Gotowa bibliografia na temat „Online forgery”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Online forgery”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Online forgery"
Bhatia, Shalini, Pratik Bhatia, Dheeraj Nagpal, and Sandhya Nayak. "Online Signature Forgery Prevention." International Journal of Computer Applications 75, no. 13 (2013): 21–29. http://dx.doi.org/10.5120/13172-0849.
Pełny tekst źródłaGaharwar, Gaurav, V. V. Nath, and Raina Gaharwar. "Neuro-Fuzzy Based First Responder for Image Forgery Identification." Oriental journal of computer science and technology 9, no. 1 (2016): 12–16. http://dx.doi.org/10.13005/ojcst/901.03.
Pełny tekst źródłaSarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Pełny tekst źródłaParashar, Amrita, Dr Arvind Kumar Upadhyay, and Dr Kamlesh Gupta. "A Novel Machine Learning Approach for Forgery Detection and Verification in Digital Image." ECS Transactions 107, no. 1 (2022): 11791–98. http://dx.doi.org/10.1149/10701.11791ecst.
Pełny tekst źródłaHoumani, Nesma, Sonia Garcia-Salicetti, and Bernadette Dorizzi. "On measuring forgery quality in online signatures." Pattern Recognition 45, no. 3 (2012): 1004–18. http://dx.doi.org/10.1016/j.patcog.2011.08.019.
Pełny tekst źródłaChetry, Bhimraj Prasai, and Biswajit Kar. "Kruskal Wallis and mRMR Feature Selection based Online Signature Verification System using Multiple SVM and KNN." International Journal of Experimental Research and Review 42 (August 30, 2024): 298–311. http://dx.doi.org/10.52756/ijerr.2024.v42.026.
Pełny tekst źródłaC, Raghavendra, Ratnam Dodda, Madhu Sake, and Satyanarayana Nimmala. "Advancements in CNN-Based Techniques for Robust Image Forgery Detection: Challenges and Future Directions." E3S Web of Conferences 616 (2025): 02009. https://doi.org/10.1051/e3sconf/202561602009.
Pełny tekst źródłaChen, Guorong, Chongling Du, Yuan Yu, Hong Hu, Hongjun Duan, and Huazheng Zhu. "A Deepfake Image Detection Method Based on a Multi-Graph Attention Network." Electronics 14, no. 3 (2025): 482. https://doi.org/10.3390/electronics14030482.
Pełny tekst źródłaE, Arun, Deepak S, Prakash T, and K. Ashok kumar. "Video Forgery Detection with Deep Learning Using RESNET and CNN Algorithm." International Research Journal of Computer Science 11, no. 04 (2024): 234–41. http://dx.doi.org/10.26562/irjcs.2024.v1104.17.
Pełny tekst źródłaGUO, JINHONG KATHERINE, DAVID DOERMANN, and AZRIEL ROSENFELD. "FORGERY DETECTION BY LOCAL CORRESPONDENCE." International Journal of Pattern Recognition and Artificial Intelligence 15, no. 04 (2001): 579–641. http://dx.doi.org/10.1142/s0218001401001088.
Pełny tekst źródłaRozprawy doktorskie na temat "Online forgery"
Frank, Isabella. "“Less Is More, Forget The Mass” : An Explorative Study on Product Transformation Strategies for Subscription-first Newspapers." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240668.
Pełny tekst źródłaKsiążki na temat "Online forgery"
Hunter, James a. Viridian Gate Online: Doom Forge. Shadow Alley Press Inc, 2021.
Znajdź pełny tekst źródłaHunter, James. Viridian Gate Online : Doom Forge: A litRPG Adventure. Independently published, 2019.
Znajdź pełny tekst źródłaPitts, Joelle E., Laura Bonella, Jason M. Coleman, and Adam Wathen, eds. Library Services for Online Patrons. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798400679278.
Pełny tekst źródłaStrick van Linschoten, Alex, and Felix Kuehn, eds. The Taliban Reader. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190908744.001.0001.
Pełny tekst źródłaJacobs, Brittany. Pimp Your Content - Forget Followers and Find Buyers: Your Guide to Strategically Getting Paid Online. Independently Published, 2020.
Znajdź pełny tekst źródłaOnline Shopping Tracker: -Christmas Shopping Organizer for Online Purchases-Keep Track of Every Gift Ordered-Never Forget a Needed Purchase for the Holiday Season-. Independently Published, 2020.
Znajdź pełny tekst źródłaJournals, Glenda's. They May Forget What You Said but They Will Not Forget How You Made Them Feel: An Online Shopping Tracker for Teachers. Independently Published, 2018.
Znajdź pełny tekst źródłaLee, M. T. Online Shopping Tracker Santas Beach: -Christmas Shopping Organizer for Online Purchases-Keep Track of Every Gift Ordered-Never Forget a Needed Purchase for the Holiday Season-. Independently Published, 2020.
Znajdź pełny tekst źródłaMark, Thomas. Password Journal, Password Keeper, Online Organizer: Cheap Gift, Perfect If You Often Forget Login Data, Beaufitully Designed Cover. Independently Published, 2020.
Znajdź pełny tekst źródłaPlanners, Swear Word. Don't F@#king Forget Them: Discreet Internet Password Vault - Store Online Usernames, Passwords - Funny Coworker Gag Gift - Swear Word Design. Independently Published, 2019.
