Gotowa bibliografia na temat „Electronic forgery”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Electronic forgery”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Electronic forgery"
Sezonov, Viktor, Mykhailo Fialka, Eduard Poltavski, Nataliia Prokopenko, and Maryna Fomenko. "Forensic Examination of Electronic Documents." Law, State and Telecommunications Review 14, no. 2 (2022): 81–93. http://dx.doi.org/10.26512/lstr.v14i2.40965.
Pełny tekst źródłaDjamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 3 (2025): 65–70. https://doi.org/10.37547/tajpslc/volume07issue03-11.
Pełny tekst źródłaDjamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 4 (2025): 23–28. https://doi.org/10.37547/tajpslc/volume07issue04-05.
Pełny tekst źródłaChervinska, Lyubov Volodymyrivna. "On the Problem of Normative Definition of the Concept of «Official Document» in the Criminal Code of Ukraine." Alʹmanah prava, no. 15 (September 1, 2024): 654–59. https://doi.org/10.33663/2524-017x-2024-15-654-659.
Pełny tekst źródłaLin, Yih-Kai, and Ting-Yu Yen. "A Meta-Learning Approach for Few-Shot Face Forgery Segmentation and Classification." Sensors 23, no. 7 (2023): 3647. http://dx.doi.org/10.3390/s23073647.
Pełny tekst źródłaTrček, Denis. "Minimising the risk of electronic document forgery." Computer Standards & Interfaces 19, no. 2 (1998): 161–67. http://dx.doi.org/10.1016/s0920-5489(98)00010-5.
Pełny tekst źródłaSarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Pełny tekst źródłaZulki Zulkifli Noor. "Proof of the Legal Power of Electronic Certificates Against Criminal Acts of Forgery." Journal of Law, Politic and Humanities 4, no. 6 (2024): 2571–75. https://doi.org/10.38035/jlph.v4i6.846.
Pełny tekst źródłaXue, Ziyu, Xiuhua Jiang, Qingtong Liu, and Zhaoshan Wei. "Global–Local Facial Fusion Based GAN Generated Fake Face Detection." Sensors 23, no. 2 (2023): 616. http://dx.doi.org/10.3390/s23020616.
Pełny tekst źródłaKadam, Kalyani, Swati Ahirrao, and Ketan Kotecha. "AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4489. http://dx.doi.org/10.11591/ijece.v11i5.pp4489-4501.
Pełny tekst źródłaRozprawy doktorskie na temat "Electronic forgery"
Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.
Pełny tekst źródłaLe, Riche Pierre (Pierre Jacques). "Handwritten signature verification : a hidden Markov model approach." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51784.
Pełny tekst źródłaHamid, Lars-Eric, and Simon Möller. "How Secure is Verisure’s Alarm System?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295618.
Pełny tekst źródłaKsiążki na temat "Electronic forgery"
Mulford, Robert. Bank check compliance and liability protection. Thomson/Pratt, 2002.
Znajdź pełny tekst źródłaMulford, Robert. Bank check compliance and liability protection: Administrator manual. Thomson/Pratt, 2003.
Znajdź pełny tekst źródłaMulford, Robert. Bank check compliance and liability protection: Student manual. Thomson/Pratt, 2003.
Znajdź pełny tekst źródłaTanner, Marcus. Croatia: A nation forged in war. Yale University Press, 1997.
Znajdź pełny tekst źródłaWiggli, Oscar. Partition forgée: Sculptures et compositions musicales. Editions Iroise, 1995.
Znajdź pełny tekst źródłaAutotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.
Znajdź pełny tekst źródłaInternational Association of Aquatic and Marine Science Libraries and Information Centers. Conference. Electronic information and publications: Looking to the electronic future, let's not forget the archival past : proceedings of the 24th Annual Conference of the International Association of Aquatic and Marine Science Libraries and Information Centers (IAMSLIC) and the 17th Polar Libraries Colloquy (PLC). Edited by Markham James W. 1939-, Duda Andrea L, Andrews Martha, and Polar Libraries Colloquy (17th : 1998 : Reykjavík, Iceland). IAMSLIC, 1999.
Znajdź pełny tekst źródłaDeception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military. Storming Media, 2002.
Znajdź pełny tekst źródłaMulford, Robert, and Barkley Clark. Bank Check Compliance Liability and Protection: Check Processing Staff Edition. A.S. Pratt/Sheshunoff, 2003.
Znajdź pełny tekst źródłaTanner, Marcus. Croatia: A Nation Forged in War. Yale University Press, 2010.
Znajdź pełny tekst źródłaCzęści książek na temat "Electronic forgery"
Sheng, YunZhong, HangJun Wang, and GuangQun Zhang. "Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing." In Advances in Mechanical and Electronic Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31528-2_54.
Pełny tekst źródłaSapra, Prince, and Vaishali Kikan. "Analysis of various copy-move forgery detection techniques." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-73.
Pełny tekst źródłaRehman, Kaleemur, and Saiful Islam. "A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images." In Micro-Electronics and Telecommunication Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9562-2_66.
