Добірка наукової літератури з теми "Unauthorized actions"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Unauthorized actions".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Unauthorized actions"
Voinik, Anna A., and Margarita R. Snegur. "Motives for participation of youth in unauthorized protest actions." Vestnik of Saint Petersburg University. Sociology 16, no. 3 (2023): 259–77. http://dx.doi.org/10.21638/spbu12.2023.302.
Повний текст джерелаРабенко, Татьяна Геннадьевна, and Анастасия Олеговна Терентьева. "The Dissemination Model of Unauthorized Information in the Virtual Communication Space (Based on the Material of the VKontakte Social Network)." Philology & Human, no. 1 (March 21, 2025): 7–26. https://doi.org/10.14258/filichel(2025)1-01.
Повний текст джерелаAkhramovych, Volodymyr, and Vadym Akhramovych. "Quantitative assessment of the probability of protective system functioning without unlawful actions." Collection "Information Technology and Security" 12, no. 2 (2024): 257–67. https://doi.org/10.20535/2411-1031.2024.12.2.315745.
Повний текст джерелаKrasnova, Anzhela, and Tat'yana Gribok. "TERRORISM AT DANGEROUS PRODUCTION FACILITIES. MEASURES OF PROTECTION AGAINST TERRORISM." Scientific Papers Collection of the Angarsk State Technical University 2020, no. 1 (2020): 338–43. http://dx.doi.org/10.36629/2686-7788-2020-1-338-343.
Повний текст джерелаPopov E. V., Popov E. V., Panteleev V. A. Panteleev V. A., Segal M. D. Segal M. D., Gavrilov S. L. Gavrilov S. L., Ovsynik A. I. Ovsynik A. I., and Lysenko I. A. Lysenko I. A. "THE RADIOLOGICAL CONSEQUENCES OF UNAUTHORIZED ACTIONS WITH RADIOISOTOPE SOURCES OF IONIZING RADIATION." Technology of technosphere safety 85 (2019): 115–26. http://dx.doi.org/10.25257/tts.2019.3.85.115-126.
Повний текст джерелаKhanov, T. A., and A. T. Sadvakasova. "COMPENSATION FOR DAMAGE CAUSED BY THE PRODUCTION OF ILLEGAL UNAUTHORIZED INVESTIGATIVE ACTIONS." Russian-Asian Legal Journal, no. 3 (September 28, 2020): 37–42. http://dx.doi.org/10.14258/ralj(2020)3.8.
Повний текст джерелаKudryavtseva, Vera, and Natalia Vasileva. "On some problems of the legal regime of unauthorized construction objects." MATEC Web of Conferences 212 (2018): 09002. http://dx.doi.org/10.1051/matecconf/201821209002.
Повний текст джерелаVarma, Jahith Sai Krishna. "EagleAI: AI Powered Real Time Restricted Area Surveillance." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3499–506. https://doi.org/10.22214/ijraset.2025.70612.
Повний текст джерелаDeen-Racsmány, Zsuzsanna. "A Redistribution of Authority Between the UN and Regional Organizations in the Field of the Maintenance of Peace and Security?" Leiden Journal of International Law 13, no. 2 (2000): 297–331. http://dx.doi.org/10.1017/s0922156500000212.
Повний текст джерелаKrismanto, Rachmat Satyo, and Luluk Lusiati Cahyarini. "The Legal Review Regarding Copyright Protection of Songs from Unauthorized Song Cover Actions." Jurnal Daulat Hukum 5, no. 3 (2022): 164. http://dx.doi.org/10.30659/jdh.v5i3.23078.
Повний текст джерелаДисертації з теми "Unauthorized actions"
Балакін, Сергій В'ячеславович. "Методи та засоби підвищення достовірності ідентифікації несанкціонованих дій та атак в комп’ютерній мережі". Thesis, Національний авіаційний університет, 2018. http://er.nau.edu.ua/handle/NAU/37400.
