Journal articles on the topic 'Unauthorized interference'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Unauthorized interference.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Streltsov, Lev. "Unauthorized Interference with Computers and Networks in Ukraine." Zeitschrift für die gesamte Strafrechtswissenschaft 130, no. 2 (2018): 605–41. http://dx.doi.org/10.1515/zstw-2018-0024.
Full textSerhiienko, S. P., V. G. Krizhanovski, D. V. Chernov, and L. V. Zahoruiko. "Effective modes of operation of radio-bombing devices for covert information gathering in the field of noise interference." Radiotekhnika, no. 205 (July 2, 2021): 169–74. http://dx.doi.org/10.30837/rt.2021.2.205.18.
Full textOleynikov, A. N., V. A. Pulavsky, and I. N. Chigirev. "Improving the efficiency of methods and means for suppressing unauthorized speech recording." Radiotekhnika, no. 209 (June 24, 2022): 156–61. http://dx.doi.org/10.30837/rt.2022.2.209.15.
Full textHu, Yingdong, Shibing Zhang, Jue Wang, Ye Li, and Lili Guo. "Wireless Surveillance With Interference Exploitation in Unauthorized Underlaid D2D Networks." IEEE Access 8 (2020): 123151–64. http://dx.doi.org/10.1109/access.2020.3007448.
Full textPrajapati, Mrs Kalpana V. "Thief Detection and Prevention: Home security using IoT (Internet of Things)." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 271–75. http://dx.doi.org/10.22214/ijraset.2021.38750.
Full textChen, Peng, Shihao Yan, Helge Janicke, et al. "A Survey on Unauthorized UAV Threats to Smart Farming." Drones 9, no. 4 (2025): 251. https://doi.org/10.3390/drones9040251.
Full textDŹWIAREK, Marek. "IT Protection of Safety-Related Machine Control Systems in Industry 4.0." Problems of Mechatronics Armament Aviation Safety Engineering 13, no. 4 (2022): 137–46. http://dx.doi.org/10.5604/01.3001.0016.1465.
Full textKuryltsiv, Roman, and Nadiia Kryshenyk. "Administration of the land cadastre system under conditions of martial law in Ukraine." Acta Scientiarum Polonorum Administratio Locorum 21, no. 4 (2022): 539–48. http://dx.doi.org/10.31648/aspal.8140.
Full textBakhtiiarov, Denys, Oleksandr Lavrynenko, Nataliia Lishchynovska, Ivan Basiuk, and Tetiana Prykhodko. "METHODS FOR ASSESSMENT AND FORECASTING OF ELECTROMAGNETIC RADIATION LEVELS IN URBAN ENVIRONMENTS." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, no. 1 (2021): 24–27. http://dx.doi.org/10.35784/iapgos.2430.
Full textSoni, Sujal, Mayank Paliwal, Rishabh Dangi, and Dharmendra Trivedi. "SIGNAL SEEKER: Safeguarding wireless communication with lora tech." International Journal of Technical Research & Science 9, Spl (2024): 27–35. http://dx.doi.org/10.30780/specialissue-iset-2024/045.
Full textOleynikov, A. N., V. A. Pulavskyi, and O. H. Bilotserkivets. "Ways to improve the efficiency of methods and means of counteracting unauthorized speech recording and their comparative analysis." Radiotekhnika, no. 212 (March 28, 2023): 85–89. http://dx.doi.org/10.30837/rt.2023.1.212.07.
Full textGogulakrishnan Thiyagarajan. "Securing Credit Inquiries: The Role of Real-Time User Approval in Preventing SSN Identity Theft." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 336–56. https://doi.org/10.52783/jisem.v10i35s.6011.
Full textRakstiņš, Vitālijs, Karina Palkova, Lidija Juļa, and Nataliia Filipenko. "Improving cybersecurity measures in academic institutions to reduce the risk of foreign influence." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 2, no. 29 (2024): 75–79. http://dx.doi.org/10.25143/socr.29.2024.2.75-79.
Full textBoyce, Geoffrey Alan, Samuel N. Chambers, and Sarah Launius. "Bodily Inertia and the Weaponization of the Sonoran Desert in US Boundary Enforcement: A GIS Modeling of Migration Routes through Arizona’s Altar Valley." Journal on Migration and Human Security 7, no. 1 (2019): 23–35. http://dx.doi.org/10.1177/2331502419825610.
Full textXue, Libin, and Chunjie Cao. "Joint Channel and Power Assignment for Underwater Cognitive Acoustic Networks on Marine Mammal-Friendly." Applied Sciences 13, no. 23 (2023): 12950. http://dx.doi.org/10.3390/app132312950.
Full textAakanksha, Kashish Jain, Neha Giri, and Anamika Gupta. "Assessing Vulnerabilities in Voice Assistants: Comparative Analysis of Google Assistant, Siri, and Alexa." Advances in Knowledge-Based Systems, Data Science, and Cybersecurity 02, no. 01 (2025): 197–214. https://doi.org/10.54364/cybersecurityjournal.2025.1110.
