Journal articles on the topic 'Violator model'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Violator model.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pavlicheva, E. N., F. O. Fedin, A. S. Chiskidov, and N. F. Glybin. "MODEL OF AN INFORMATION SECURITY INTRUDER FOR AN OBJECT OF CRITICAL INFORMATION INFRASTRUCTURE OF A TRANSPORT SERVICES TRADING PLATFORM." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 203 (May 2021): 28–34. http://dx.doi.org/10.14489/vkit.2021.05.pp.028-034.
Full textAn, Shi, Jianxun Cui, Meng Zhao, and Jian Wang. "A Study of Network Violator Interception Based on a Reliable Game Model." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/124343.
Full textBoychenko, Oleg, and Ruslana Ziubina. "THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR." Information systems and technologies security, no. 1 (1) (2019): 19–26. http://dx.doi.org/10.17721/ists.2019.1.19-26.
Full textCui, Jianxun, Shi An, and Meng Zhao. "A Robust Model for the Network Violator Interception Problem." Arabian Journal for Science and Engineering 39, no. 10 (2014): 6871–81. http://dx.doi.org/10.1007/s13369-014-1271-8.
Full textLoginova, A. O. "The Descriptive Model of Social Bot on the Base of American Political Discourse." Herald of the Siberian State University of Telecommunications and Information Science 18, no. 3 (2024): 3–13. https://doi.org/10.55648/1998-6920-2024-18-3-3-13.
Full textSizov, Valerii A., Aleksei D. Kirov, and Viacheslav V. Aleinikov. "Development of models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach." Journal Of Applied Informatics 18, no. 4 (2023): 76–96. http://dx.doi.org/10.37791/2687-0649-2023-18-4-76-96.
Full textSawicki, Janusz. "Zaniechanie ukarania z art. 16a i 16b k.k.s. — szczególne rodzaje czynnego żalu czy niepotrzebna kazuistyka?" Przegląd Prawa i Administracji 116 (December 20, 2019): 87–101. http://dx.doi.org/10.19195/0137-1134.116.6.
Full textKalashnikov, Andrey, and Konstantin Bugajskij. "A Model for Assessing the Security of a Complex Network (Part 1)." Voprosy kiberbezopasnosti, no. 4(50) (2022): 26–38. http://dx.doi.org/10.21681/2311-3456-2022-4-26-38.
Full textPilkevych, I. A., O. S. Boychenko, and I. V. Humeniuk. "Improvimg the Method of Developing a Logic-Probabilistic Model of an Internal Violator." Èlektronnoe modelirovanie 42, no. 4 (2020): 71–86. http://dx.doi.org/10.15407/emodel.42.04.071.
Full textZhuk, R. "A Method for Determining the Potential of an Information Security Intruder and Realizable Software Vulnerabilities." Proceedings of Telecommunication Universities 7, no. 2 (2021): 95–101. http://dx.doi.org/10.31854/1813-324x-2021-7-2-95-101.
Full textCuddeback, Gary S., Melissa Grady, Amy Blank Wilson, Tonya Van Deinse, and Joseph P. Morrissey. "Persons With Severe Mental Illnesses and Sex Offenses: Recidivism After Prison Release." International Journal of Offender Therapy and Comparative Criminology 63, no. 12 (2019): 2157–70. http://dx.doi.org/10.1177/0306624x19842994.
Full textShipunova, Tatiana V. "Discoursive presentation of the violator of norms in the communicative model of social control." Vestnik of Saint Petersburg University. Sociology 10, no. 4 (2017): 441–53. http://dx.doi.org/10.21638/11701/spbu12.2017.405.
Full textMade Dwi Hadayani and Ketut Sujana. "Moderated by retaliation: Moral intensity, offender status and personal cost on auditors' intention to engage in whistleblowing." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 1270–78. https://doi.org/10.30574/wjarr.2025.27.1.0905.
Full textMaximova, E. "Cognitive Modeling of Destructive Malicious Impacts on Critical Information Infrastructure Objects." Proceedings of Telecommunication Universities 6, no. 4 (2020): 91–103. http://dx.doi.org/10.31854/1813-324x-2020-6-4-91-103.
Full textChen, Ping-Ling, Yi-Chu Chen, and Chih-Wei Pai. "Motorcyclist Is the Right-of-Way Violator: A Population-Based Study of Motorcycle Right-of-Way Crash in Taiwan." Journal of Advanced Transportation 2018 (July 17, 2018): 1–7. http://dx.doi.org/10.1155/2018/9543787.
Full textSviridov, V. V. "Methodology for Calculating the Rational Distance between Robotic Systems in Changing Conditions for Solving the Problems of Protecting Critical Facilities." Моделирование и анализ данных 11, no. 4 (2021): 33–48. http://dx.doi.org/10.17759/mda.2021110403.
Full textKalashnikov, Andrey, Konstantin Bugajskij, and Aleksandr Molotov. "A MODEL FOR ASSESSING THE SECURITY OF A COMPLEX NETWORK (PART 2)." Voprosy kiberbezopasnosti, no. 5(51) (2022): 47–60. http://dx.doi.org/10.21681/2311-3456-2022-5-47-60.
