Academic literature on the topic 'Unauthorized interference'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorized interference.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Unauthorized interference"

1

Streltsov, Lev. "Unauthorized Interference with Computers and Networks in Ukraine." Zeitschrift für die gesamte Strafrechtswissenschaft 130, no. 2 (2018): 605–41. http://dx.doi.org/10.1515/zstw-2018-0024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Serhiienko, S. P., V. G. Krizhanovski, D. V. Chernov, and L. V. Zahoruiko. "Effective modes of operation of radio-bombing devices for covert information gathering in the field of noise interference." Radiotekhnika, no. 205 (July 2, 2021): 169–74. http://dx.doi.org/10.30837/rt.2021.2.205.18.

Full text
Abstract:
The information security of modern society is in constant counteraction and constant improvement of technical means used for unauthorized information pickup, and technical means that prevent it. The paper analyzes examples of methods of applying noise interference to counteract the unauthorized pickup. The possibility of unauthorized pickup by passive radio devices using noise interferences is shown and analyzed using noise interferences, which are used to suppress the eavesdropping devices. The transfer of picked up information is possible both by radio wave and low-frequency channels using m
APA, Harvard, Vancouver, ISO, and other styles
3

Oleynikov, A. N., V. A. Pulavsky, and I. N. Chigirev. "Improving the efficiency of methods and means for suppressing unauthorized speech recording." Radiotekhnika, no. 209 (June 24, 2022): 156–61. http://dx.doi.org/10.30837/rt.2022.2.209.15.

Full text
Abstract:
The article analyzes the effectiveness of suppressing an unauthorized recording using acoustic, electromagnetic and ultrasonic countermeasures. It is shown that acoustic, electromagnetic and ultrasonic counteraction without a priori knowledge of the type of voice recorder does not provide guaranteed suppression of unauthorized speech recording. To increase the suppression efficiency, it is proposed to adapt the acoustic method, taking into account the characteristics of the propagation of acoustic vibrations in the air, the psychophysical perception of sounds by the human ear, and the use of a
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Yingdong, Shibing Zhang, Jue Wang, Ye Li, and Lili Guo. "Wireless Surveillance With Interference Exploitation in Unauthorized Underlaid D2D Networks." IEEE Access 8 (2020): 123151–64. http://dx.doi.org/10.1109/access.2020.3007448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prajapati, Mrs Kalpana V. "Thief Detection and Prevention: Home security using IoT (Internet of Things)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 271–75. http://dx.doi.org/10.22214/ijraset.2021.38750.

Full text
Abstract:
Abstract: Nowadays the crime has raged to a new height and providing security frames is the most important part of life. When it comes to word security first thing that comes in the mind is house. Providing security to the house gets much easier with IOT sensors. This project’s aim is to provide security to house without any human interference. This system also focuses on not only detection of some unauthorized access, but also prevents the house from unauthorized access using sensors. In the past technology the system just used to detect the unauthorized access in the house or bank etc., but
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Peng, Shihao Yan, Helge Janicke, et al. "A Survey on Unauthorized UAV Threats to Smart Farming." Drones 9, no. 4 (2025): 251. https://doi.org/10.3390/drones9040251.

Full text
Abstract:
The integration of Internet of Things (IoT) and unmanned aerial vehicles (UAVs) in smart farming has revolutionized agricultural practices by enhancing monitoring, automation, and decision-making to improve agricultural productivity and sustainability. However, the widespread use of these technologies has also introduced new security challenges, particularly the risk of interference from unauthorized UAVs. This survey provides an analysis of the threats posed by unauthorized UAVs to smart farms, highlighting potential vulnerabilities such as data interception, communication jamming, and physic
APA, Harvard, Vancouver, ISO, and other styles
7

DŹWIAREK, Marek. "IT Protection of Safety-Related Machine Control Systems in Industry 4.0." Problems of Mechatronics Armament Aviation Safety Engineering 13, no. 4 (2022): 137–46. http://dx.doi.org/10.5604/01.3001.0016.1465.