Full textSvyd, I. V., M. G. Tkach, and I. I. Obod. "Comparative analysis of interference protection of "Friend-Foe" radar identification systems." Radiotekhnika, no. 211 (December 30, 2022): 101–13. http://dx.doi.org/10.30837/rt.2022.4.211.08.
Full textLukova-Chuiko, Nataliya, and Tеtyana Lapteva. "Improvement of the method of detection and location of illegal access points to the wireless network of information activity objects." Information systems and technologies security, no. 1 (6) (2023): 21–27. http://dx.doi.org/10.17721/ists.2023.1.21-27.
Full textKorchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.
Full textXiong, Ke, Yu Zhang, Dandan Li, Chih-Yung Chang, and Zhangdui Zhong. "Multiantenna Relay Beamforming Design for QoS Discrimination in Two-Way Relay Networks." Scientific World Journal 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/306423.
Full textJumaa, Saja, Dr Qusay Abboodi Ali, and Dr Mshari A. Alshmmri. "Review : Methods of Cryptography." Al-Salam Journal for Engineering and Technology 1, no. 2 (2022): 30–34. http://dx.doi.org/10.55145/ajest.2022.01.02.006.
Full textShvetsov, A. V. "ANTI-RAM PROTECTION OF METRO TERRITORY." World of Transport and Transportation 14, no. 2 (2016): 162–66. http://dx.doi.org/10.30932/1992-3252-2016-14-2-17.
Full textSvyd, I. V., I. I. Obod, O. S. Maltsev, et al. "Method for increasing noise immunity of radar "friend or foe" identification systems under the action of intentional correlated interference." Radiotekhnika, no. 205 (July 2, 2021): 154–60. http://dx.doi.org/10.30837/rt.2021.2.205.16.
Full textKoispaeva, Oxana Garifullaevna, Sergey Vladimirovich Golovko, and Maksim Almansurovich Nadeev. "Technological video survaillance as protective tool of smart electricity meters from unauthorized access." Vestnik of Astrakhan State Technical University 2020, no. 2 (2020): 7–13. http://dx.doi.org/10.24143/1812-9498-2020-2-7-13.
Full textHe, Shoushuai, Lei Zhu, Changhua Yao, Weijun Zeng, and Zhen Qin. "A Novel Approach Based on Generative Adversarial Network for Interference Detection in Wireless Communications." Wireless Communications and Mobile Computing 2022 (September 21, 2022): 1–9. http://dx.doi.org/10.1155/2022/7050573.
Full textLemieszewski, Łukasz, Dina Hannebauer, and Grzegorz Remiszewski. "Vulnerability of Wi-Fi wireless network to signal interference." Journal of Engineering 360 1, no. 1/24 (2024): 58–65. https://doi.org/10.5604/01.3001.0054.8861.
Full textTkach, M. G. "Estimation of the relative throughput of aircraft transponders of secondary airspace surveillance radar systems." Radiotekhnika, no. 207 (December 24, 2021): 123–31. http://dx.doi.org/10.30837/rt.2021.4.207.13.
Full textKholopova, E. N. "Comprehensive characterization of biological terrorism." Legal Science in China and Russia, no. 4 (September 16, 2021): 180–84. http://dx.doi.org/10.17803/2587-9723.2021.4.180-184.
Full textSukharev, A. D., and D. B. Piskunov. "Study of radio channel stealth in networks with MU-MIMO technology." Issues of radio electronics 49, no. 5 (2020): 58–63. http://dx.doi.org/10.21778/2218-5453-2020-5-58-63.
Full textMilczarek, Ewa. "CONCEPTUALIZATION OF ATTENTIONAL PRIVACY." Studia Iuridica 101 (2023): 228–36. http://dx.doi.org/10.31338/2544-3135.si.2024-101.16.
Full textOleh, Velychko, Gaman Valentyn, Gordiyenko Tetyana, and Hrabovskyi Oleh. "TESTING OF MEASUREMENT INSTRUMENT SOFTWARE WITH THE PURPOSE OF CONFORMITY ASSESSMENT." Eastern-European Journal of Enterprise Technologies 1, no. 9 (97) (2019): 16–26. https://doi.org/10.15587/1729-4061.2019.154352.
Full textYang, Shengying, Huibin Qin, Xiaolin Liang, and Thomas Gulliver. "An Improved Unauthorized Unmanned Aerial Vehicle Detection Algorithm Using Radiofrequency-Based Statistical Fingerprint Analysis." Sensors 19, no. 2 (2019): 274. http://dx.doi.org/10.3390/s19020274.
Full textVelychko, О. M., V. V. Gaman, O. V. HrabovskiiHrabovskii, and T. B. Gordiyenko. "FEATURES OF TESTING OF THE BUILT-IN SOFTWARE OF MEASURING INSTRUMENTS." Key title: Zbìrnik naukovih pracʹ Odesʹkoï deržavnoï akademìï tehnìčnogo regulûvannâ ta âkostì -, no. 1(16) (2020): 36–41. http://dx.doi.org/10.32684/2412-5288-2020-1-16-36-41.
