LAND CAPTURE AND ILLEGAL CONSTRUCTION." Education. Quality assurance, no. 1 (March 15, 2023): 59–64. http://dx.doi.org/10.58319/26170493_2023_1_59.
Full textGurevich, Vladimir. "Susceptibility of modern relay protection: Will protection from cyber attacks help?" Serbian Journal of Electrical Engineering 11, no. 2 (2014): 233–41. http://dx.doi.org/10.2298/sjee131026019g.
Full textKurman, O. V. "PROBLEM ISSUES OF THE SITUATION OF UNAUTHORIZED ACTIONS WITH INFORMATION PROCESSED IN ELECTRONIC VIEW." Juridical scientific and electronic journal 5 (2019): 310–12. http://dx.doi.org/10.32782/2524-0374/2019-5/74.
Full textYahel, Havatzelet. "The Conflict Over Land Ownership and Unauthorized Construction in the Negev." Contemporary Review of the Middle East 6, no. 3-4 (2019): 352–69. http://dx.doi.org/10.1177/2347798919872836.
Full textMel'nikova, Ekaterina, and Andrey Rodionov. "Issues of qualification of unauthorized access to critical information infrastructure facilities." Legal Science and Practice: Journal of Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia 2024, no. 3 (2024): 208–15. http://dx.doi.org/10.36511/2078-5356-2024-3-208-215.
Full textDrea, John, and James T. Kenny. "An examination of ethical standards and behaviors in transportation brokerage." Journal of Transportation Management 25, no. 1 (2014): 37–54. http://dx.doi.org/10.22237/jotm/1396310640.
Full textГордейчук, В. В. "Протиправні дії щодо торговельних марок як об'єктивна сторона порушення виключних прав". Форум права, № 2 (30 березня 2018): 20–26. https://doi.org/10.5281/zenodo.1244513.
Full textFelicitas Citra Permatahati Nainggolan and Simona Bustani. "- PENGGUNAAN LAGU “AKU MAU” PADA PRODUK MAINAN BONEKA “PUTRI ANISA HIJAB PERFUMED DOLL”." Reformasi Hukum Trisakti 6, no. 3 (2024): 928–38. http://dx.doi.org/10.25105/refor.v6i3.20218.
Full textRakhmatullaev, M. A., and Sh B. Normatov. "PROTECTION OF SCIENTIFIC AND EDUCATIONAL RESOURCES IN INFORMATION AND LIBRARY SYSTEMS." Scholarly Research and Information 2, no. 2 (2019): 121–28. http://dx.doi.org/10.24108/2658-3143-2019-2-2-121-128.
Full textPałęga, Michał, and Marcin Knapiński. "Assessment of Employees Level of Awareness in the Aspect of Information Security." System Safety: Human - Technical Facility - Environment 1, no. 1 (2019): 132–40. http://dx.doi.org/10.2478/czoto-2019-0017.
Full textDanial, Anas, Mohd Fadzil Abdul Kadir, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed, Nazirah Abdul Hamid, and Siti Dhalila Mohd Satar. "PASSWORD MANAGER SECURITY USING HONEY ENCRYPTION ALGORITHM AND HONEYPOT TECHNIQUE." Malaysian Journal of Computing and Applied Mathematics 6, no. 2 (2023): 1–10. http://dx.doi.org/10.37231/myjcam.2023.6.2.87.
Full textPohoretskyi, M. M. "GUARANTEES OF THE RIGHTS AND FREEDOMS OF THE PERSON DURING THE CONDUCT OF SECRET INVESTIGATORS (RESEARCH) ACTIONS AND OPERATIVE AND INVESTIGATIVE MEASURES IN THE PRE-JUDICIAL INVESTIGATION UNDER THE CONDITIONS OF THE STATE OF MARTIAL, STATE OF EMERGENCY OR IN THE AREA OF ANTI-TERRORIST OPERATION (ATO)." Herald of criminal justice, no. 1-2 (2021): 99–117. http://dx.doi.org/10.17721/2413-5372.2021.1-2/99-117.
Full textTyshyk, Ivan. "IMPLEMENTATION OF DATABASE SECURITY BASED ON ORACLE AUDIT VAULT AND DATABASE FIREWALL." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 56–70. https://doi.org/10.28925/2663-4023.2024.26.666.
Full textRakhmatullaev, Marat, and Sherbek Normatov. "Protection of Scientific and Educational Resources in Information and Library Systems." Scholarly Research and Information 2, no. 2 (2019): 121–28. http://dx.doi.org/10.24108//2658-3143-2019-2-2-121-128.
Full textOliveira, José, Pedro Pinto, and Henrique Santos. "Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices." Journal of Sensor and Actuator Networks 10, no. 1 (2021): 19. http://dx.doi.org/10.3390/jsan10010019.
Full textPatil, Vishruta. "Multi-Factor Authentication Using Cryptography and Steganography." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 3207–9. http://dx.doi.org/10.22214/ijraset.2023.50818.
Full textYushkevych, O. G., and M. Yu Burdin. "Parental kidnapping as a form of abuse of parental rights." Bulletin of Kharkiv National University of Internal Affairs 105, no. 2 (Part 1) (2024): 74–83. http://dx.doi.org/10.32631/v.2024.2.07.
Full textAlexander, Bilenko, Kyrychenko Alexander, and Kaidalov Ruslan. "RESEARCH OF INFLUENCE BALLISTIC CHARACTERISTICS OF WEAPONS ON THE SHOOTING EFFICIENCY TAKING INTO ACCOUNT THE SAFETY OF THE SMALL ARM USE." TECHNOLOGY AUDIT AND PRODUCTION RESERVES 3, no. 1(53) (2020): 4–10. https://doi.org/10.15587/2706-5448.2020.205125.