Повний текст джерелаEdlander, Timmie. "Akademiskt fusk : En kvalitativ studie om hur studenter motiverar handlingar som har föranlett disciplinära åtgärder." Thesis, Karlstads universitet, Institutionen för sociala och psykologiska studier, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-57027.
Повний текст джерелаBarbero, Maria Victoria. "DACA, Immigrant Youth, and Education: An Analysis of Elite Narratives on Nationhood, Citizenship, and Belonging in the U.S." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405518424.
Повний текст джерелаChiou, Huey-Ling, and 邱惠玲. "The Scope of Disciplinary Measures for the Unauthorized Actions Conducted Illegally by Civil Servants." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/20465914841432475139.
Повний текст джерелаКниги з теми "Unauthorized actions"
Villa, Brian Loring. Unauthorized action: Mountbatten and the Dieppe raid. 2nd ed. Oxford University Press, 1990.
Знайти повний текст джерелаVilla, Brian Loring. Unauthorized action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.
Знайти повний текст джерелаVilla, Brian Loring. Unauthorized Action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.
Знайти повний текст джерелаVilla, Brian Loring. Unauthorized action: Mountbatten and the Dieppe Raid. Oxford University Press, 1989.
Знайти повний текст джерелаLtd, Publications International, ed. Action Strategies for Mortal Kombat: An Unauthorized Players' Guide. Publications International, 1993.
Знайти повний текст джерелаNick, Roberts. Bomberman 64: Unauthorized Game Secrets. Prima Publishing, Prima Games, 1997.
Знайти повний текст джерелаAnthony, James. Blast Corps: Unauthorized Game Secrets. Prima Publishing, Prima Games, 1997.
Знайти повний текст джерелаBradyGames. Totally Unauthorized Guide to Donkey Kong Country. BradyGames, 1995.
Знайти повний текст джерелаService, United States Forest. National recreation residence review and action plan. Washington Office, Lands, 1993.
Знайти повний текст джерелаJohn, Marshall. GI Joe and other backyard heroes: An unauthorized guide. Schiffer Pub., 1997.
Знайти повний текст джерелаЧастини книг з теми "Unauthorized actions"
Sgambati, Domenico, Erica Moura, Ala Eddine Said, et al. "Monitoraggio, conservazione e informazione nella Baia Di Ieranto: un modello circolare per la gestione delle Aree Marine Protette." In Proceedings e report. Firenze University Press, 2020. http://dx.doi.org/10.36253/978-88-5518-147-1.60.
Повний текст джерелаKosar, Kosar, Mohamed Fauzi Packeer Mohamed, Naeemul Islam, Rabiul Hasan Tarek, and Md Fahim Shahrier Khan. "GSM Based Bank Vault Surveillance Process with Finger Print and Password and Preventative Action Against Unauthorized Person." In Lecture Notes in Electrical Engineering. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8129-5_64.
Повний текст джерелаMei, Rui, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu, and Weiping Wen. "Considerations on Evaluation of Practical Cloud Data Protection." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_4.
Повний текст джерелаChristensen, Anne L., Jane Cote, and Claire K. Latham. "Unauthorized electronic access: Students’ ethics, attitudes, and actions." In Advances in Accounting Education. Emerald Group Publishing Limited, 2010. http://dx.doi.org/10.1108/s1085-4622(2010)0000011014.
Повний текст джерелаBarr, Warren, and John Picton. "36. Limitation of action." In Pearce & Stevens' Trusts and Equitable Obligations. Oxford University Press, 2022. http://dx.doi.org/10.1093/he/9780198867494.003.0036.
Повний текст джерелаMakhutov Nikolay A. and Gadenin Mikhail M. "Comparative Methods For The Assessment Of Threats Of Terrorist and Unauthorized Actions." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2012. https://doi.org/10.3233/978-1-61499-131-1-1.
Повний текст джерелаBhimavarapu, Usharani. "Defending Against Phishing Attacks on Social Media." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch005.