Full textBoltyonkova, Elena, Andrey Andreev, and Alexander Doronin. "Development of measures to ensure information security in structural division of the university." E3S Web of Conferences 140 (2019): 08005. http://dx.doi.org/10.1051/e3sconf/201914008005.
Full textDrobakha, Hr, I. Neklonskyi, A. Kateshchenok, et al. "Structural and functional simulation of interaction in the field of aviation safety by using matrices." Archives of Materials Science and Engineering 2, no. 95 (2019): 74–84. http://dx.doi.org/10.5604/01.3001.0013.1734.
Full textSavchenko, S. O., and N. V. Kapchuk. "ALGORITHM OF CREATION OF MODEL OF THE VIOLATOR IN THE INFORMATION SECURITY SYSTEM WITH APPLICATION OF GAME THEORY." Dynamics of Systems, Mechanisms and Machines 5, no. 4 (2017): 084–89. http://dx.doi.org/10.25206/2310-9793-2017-5-4-84-89.
Full textPlard, Floriane, Daniel Turek, and Michael Schaub. "Consequences of violating assumptions of integrated population models on parameter estimates." Environmental and Ecological Statistics 28 (July 1, 2021): 667–95. https://doi.org/10.5281/zenodo.5644962.
Full textSinyuk, A. D., and O. A. Ostroumov. "UNAUTHORIZED INFORMATION RECOVERY CHANNEL MODEL." H&ES Research 13, no. 3 (2021): 60–67. http://dx.doi.org/10.36724/2409-5419-2021-13-3-60-67.
Full textKasetsomboon, Pemika. "Nora Tang Ke." Asian Journal of Arts and Culture 21, no. 2 (2021): 62–70. http://dx.doi.org/10.48048/ajac.2021.247809.
Full textAkpalu, Wisdom, and Ametefee K. Normanyo. "Illegal fishing and catch potentials among small-scale fishers: application of an endogenous Switching regression model." Environment and Development Economics 19, no. 2 (2013): 156–72. http://dx.doi.org/10.1017/s1355770x13000478.
Full textPatil, Mayuri Manikrao, Snehal Nimba Nikumbh, and Aparna Parshwanath Parigond. "Fake Product Monitoring and Removal for Genuine Product Feedback." International Journal of Emerging Science and Engineering 7, no. 1 (2021): 1–3. http://dx.doi.org/10.35940/ijese.a2494.037121.
Full textMayuri, Manikrao Patil, Nimba Nikumbh Snehal, Parshwanath Parigond Aparna, and Patil Madhavi. "Fake Product Monitoring and Removal for Genuine Product Feedback." International Journal of Emerging Science and Engineering (IJESE) 7, no. 1 (2021): 1–3. https://doi.org/10.35940/ijese.A2494.037121.
Full textTsurikov, Vladimir Ivanovich, and Elena Matveevna Skarzhinskaya. "To the theory of collective actions. Part 4. Use of violence potential." Теоретическая и прикладная экономика, no. 2 (February 2020): 86–95. http://dx.doi.org/10.25136/2409-8647.2020.2.30246.
Full textKulikovskij, Dmitriy O., and Daria N. Khalina. "Analysis creation process of a secure enterprise information system." Digital technology security, no. 4 (December 25, 2023): 35–46. http://dx.doi.org/10.17212/2782-2230-2023-4-35-46.
Full textManhas, Saloni, Swapnesh Taterh, and Dilbag Singh. "Deep Q learning-based mitigation of man in the middle attack over secure sockets layer websites." Modern Physics Letters B 34, no. 32 (2020): 2050366. http://dx.doi.org/10.1142/s0217984920503662.
Full textHardipo Widyaputra, Sholahudin Ranggawuni, and Pujiyono SH MH. "The Enforcement of Simple Claim Process as a Role Model of Credit Agreement Conflict Resolution in Bank Perkreditan Rakyat (BPR)." International Journal of Multicultural and Multireligious Understanding 5, no. 4 (2018): 394. http://dx.doi.org/10.18415/ijmmu.v5i4.360.
Full textArtyushina, L. A. "A PROBABILISTIC APPROACH TO ASSESSING THE SECURITY OF THE INFORMATION SYSTEM IN THE PROBLEM OF USER IDENTIFICATION BY KEYPAD HANDWRITING." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 23, no. 2 (2023): 93–101. http://dx.doi.org/10.14529/ctcr230208.
Full textKuznetsov, Dmitry. "Functions of compensation for human rights violation in international and national judicial decisions." Meždunarodnoe pravosudie 11, no. 1 (2021): 81–101. http://dx.doi.org/10.21128/2226-2059-2021-1-81-101.
Full textShcheblanin, Yury, and Dmytro Rabchun. "MATHEMATICAL MODEL OF INFORMATION SECURITY’S THEAT AGENT." Cybersecurity: Education, Science, Technique, no. 1 (2018): 63–72. http://dx.doi.org/10.28925/2663-4023.2018.1.6372.