Full textKaur, Gurvinder, Dr S. N. Panda, and Dr Dalvinder Singh Dhaliwal. "Model-Based Tool-Assistance for Packet-Filter Design and its Future." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (2014): 4053–57. http://dx.doi.org/10.24297/ijct.v13i1.2929.
Full textDampuru VNS Pavan Kumar, Kamal Kant Sharma, P. Rajender, and InumulaSatyanarayana. "Strengthening safety and regulatory framework in stone quarries (Minor Mineral) for Sustainable Infrastructure in India." International Journal of Science and Research Archive 15, no. 3 (2025): 1200–1204. https://doi.org/10.30574/ijsra.2025.15.3.1852.
Full textCHO, Geon. "The actual condition of casualties and the meaning of the records of rewards in the Japanese military during the March 1st Movement." Association for Korean Modern and Contemporary History 111 (December 31, 2024): 181–207. https://doi.org/10.29004/jkmch.2024.12.111.181.
Full textApanasenko, K. I. "COURT’S DEFENSE OF PERSON’S RIGHTS IN A SPHERE OF CITY PLANNING BY PUBLIC ASSOCIATIONS: DEFINITION OF A PROBLEM." Economics and Law, no. 4 (December 6, 2021): 56–67. http://dx.doi.org/10.15407/econlaw.2021.04.056.
Full textЛаркин, E. Larkin, Яшин, and S. Yashin. "Development of Synergetic Electromagnetic Equipment with Minimization of Unauthorized Pathogenic Radiation." Journal of New Medical Technologies. eJournal 8, no. 1 (2014): 1–9. http://dx.doi.org/10.12737/5944.
Full textTaharah, Amanah, Muhammad Arif Prasetyo, Amanda Okta Pamellia, and Akbar Reza Fauza. "Legal Review of the Use of Song Without Consent in Accordance with Law No. 28 of 2014." International Journal of Business, Law, and Education 6, no. 1 (2025): 739–45. https://doi.org/10.56442/ijble.v6i1.1097.
Full textRussetskiy, A. A. "PLACE OF FORENSIC SCIENCE IN THE CYBERTHREATS PREVENTION SYSTEM IN FIELD OF A UKRAINIAN INFORMATION SECURITY." Theory and Practice of Forensic Science and Criminalistics 18 (December 26, 2018): 263–71. http://dx.doi.org/10.32353/khrife.2018.29.
Full textChen, Yuhan. "Action Detection in Badminton Courts Using AVA Dataset and MMAction2 Architecture with Slow Fast Model." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 783–89. http://dx.doi.org/10.54097/qrh46274.
Full textAbirami, V., A. Mohana, V. Sarumathi, and Osvin Nancy V. Auxilia. "Enhancing Audit using Trace Logs Encrypted through User Secret Key Encryption Protocol in Multi Cloud Storage Management Application." Recent Trends in Cloud Computing and Web Engineering 2, no. 1 (2020): 1–4. https://doi.org/10.5281/zenodo.3719248.
Full textBen-Shaul, Daphna. "The Performative Return: Israeli and Palestinian Site-Specific Re-enactments." New Theatre Quarterly 32, no. 1 (2016): 31–48. http://dx.doi.org/10.1017/s0266464x15000846.
Full textPtaschenko, D. "UNAUTHORIZED CONSTRUCTION: SOME PROBLEMS OF CRIMINAL LIABILITY IN TERMS OF REGULATORY LEGISLATION OF UKRAINE AND REGULATIONS OF CRIMINAL OFFENSES." Bulletin of Taras Shevchenko National University of Kyiv. Legal Studies, no. 119 (2021): 74–78. http://dx.doi.org/10.17721/1728-2195/2021/4.119-4.
Full textCourpasson, David. "The Politics of Everyday." Organization Studies 38, no. 6 (2017): 843–59. http://dx.doi.org/10.1177/0170840617709310.
Full textPandito Malim Hasayangan Tanjung and Diana Tantri Cahyaningsih. "Analisis Bentuk Pelanggaran dan Upaya Penegakan Hak Orisinalitas Video Content Creator di Era Digital." Amandemen: Jurnal Ilmu pertahanan, Politik dan Hukum Indonesia 1, no. 2 (2024): 234–43. http://dx.doi.org/10.62383/amandemen.v1i2.161.
Full textReddy, Reddyvari Venkateswara, V. Gayathri, P. Sai Charan Reddy, and S. Raj Kumar. "Android Pattern Bypass using Microcontroller." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 962–68. http://dx.doi.org/10.22214/ijraset.2024.59940.
Full textAsaad, Renas Rajab. "Implementation of a Virus with Treatment and Protection Methods." ICONTECH INTERNATIONAL JOURNAL 4, no. 2 (2020): 28–34. http://dx.doi.org/10.46291/icontechvol4iss2pp28-34.
Full textIlyin, Ilya. "Dynamics and criminogenic potential of protest actions." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2023, no. 1 (2023): 75–86. http://dx.doi.org/10.35750/2071-8284-2023-1-75-86.
Full textChernyshova, Evgeniia L., Dmitry V. Ivanov, and Ekaterina I. Roschupkina. "Socio-psychological research of value orientations of students." Vestnik of Samara State Technical University Psychological and Pedagogical Sciences 19, no. 1 (2022): 125–40. http://dx.doi.org/10.17673/vsgtu-pps.2022.1.9.
Full text