Pełny tekst źródłaMannepalli, Kasiprasad, Swetha Danthala, Panyam Narahari Sastry, Durgaprasad Mannepalli, and Bathula Murali Krishna. "Investigation of forgery in speech recordings using similarities of pitch chroma and spectral flux." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-92.
Pełny tekst źródłaHari Nagarubini, K., K. Suthendran, and E. Muthu Kumaran. "Beyond the pixel: examining forgery techniques and detection methods in digital forensics." In Advances in Electronics, Computer, Physical and Chemical Sciences. CRC Press, 2025. https://doi.org/10.1201/9781003616252-32.
Pełny tekst źródłaBoges, Daniya J., Marco Agus, Pierre Julius Magistretti, and Corrado Calì. "Forget About Electron Micrographs: A Novel Guide for Using for Quantitative Analysis of Dense Reconstructions." In Volume Microscopy. Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0691-9_14.
Pełny tekst źródłaHemalatha, R., and R. Amutha. "Risk Detection and Assessment in Digital Signature." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-9317-5.ch018.
Pełny tekst źródłaMbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch040.
Pełny tekst źródłaMbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch010.
Pełny tekst źródłaBoman Inga-Lill and Bartfai Aniko. "Support in Everyday Activities with a Home-based Electronic Memory Aid for Persons with Memory Impairments." In Assistive Technology Research Series. IOS Press, 2009. https://doi.org/10.3233/978-1-60750-042-1-369.
Pełny tekst źródłaStreszczenia konferencji na temat "Electronic forgery"
GuorenYao, Gaoming Yang, Xintian Liu, and Lei Chen. "Two-Stream Manipulation Trace Network for Face Forgery Detection." In 2025 8th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2025. https://doi.org/10.1109/aemcse65292.2025.11042665.
Pełny tekst źródłaZhang, Chenghao. "Federated learning-based cross-domain face forgery detection for consumer IOT systems." In 4th International Conference on Electronic Information Engineering and Data Processing (EIEDP 2025), edited by Azlan Bin Mohd Zain and Lei Chen. SPIE, 2025. https://doi.org/10.1117/12.3067515.
Pełny tekst źródłaBiswas, Subir, Md Ariful Islam, Jayanti Rout, Minati Mishra, and Debendra Muduli. "Passive Image Forgery Detection Through Ensemble Learning with ELA." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827508.
Pełny tekst źródłaKashyap, Nandini, Prince Yadav, Nikita, and Ms Anukriti Kaushal. "Deep Learning Strategies for Effective Image Forgery Detection and Localization." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827254.
Pełny tekst źródłaLiu, Yutong. "A Method for Face Expression Forgery Detection Based on Reconstruction Error." In 2024 6th International Conference on Electronics and Communication, Network and Computer Technology (ECNCT). IEEE, 2024. http://dx.doi.org/10.1109/ecnct63103.2024.10704368.
Pełny tekst źródłaChen, Oscal Tzyh-Chiang, Wei-Jei Lin, and Cheng-Tai Tsai. "Consistent Learning of Multiple Paths Using Frequency-Aware Clues for Face Forgery Detection." In 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2024. http://dx.doi.org/10.1109/icce-taiwan62264.2024.10674230.
Pełny tekst źródłaParthiban, S., V. C. Bharathi, A. Anbumani, S. Ananthi, and R. Sathya. "Enhanced Forgery Detection of Fake Face in Forensic Investigation using Convolution Neural Network." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2024. http://dx.doi.org/10.1109/icosec61587.2024.10722521.
Pełny tekst źródłaThorstensen, Eivind Bruun, Atle Helge Qvale, Vebjørn Andresen, Roy Johnsen, and Paal Bratland. "Effect of Heat Treatment and Manufacturing Method on the Susceptibility to Hydrogen Induced Stress Cracking of UNS N06625." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20899.
Pełny tekst źródłaJohnsen, Roy, Linn C. Gjelseng, Martin A. Heimsæther, Anders Jernberg, and Atle H. Qvale. "Influence of Manufacturing Process and Resulting Microstructure on HISC Susceptibility of 25Cr Duplex Stainless Steel Pipe." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13410.
Pełny tekst źródłaKhanna, Nitin, George T. C. Chiu, Jan P. Allebach, and Edward J. Delp. "Scanner identification with extension to forgery detection." In Electronic Imaging 2008, edited by Edward J. Delp III, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon. SPIE, 2008. http://dx.doi.org/10.1117/12.772048.
Pełny tekst źródłaRaporty organizacyjne na temat "Electronic forgery"
Salter and Weston. L51534 A Study of New Joining Processes for Pipelines. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0010083.
Pełny tekst źródłaHefetz, Abraham, and Justin O. Schmidt. Use of Bee-Borne Attractants for Pollination of Nonrewarding Flowers: Model System of Male-Sterile Tomato Flowers. United States Department of Agriculture, 2003. http://dx.doi.org/10.32747/2003.7586462.bard.
Pełny tekst źródła