Full text
Abstract:
The overall objective of the research was to develop the consideration of threats of unauthorized interference in information systems in the risk assessment process carried out by designers of machine control systems. For this purpose, an analysis of typical structures related to the security of control systems was carried out in terms of the possibility and consequences of the loss of security functions as a result of unwanted interference. Recommendations for proceeding "step by step" in the subsequent stages of the risk analysis were determined.
APA, Harvard, Vancouver, ISO, and other styles
8

Kuryltsiv, Roman, and Nadiia Kryshenyk. "Administration of the land cadastre system under conditions of martial law in Ukraine." Acta Scientiarum Polonorum Administratio Locorum 21, no. 4 (2022): 539–48. http://dx.doi.org/10.31648/aspal.8140.

Full text
Abstract:
Motives: Since the Russian invasion of Ukraine, the issue of land legal relations has become of particular concern. The urgent task is to introduce the mechanism protecting the information of the State Land Cadastre from unauthorized interference by third parties, to ensure the rights of the state, physical and legal entities to enter data about objects to the cadastral system and to use this information. Aim: The research aims to identify ways to improve the mechanism of legal regulation of the State Land Cadastre under martial law that will ensure the restructuration and functioning of the a
APA, Harvard, Vancouver, ISO, and other styles
9

Bakhtiiarov, Denys, Oleksandr Lavrynenko, Nataliia Lishchynovska, Ivan Basiuk, and Tetiana Prykhodko. "METHODS FOR ASSESSMENT AND FORECASTING OF ELECTROMAGNETIC RADIATION LEVELS IN URBAN ENVIRONMENTS." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, no. 1 (2021): 24–27. http://dx.doi.org/10.35784/iapgos.2430.

Full text
Abstract:
Methods for synthesis a structural diagram of the processes for detecting and locating technical information leakage channels are analysed. Software for defining a controlled room zone was also presented. A proprietary approach to search the electromagnetic environment under radio interference has been developed to detect devices for unauthorized control of acoustic information using microphones and transmission of this information using a radio channel.
APA, Harvard, Vancouver, ISO, and other styles
10

Soni, Sujal, Mayank Paliwal, Rishabh Dangi, and Dharmendra Trivedi. "SIGNAL SEEKER: Safeguarding wireless communication with lora tech." International Journal of Technical Research & Science 9, Spl (2024): 27–35. http://dx.doi.org/10.30780/specialissue-iset-2024/045.

Full text
Abstract:
Wireless communication has become essential to daily living in the connected world of today. There is increasing worry about the unlawful use of radio signals and frequencies for activities like unauthorized broadcasting, and interference as a result of the proliferation of devices and networks. Here, the signal seeker, the heart of our project enters the picture to transform signal security. It uses LoRa (Long Range) technology to identify and block unauthorized communications. As a powerful tool for security application, it makes dependable communication over long distances possible, regardl
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Unauthorized interference"

1

Commission, Ghana Law Reform, ed. Report of seminar on unauthorised interference with computers-- computer crime law, 1988: Held on 17th and 18th May, 1988, at the Kwame Nkrumah Conference Hall, State House, Accra. The Commission, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eileen, Denza. Inviolability of the Archives. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0022.

Full text
Abstract:
This chapter considers Article 24 of the Vienna Convention on Diplomatic Relations which deals with the inviolability of the archives. Article 24 states that the archives and documents of the diplomatic mission shall be inviolable at any time and wherever they may be. In essence, the Article highlights the protection of confidential information. The chapter describes the developments made by the International Law Commission and the Vienna Conference to extend the principle of inviolability of archives and documents. The expression ‘inviolable’ was chosen by the Commission to convey both that t
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Unauthorized interference"

1

Sun, Degang, Yue Cui, Siye Wang, and Yanfang Zhang. "On Eliminating Blocking Interference of RFID Unauthorized Reader Detection." In Wireless Algorithms, Systems, and Applications. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19208-1_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kedziora, Michal, Aleksander Gorka, Aleksander Marianski, and Ireneusz Jozwiak. "Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain." In Data-Centric Business and Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34706-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maurushat, Alana. "Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions." In SpringerBriefs in Cybersecurity. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Van de Velde, James. "When Does Election Interference via Cyberspace Violate Sovereignty?" In Defending Democracies. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197556979.003.0008.