Full textKurniasyah, Ikmal, and Lusia Rakhmawati. "Smart Door Lock Innovation Using Integration of Bluetooth Low Energy and MQTT IoT Protocol." INAJEEE Indonesian Journal of Electrical and Eletronics Engineering 8, no. 1 (2024): 41–46. https://doi.org/10.26740/inajeee.v8n1.p41-46.
Full textOpirskyy, Ivan, and Petro Petriv. "EFFECTIVENESS OF BLOCKCHAIN LOGGING AND SSO IN CYBER SECURITY MECHANISMS." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 50–68. http://dx.doi.org/10.28925/2663-4023.2024.24.5068.
Full textBalatska, V. S., V. O. Poberezhnyk, A. V. Stefankiv, and Yu A. Shevchuk. "DEVELOPMENT OF A METHOD FOR ENSURING THE RELIABILITY AND SECURITY OF PERSONAL DATA IN BLOCKCHAIN SYSTEMS OF STATE REGISTERS." Computer systems and network 7, no. 1 (2025): 1–14. https://doi.org/10.23939/csn2025.01.001.
Full textXu, Ming, Hongping Li, Haihua Chen, and Xiaobin Yin. "Quantitative Measurement of Radio Frequency Interference for SMOS Mission." Remote Sensing 14, no. 7 (2022): 1669. http://dx.doi.org/10.3390/rs14071669.
Full textYang, Zhen, Titi Liu, and Guobin Chen. "Power Control for Full-Duplex Device-to-Device Underlaid Cellular Networks: A Stackelberg Game Approach." Complexity 2020 (November 10, 2020): 1–12. http://dx.doi.org/10.1155/2020/1786349.
Full textKohut, Yurii. "Measures for protection of the information systems of Ukraine’s critical infrastructures against cyberattacks." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 38, no. 38 (2020): 57–65. http://dx.doi.org/10.5604/01.3001.0014.5939.
Full textMilind Yadav, Mr Aditya, Mr Aditya Prakash Shelke, and Ms Priyadarshini Badjujar. "Fake Product Detection Using Block-Chain." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44006.
Full textVodopianov, Serhii, Oksana Martynova, and Arkadii Krainosvit. "Development of a method of analysis of energy and information characteristics of wireless networks of critical application under conditions of limitations on the signal/(interference plus noise) ratio." Technology audit and production reserves 2, no. 1(70) (2023): 30–34. http://dx.doi.org/10.15587/2706-5448.2023.278280.
Full textElizabeth Atieno Otieno. "Security, privacy and performance concerns in ultra dense networks." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1796–837. http://dx.doi.org/10.30574/wjarr.2024.23.2.2517.
Full textElizabeth, Atieno Otieno. "Security, privacy and performance concerns in ultra dense networks." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 1796–837. https://doi.org/10.5281/zenodo.14865387.
Full textMatsola, A., and І. Chernychenko. "Features of search tactics during the investigation of obstruction of the legitimate professional activities of journalists." Analytical and Comparative Jurisprudence, no. 1 (May 29, 2023): 530–34. http://dx.doi.org/10.24144/2788-6018.2023.01.92.
Full textPark, Tae-Jin, Ki-il Kim, and Sangook Moon. "Securing Infrared Communication in Nuclear Power Plants: Advanced Encryption for Infrared Sensor Networks." Sensors 24, no. 7 (2024): 2054. http://dx.doi.org/10.3390/s24072054.
Full textTajDini, Mahyar, and Volodymyr Sokolov. "Internet of Things Security Problems." Modern Information Protection, no. 1 (March 10, 2017): 120–27. https://doi.org/10.5281/zenodo.2528814.
Full textBasarab, O. T., and O. K. Basarab. "CRIMINAL AND LEGAL ANALYSIS OF UNAUTHORIZED INTERFERENCE IN INFORMATION (AUTOMATED), ELECTRONIC COMMUNICATION, INFORMATION AND COMMUNICATION SYSTEMS AND ELECTRONIC COMMUNICATION NETWORKS." Juridical scientific and electronic journal, no. 2 (2024): 319–22. http://dx.doi.org/10.32782/2524-0374/2024-2/77.
Full textZolotorevich, L. A., and V. A. Ilyinkov. "Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures." Informatics 18, no. 3 (2021): 7–17. http://dx.doi.org/10.37661/1816-0301-2021-18-3-7-17.
Full textChandrakala, Dr N. "A SELF-RELIANT APPROACH TO SECURE DATA DELECTION IN CLOUD COMPUTING." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–9. https://doi.org/10.55041/isjem03718.
Full textCharly, Putri, Kadek Erik Diatmika, I. Made Panji Prayoga, and I. Made Edy Listartha. "Pendeteksian Keamanan Website SMA Greenschool Menggunakan Metode Owasp dengan Pengujian XSS." Format : Jurnal Ilmiah Teknik Informatika 11, no. 1 (2022): 77. http://dx.doi.org/10.22441/10.22441/format.2022.v11.i1.008.
Full text