Academic literature on the topic 'Unauthorized interference'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorized interference.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Unauthorized interference"
Streltsov, Lev. "Unauthorized Interference with Computers and Networks in Ukraine." Zeitschrift für die gesamte Strafrechtswissenschaft 130, no. 2 (2018): 605–41. http://dx.doi.org/10.1515/zstw-2018-0024.
Full textSerhiienko, S. P., V. G. Krizhanovski, D. V. Chernov, and L. V. Zahoruiko. "Effective modes of operation of radio-bombing devices for covert information gathering in the field of noise interference." Radiotekhnika, no. 205 (July 2, 2021): 169–74. http://dx.doi.org/10.30837/rt.2021.2.205.18.
Full textOleynikov, A. N., V. A. Pulavsky, and I. N. Chigirev. "Improving the efficiency of methods and means for suppressing unauthorized speech recording." Radiotekhnika, no. 209 (June 24, 2022): 156–61. http://dx.doi.org/10.30837/rt.2022.2.209.15.
Full textHu, Yingdong, Shibing Zhang, Jue Wang, Ye Li, and Lili Guo. "Wireless Surveillance With Interference Exploitation in Unauthorized Underlaid D2D Networks." IEEE Access 8 (2020): 123151–64. http://dx.doi.org/10.1109/access.2020.3007448.
Full textPrajapati, Mrs Kalpana V. "Thief Detection and Prevention: Home security using IoT (Internet of Things)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 271–75. http://dx.doi.org/10.22214/ijraset.2021.38750.
Full textChen, Peng, Shihao Yan, Helge Janicke, et al. "A Survey on Unauthorized UAV Threats to Smart Farming." Drones 9, no. 4 (2025): 251. https://doi.org/10.3390/drones9040251.
Full textDŹWIAREK, Marek. "IT Protection of Safety-Related Machine Control Systems in Industry 4.0." Problems of Mechatronics Armament Aviation Safety Engineering 13, no. 4 (2022): 137–46. http://dx.doi.org/10.5604/01.3001.0016.1465.
Full textKuryltsiv, Roman, and Nadiia Kryshenyk. "Administration of the land cadastre system under conditions of martial law in Ukraine." Acta Scientiarum Polonorum Administratio Locorum 21, no. 4 (2022): 539–48. http://dx.doi.org/10.31648/aspal.8140.
Full textBakhtiiarov, Denys, Oleksandr Lavrynenko, Nataliia Lishchynovska, Ivan Basiuk, and Tetiana Prykhodko. "METHODS FOR ASSESSMENT AND FORECASTING OF ELECTROMAGNETIC RADIATION LEVELS IN URBAN ENVIRONMENTS." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, no. 1 (2021): 24–27. http://dx.doi.org/10.35784/iapgos.2430.
Full textSoni, Sujal, Mayank Paliwal, Rishabh Dangi, and Dharmendra Trivedi. "SIGNAL SEEKER: Safeguarding wireless communication with lora tech." International Journal of Technical Research & Science 9, Spl (2024): 27–35. http://dx.doi.org/10.30780/specialissue-iset-2024/045.
Full textBooks on the topic "Unauthorized interference"
Commission, Ghana Law Reform, ed. Report of seminar on unauthorised interference with computers-- computer crime law, 1988: Held on 17th and 18th May, 1988, at the Kwame Nkrumah Conference Hall, State House, Accra. The Commission, 1988.
Find full textEileen, Denza. Inviolability of the Archives. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0022.
Full textBook chapters on the topic "Unauthorized interference"
Sun, Degang, Yue Cui, Siye Wang, and Yanfang Zhang. "On Eliminating Blocking Interference of RFID Unauthorized Reader Detection." In Wireless Algorithms, Systems, and Applications. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19208-1_49.
Full textKedziora, Michal, Aleksander Gorka, Aleksander Marianski, and Ireneusz Jozwiak. "Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain." In Data-Centric Business and Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34706-2_10.
Full textMaurushat, Alana. "Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions." In SpringerBriefs in Cybersecurity. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6_4.
Full textVan de Velde, James. "When Does Election Interference via Cyberspace Violate Sovereignty?" In Defending Democracies. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197556979.003.0008.
Full textGnatyuk Sergiy. "Critical Aviation Information Systems Cybersecurity." In NATO Science for Peace and Security Series - D: Information and Communication Security. IOS Press, 2016. https://doi.org/10.3233/978-1-61499-716-0-308.
Full textNidhyananthan, S. Selva, Joe Virgin A., and Shantha Selva Kumari R. "Wireless Enhanced Security Based on Speech Recognition." In Handbook of Research on Information Security in Biomedical Signal Processing. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5152-2.ch012.
Full textSurapaneni, Praneetha, Sailaja Chigurupati, and Sriramulu Bojjagani. "BITS-AV Biometric Integration for Secure Transport Systems in Autonomous Vehicles." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8014-7.ch018.
Full textChen, Lei, and Chung-Wei Lee. "Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks." In Wireless Technologies. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch304.
Full textReznikov Dmitry O. "Technological and Intelligent Terrorism: Specific Features and Assessment Approaches." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2012. https://doi.org/10.3233/978-1-61499-131-1-45.
Full textScott, Helen. "Property | Unjust Enrichment." In Borderlines in Private Law. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/9780191995200.003.0016.
Full textConference papers on the topic "Unauthorized interference"
McKee, Forrest, and David Noever. "Safeguarding Voice Privacy: Harnessing Near-Ultrasonic Interference to Protect Against Unauthorized Audio Recording." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141112.
Full textOleynikov, Anatoliy, Oleksii Bilotserkivets, and Volodymyr Pulavskiy. "FORMATION OF ACOUSTIC INTERFERENCE BASED ON A MICROCONTROLLER FOR THE SUPPRESSOR OF UNAUTHORIZED SPEECH RECORDING." In Theoretical and Applied Aspects of Device Development on Microcontrollers and FPGAs 2022. NURE, 2022. http://dx.doi.org/10.35598/mcfpga.2022.015.
Full textDryzhakova, D. Y. "Foreign experience of criminal liability for unauthorized interference with information (automated), electronic, communication, information and communication systems, electronic communication networks." In SCIENTIFIC INNOVATIONS IN LAW AMIDST THE IMPACT OF THE RUSSIAN-UKRAINIAN WAR ON THE LEGAL SYSTEM. Baltija Publishing, 2024. http://dx.doi.org/10.30525/978-9934-26-409-2-24.
Full textOka, Ryushun, Jumpei Tahara, Ichiro Koshijima, and Kenji Watanabe. "Blocking System for Autonomous Flight Drones." In 16th International Conference on Applied Human Factors and Ergonomics (AHFE 2025). AHFE International, 2025. https://doi.org/10.54941/ahfe1006371.
Full textDryzhakova, D. Yu. "Advanced achievements in the field of legal regulation of unauthorized interference in computer networks: the view of domestic and foreign scientists." In ADVANCES IN LAW: THE VIEW OF DOMESTIC AND FOREIGN SCHOLARS. Baltija Publishing, 2024. http://dx.doi.org/10.30525/978-9934-26-493-1-50.
Full text