Znajdź pełny tekst źródłaCzęści książek na temat "Online forgery"
Ma, Chunbo, Jun Ao, and Jianhua Li. "Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery." In Online Communities and Social Computing. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73257-0_14.
Pełny tekst źródłaHassaïne, Abdelâali, and Somaya Al-Maadeed. "An Online Signature Verification System for Forgery and Disguise Detection." In Neural Information Processing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34478-7_67.
Pełny tekst źródłaWang, Shuyi, Bing Liu, and Guido Zuccon. "How to Forget Clients in Federated Online Learning to Rank?" In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56063-7_7.
Pełny tekst źródłaHenderson, Sarah, and Ben Trupia-Melluish. "Investigating Student Engagement with Digital Interactive Learning Tools at Level One: Actual and Perceived Value of These Resources." In Creativity and Critique in Digital Learning and Teaching. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-68086-1_5.
Pełny tekst źródłaGaume, Nicolas. "The New Pact: How Online Worlds Forge a New Form of Alliance between Players and Designers." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04052-8_59.
Pełny tekst źródłaGautam, Shikha, and Anand Singh Jalal. "An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch044.
Pełny tekst źródłaGautam, Shikha, and Anand Singh Jalal. "An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties." In Digital Forensics and Forensic Investigations. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch008.
Pełny tekst źródłaNagar, Nitin, and Ugrasen Suman. "Prevention, Detection, and Recovery of CSRF Attack in Online Banking System." In Online Banking Security Measures and Data Protection. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch011.
Pełny tekst źródłaRamakrisnan, Prasanna, Mohd Farhan Shah Ahmad Rusli, and Mike Soon Tai Gan Hou. "Blockchain Framework for Sustainable and Secure Online Learning Platform." In Digital Transformation and Sustainability in Higher Education. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-5077-6.ch003.
Pełny tekst źródłaGupta, Brij B., Somya Rajan Sahoo, Prashant Chugh, Vijay Iota, and Anupam Shukla. "Defending Multimedia Content Embedded in Online Social Networks (OSNs) Using Digital Watermarking." In Handbook of Research on Multimedia Cyber Security. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2701-6.ch005.
Pełny tekst źródłaStreszczenia konferencji na temat "Online forgery"
Chen, Jiaxin, Xin Liao, Zhenxing Qian, and Zheng Qin. "Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images." In 2024 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 2024. http://dx.doi.org/10.1109/icme57554.2024.10687645.
Pełny tekst źródłaBennet, M. Anto, R. Kaushik Krishna, G. Sankar Babu, and B. S. Jayavignesh. "Performance analysis of forgery detection of JPEG image compression." In 2015 Online International Conference on Green Engineering and Technologies (IC-GET). IEEE, 2015. http://dx.doi.org/10.1109/get.2015.7453773.
Pełny tekst źródłaWu, Haiwei, Jiantao Zhou, Jinyu Tian, and Jun Liu. "Robust Image Forgery Detection over Online Social Network Shared Images." In 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2022. http://dx.doi.org/10.1109/cvpr52688.2022.01308.
Pełny tekst źródłaMuramatsu, Daigo. "Random forgery attacks against DTW-based online signature verification algorithm." In the 2011 ACM Symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1982185.1982192.
Pełny tekst źródłaSreelakshmy I J and Jesna Anver. "An improved method for copy-move forgery detection in digital forensic." In 2016 Online International Conference on Green Engineering and Technologies (IC-GET). IEEE, 2016. http://dx.doi.org/10.1109/get.2016.7916684.
Pełny tekst źródłaSung Wook Lee, Jae Ik Lee, and Dong-Guk Han. "A study of the threat of forgery of certificates issued online." In 2013 International Carnahan Conference on Security Technology (ICCST). IEEE, 2013. http://dx.doi.org/10.1109/ccst.2013.6922060.
Pełny tekst źródłaMuramatsu, Daigo, and Yasushi Yagi. "Attacks using random forgery against DTW-based online signature verification algorithm." In 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2012. http://dx.doi.org/10.1109/icsmc.2012.6377913.
Pełny tekst źródłaChang, Won-Du, and Jungpil Shin. "DPW Approach for Random Forgery Problem in Online Handwritten Signature Verification." In 2008 Fourth International Conference on Networked Computing and Advanced Information Management (NCM). IEEE, 2008. http://dx.doi.org/10.1109/ncm.2008.118.
Pełny tekst źródłaUtakrit, Nattakant, and Pornwilai Sukmak. "DISTANCE EDUCATION EXAMINATION ON FORGERY ATTRIBUTES OF ONLINE DEGREE FOR SALE: INFORMATION ASSURANCE ASPECT." In International Technology, Education and Development Conference. IATED, 2016. http://dx.doi.org/10.21125/iceri.2016.1961.
Pełny tekst źródłaDapeng Zhang, Shinkichi Inagaki, Naoki Kanada, and Tatsuya Suzuki. "Online signature verification system with anti-forgery provision based on segmentation and structure learning of HMM." In 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2010. http://dx.doi.org/10.1109/icsmc.2010.5641912.
Pełny tekst źródła