Full text
Abstract:
When does foreign election interference via cyberspace violate U.S. sovereignty, and when do such violations warrant a response? When do violations of sovereignty constitute “armed attacks” or “acts of war”? This chapter posits triggers for discerning such violations of sovereignty. The rough determining factor ought to be whether activities in cyberspace were those of an authorized user. Malicious cyberspace operations that do not involve unauthorized activity should not be considered a violation of sovereignty (though they may be politically concerning). But any unauthorized state activity i
APA, Harvard, Vancouver, ISO, and other styles
5

Gnatyuk Sergiy. "Critical Aviation Information Systems Cybersecurity." In NATO Science for Peace and Security Series - D: Information and Communication Security. IOS Press, 2016. https://doi.org/10.3233/978-1-61499-716-0-308.

Full text
Abstract:
The criticality level of the civil aviation information infrastructure is considerably amplified by the high degree of connectivity and interaction between ground and aircraft systems. Malicious interference with mentioned systems puts passengers, crew and ground staff security at threat. Unauthorized access to so-called critical aviation information system may have serious and tragic consequences (hundreds of passengers' lives, significant financial losses, etc.). In this context, the security of critical aviation information systems must be ensured in accordance with international control av
APA, Harvard, Vancouver, ISO, and other styles
6

Nidhyananthan, S. Selva, Joe Virgin A., and Shantha Selva Kumari R. "Wireless Enhanced Security Based on Speech Recognition." In Handbook of Research on Information Security in Biomedical Signal Processing. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5152-2.ch012.

Full text
Abstract:
Security is the most notable fact of all computerized control gadgets. In this chapter, a voice ID computerized gadget is utilized for the security motivation using speech recognition. Mostly, the voices are trained by extracting mel frequency cepstral coefficient feature (MFCC), but it is very sensitive to noise interference and degrades the performance; hence, dynamic MFCC is used for speech and speaker recognition. The registered voices are stored in a database. When the device senses any voice, it cross checks with the registered voice. If any mismatches occur, it gives an alert to the aut
APA, Harvard, Vancouver, ISO, and other styles
7

Surapaneni, Praneetha, Sailaja Chigurupati, and Sriramulu Bojjagani. "BITS-AV Biometric Integration for Secure Transport Systems in Autonomous Vehicles." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8014-7.ch018.

Full text
Abstract:
Autonomous vehicles (AVs) play a significant role in intelligent transportation systems (ITS), which handle vehicles without human interference. The AVs are integrated with the Internet of Vehicles (IoV) to connect with more vehicles, sensors, and fog servers and share data. This makes the vehicles vulnerable to attacks and leads to unauthorized access. To overcome this drawback, we introduced biometric authentication for secure communication of vehicles, roadside units (RSUs), and fog servers. In this protocol, we generated two session keys between entities. The communication cost, computatio
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Lei, and Chung-Wei Lee. "Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks." In Wireless Technologies. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch304.

Full text
Abstract:
Supporting reliable and secure multimedia streaming service is a challenging task in the environment of wireless Mobile Ad hoc Networks (MANETs) where radio signals are prone to security attacks and the quality of media streaming is degraded by signal strength loss and interference. The mobility of mobile devices makes streaming even more difficult as communication links are often broken when the devices move out of the transmission range of their neighbors. This paper proposes a stable multipath routing algorithm and an intelligent secure data distribution scheme for multimedia streaming in M
APA, Harvard, Vancouver, ISO, and other styles
9

Reznikov Dmitry O. "Technological and Intelligent Terrorism: Specific Features and Assessment Approaches." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2012. https://doi.org/10.3233/978-1-61499-131-1-45.