Full textDementiev, A. S., and N. A. Tsvetkova. "Justice sensitivity of youth with different levels of income as an actual socio-psychological problem." Vestnik Universiteta, no. 10 (December 6, 2024): 196–204. https://doi.org/10.26425/1816-4277-2024-10-196-204.
Full textAgresti, Iris, Gonzalo Carvacho, Davide Poderini, Leandro Aolita, Rafael Chaves, and Fabio Sciarrino. "Experimental Connection between the Instrumental and Bell Inequalities." Proceedings 12, no. 1 (2019): 27. http://dx.doi.org/10.3390/proceedings2019012027.
Full textЛаданов, В. И., Е. В. Шарипова, and С. М. Леготкина. "Civil liability of the parties in entrepreneurial activity for non-performance or improper performance option agreements." Экономика и предпринимательство, no. 11(124) (December 23, 2020): 1183–86. http://dx.doi.org/10.34925/eip.2020.124.11.233.
Full textAL-Ghazali, Malik. "Restorative Justice Approach on The Under Age (Minors) Violator of The Traffic Case Accident (Laka) That Lead to Death in Polres Majalengka." Jurnal Daulat Hukum 1, no. 3 (2018): 705. http://dx.doi.org/10.30659/jdh.v1i3.3371.
Full textShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Sofia Boiko. "GAME THEORETICAL APPROACH TO THE MODELING OF CONFLICTS IN INFORMATION SECURITY SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 168–78. http://dx.doi.org/10.28925/2663-4023.2023.22.168178.
Full textSamoylenko, Georgiy, and Dmytro Kosyrev. "Protection of housing rights of Ukrainian citizens in conditions of armed aggression of the Russian Federation against Ukraine." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi, no. 17(29) (June 12, 2024): 204–14. http://dx.doi.org/10.33098/2078-6670.2024.17.29.204-214.
Full textMiasoiedova, A., M. Divizinyuk, A. Khmyrova, R. Shevchenko, and O. Shevchenko. "MATHEMATICAL MODEL OF DETECTION OF SMALL UNMANNED AERIAL VEHICLES USING ACTIVE OPTICAL SYSTEMS." Municipal economy of cities 1, no. 175 (2023): 176–81. http://dx.doi.org/10.33042/2522-1809-2023-1-175-176-181.
Full textLin, Chilong. "BAU Production in the SN-Breaking Standard Model." Symmetry 15, no. 5 (2023): 1051. http://dx.doi.org/10.3390/sym15051051.
Full textKurniawati, Yenni, Anang Kurnia, and Kusman Sadik. "A COMPARISON OF POLYTOMOUS MODEL WITH PROPORTIONAL ODDS AND NON-PROPORTIONAL ODDS MODEL ON BIRTH SIZE CASE IN INDONESIA." MEDIA STATISTIKA 14, no. 1 (2021): 79–88. http://dx.doi.org/10.14710/medstat.14.1.79-88.
Full textXiao, Yun, Haoyun Liu, and Zijun Liang. "An Analysis of the Influential Factors of Violations in Urban-Rural Passenger Transport Drivers." Journal of Advanced Transportation 2022 (April 30, 2022): 1–10. http://dx.doi.org/10.1155/2022/1652923.
Full textShor, Oded, Felix Benninger, and Andrei Khrennikov. "Dendrogramic Representation of Data: CHSH Violation vs. Nonergodicity." Entropy 23, no. 8 (2021): 971. http://dx.doi.org/10.3390/e23080971.
Full textSen, Indrajit, and Antony Valentini. "Superdeterministic hidden-variables models I: non-equilibrium and signalling." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, no. 2243 (2020): 20200212. http://dx.doi.org/10.1098/rspa.2020.0212.
Full textICHINOSE, SHOICHI. "CP VIOLATION FROM A HIGHER DIMENSIONAL MODEL." International Journal of Modern Physics E 16, no. 05 (2007): 1557–70. http://dx.doi.org/10.1142/s0218301307006885.
Full textMyranika, Annie. "Law enforcement of criminal acts of traffic violations." International journal of social sciences and humanities 6, no. 1 (2022): 66–74. http://dx.doi.org/10.53730/ijssh.v6n1.3829.
Full textLenkov, Sergey, Volodymyr Dzhuliy, Ihor Muliar, and Maksym Dymbovsky. "Model of current threats to security of confiden-tial data in divisional information systems." Pidvodni tehnologii, no. 13 (February 29, 2024): 45–59. http://dx.doi.org/10.32347/uwt.2023.13.1205.
Full textNEUFELD, H., W. GRIMUS, and G. ECKER. "GENERALIZED CP INVARIANCE, NEUTRAL FLAVOR CONSERVATION AND THE STRUCTURE OF THE MIXING MATRIX." International Journal of Modern Physics A 03, no. 03 (1988): 603–16. http://dx.doi.org/10.1142/s0217751x88000254.
Full textCouth, Samuel, Emma Gowen, and Ellen Poliakoff. "Using Race Model Violation to Explore Multisensory Responses in Older Adults: Enhanced Multisensory Integration or Slower Unisensory Processing?" Multisensory Research 31, no. 3-4 (2018): 151–74. http://dx.doi.org/10.1163/22134808-00002588.
Full text