Повний текст джерелаSaini, Anil, Manoj Singh Gaur, and Vijay Laxmi. "A Taxonomy of Browser Attacks." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch019.
Повний текст джерелаChitadze, Nika. "Basic Principles of Information and Cyber Security." In Analyzing New Forms of Social Disorders in Modern Virtual Environments. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-5760-3.ch009.
Повний текст джерелаSharma, Srishti, and Yogita Gigras. "A Survey." In Detecting and Mitigating Robotic Cyber Security Risks. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2154-9.ch006.
Повний текст джерелаТези доповідей конференцій з теми "Unauthorized actions"
Byl, M. F., M. B. Frish, R. T. Wainner, et al. "Pipeline Evaluation Network for Protection from Third-Party Intrusion." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11307.
Повний текст джерелаAbdenov, Amirsa Zh, Yuri A. Kotov, and Victor A. Trushin. "Analysis and Classification of Potentially Unauthorized Actions to Information in Automatic and Automated Systems Resource Areas." In 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE). IEEE, 2018. http://dx.doi.org/10.1109/apeie.2018.8545518.
Повний текст джерелаZhu, Sophia, Jaap Bouman, and Damodaran Raghu. "Flange Quality Investigation to Prevent Brittle Fracture." In ASME 2017 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/pvp2017-66179.
Повний текст джерелаWalusiak, Lukasz, Natalia Rylko, and Maciej Zdanski. "Analyze the encryption and decryption methods using the catalan sequence." In 38th ECMS International Conference on Modelling and Simulation. ECMS, 2024. http://dx.doi.org/10.7148/2024-0286.
Повний текст джерелаMikulski, Dariusz, and Steven R. Russo. "MICROTOKEN EXCHANGE (MTE) FOR SECURING DIGITAL DATA FROM CYBER WARFARE ATTACKS." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3681.
Повний текст джерелаPonomarev, Andrey, Oleg Serebrennikov, Gleb Guglya, Oleg Korotkevich, and Andrey Proletarskiy. "THE USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES TO IMPLEMENT A MULTI-FACTOR ANALYSIS OF A STUDENT'S ACTIONS DURING AN EXAM." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-143.
Повний текст джерелаAndrade, César, Paulo Henrique Gonçalves, Hendrio Bragança, and Eduardo Souto. "Autenticação Contínua de Usuários Utilizando Contadores de Desempenho do Sistema Operacional." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13979.
Повний текст джерелаC, Saranya, Sanjana S, Monika G S, Meghana Reddy M G, and Monika G K. "Guarding Against the Invisible Threats: Insights into Cybersecurity Risks and Solutions." In International Conference on Recent Trends in Computing & Communication Technologies (ICRCCT’2K24). International Journal of Advanced Trends in Engineering and Management, 2024. http://dx.doi.org/10.59544/uacm2592/icrcct24p56.
Повний текст джерелаБерберова, Мария, Mariya Berberova, Антон Обоймов, et al. "Risk-informed Security System. The Use of Surveillance Cameras for the Particularly Hazardous Facilities Safety." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-2-321-325.
Повний текст джерелаĆurčić, Milica, Marija Janković, and Slavko Dimović. "Possibility of Insider Threat to Nuclear Power Plants." In International Conference IcETRAN. ETRAN Society, Academic Mind, Belgrade, 2024. https://doi.org/10.69994/11ic24030.
Повний текст джерелаЗвіти організацій з теми "Unauthorized actions"
Harrington, Matthew, Amanda Lanik, and Chad Hults. Paleontological resource monitoring at Kaguyak Point, Katmai National Park and Preserve. National Park Service, 2023. http://dx.doi.org/10.36967/2298794.
Повний текст джерелаMaletta, Giovanna, and Lauriane Héau. Funding Arms Transfers through the European Peace Facility: Preventing Risks of Diversion and Misuse. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/oelz9733.
Повний текст джерелаFedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzsp5617.
Повний текст джерела