Full text
Abstract:
The paper addresses specific features of assessing terrorist risks for complex technical systems (CTS). These include feedback between CTS vulnerability towards a specific type of terrorist attack and the threat of such attack, ability of terrorists to learn lessons from previous attacks, react upon actions taken by counterterrorist forces; high level of uncertainty regarding terrorists' intentions, resources, and system of values. Conventional safety analysis for CTS is to be focused on the question: What is the way for an accident scenario to be realized in the given system? When ad
APA, Harvard, Vancouver, ISO, and other styles
10

Scott, Helen. "Property | Unjust Enrichment." In Borderlines in Private Law. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/9780191995200.003.0016.

Full text
Abstract:
Abstract This chapter outlines the borderline between property and unjust enrichment, which varies between different legal cultures. It discusses enrichment by interference with the claimant's right in the civilian tradition, in accordance with German, South African, and Scottish law, before contrasting enrichment by interference with the claimant’s right in English law. The chapter notes that German law accords extensive protection to the security of third party receipts through its treatment of unauthorised dispositions. The chapter claims that what could plausibly be dealt with as instances
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Unauthorized interference"

1

McKee, Forrest, and David Noever. "Safeguarding Voice Privacy: Harnessing Near-Ultrasonic Interference to Protect Against Unauthorized Audio Recording." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141112.

Full text
Abstract:
The widespread adoption of voice-activated systems has modified routine human-machine interaction but has also introduced new vulnerabilities. This paper investigates the susceptibility of automatic speech recognition (ASR) algorithms in these systems to interference from near-ultrasonic noise. Building upon prior research that demonstrated the ability of near-ultrasonic frequencies (16 kHz - 22 kHz) to exploit the inherent properties of micro electromechanical systems (MEMS) microphones, our study explores alternative privacy enforcement means using this interference phenomenon. We expose a c
APA, Harvard, Vancouver, ISO, and other styles
2

Oleynikov, Anatoliy, Oleksii Bilotserkivets, and Volodymyr Pulavskiy. "FORMATION OF ACOUSTIC INTERFERENCE BASED ON A MICROCONTROLLER FOR THE SUPPRESSOR OF UNAUTHORIZED SPEECH RECORDING." In Theoretical and Applied Aspects of Device Development on Microcontrollers and FPGAs 2022. NURE, 2022. http://dx.doi.org/10.35598/mcfpga.2022.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dryzhakova, D. Y. "Foreign experience of criminal liability for unauthorized interference with information (automated), electronic, communication, information and communication systems, electronic communication networks." In SCIENTIFIC INNOVATIONS IN LAW AMIDST THE IMPACT OF THE RUSSIAN-UKRAINIAN WAR ON THE LEGAL SYSTEM. Baltija Publishing, 2024. http://dx.doi.org/10.30525/978-9934-26-409-2-24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oka, Ryushun, Jumpei Tahara, Ichiro Koshijima, and Kenji Watanabe. "Blocking System for Autonomous Flight Drones." In 16th International Conference on Applied Human Factors and Ergonomics (AHFE 2025). AHFE International, 2025. https://doi.org/10.54941/ahfe1006371.

Full text
Abstract:
In recent years, the misuse of drones has emerged as a critical challenge. Drones use electromagnetic waves, such as GNSS (Global Navigation Satellite System), and remote control signals for navigation. When a malicious drone that intends to engage in criminal activities such as terrorism is detected, it is possible to neutralize drones using systems that generate high-power jamming signals, such as Drone-Buster. However, this approach requires continuous emission of strong jamming signals, which can interfere with nearby devices that rely on electromagnetic waves. Furthermore, it is challengi
APA, Harvard, Vancouver, ISO, and other styles
5

Dryzhakova, D. Yu. "Advanced achievements in the field of legal regulation of unauthorized interference in computer networks: the view of domestic and foreign scientists." In ADVANCES IN LAW: THE VIEW OF DOMESTIC AND FOREIGN SCHOLARS. Baltija Publishing, 2024. http://dx.doi.org/10.30525/978-9934-26-493-1-50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!