Works matching DE "LEAKS (Disclosure of information)"
Results: 372
The Practice and Politics of Leaking.
- Published in:
- Social Alternatives, 2011, v. 30, n. 1, p. 24
- By:
- Publication type:
- Article
A Study on Financing Security for Smartphones Using Text Mining.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 4, p. 3109, doi. 10.1007/s11277-017-4121-7
- By:
- Publication type:
- Article
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1975, doi. 10.1007/s11277-014-1968-8
- By:
- Publication type:
- Article
A Study on Convergence Security System for Preventing Leakage of Internal Information.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 2, p. 175, doi. 10.1007/s11277-013-1228-3
- By:
- Publication type:
- Article
Secret disservice.
- Published in:
- Nature, 2012, v. 487, n. 7408, p. 405, doi. 10.1038/487405a
- Publication type:
- Article
US drug agency spied on scientists.
- Published in:
- Nature, 2012, v. 487, n. 7408, p. 418, doi. 10.1038/487418a
- By:
- Publication type:
- Article
Seven days: 13-19 July 2012.
- Published in:
- Nature, 2012, v. 487, n. 7407, p. 276, doi. 10.1038/487276a
- Publication type:
- Article
Blackened names.
- Published in:
- 2011
- Publication type:
- Editorial
The collider that cried 'Higgs'.
- Published in:
- Nature, 2011, v. 473, n. 7346, p. 136, doi. 10.1038/473136a
- By:
- Publication type:
- Article
ШТА НАВОДИ МИЛЕНИЈАЛЦЕ НА УЗБУЊИВАЊЕ? ОД КУЛТУРОЛОШКЕ ДО СОЦИО-ПСИХОЛОШКЕ ПЕРСПЕКТИВЕ УЗБУЊИВАЊА
- Published in:
- Socioloski Pregled, 2021, v. 55, n. 4, p. 1674, doi. 10.5937/socpreg55-34725
- By:
- Publication type:
- Article
A Comprehensive Study of Citizen Safety App.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3067
- By:
- Publication type:
- Article
Analysis of Pattern Matching Techniques used for Information Leakage.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2574
- By:
- Publication type:
- Article
THE POSITIONS OF LEADING WESTERN EUROPE COUNTRIES ON THE ARMENIAAZERBAIJAN, NAGORNO-KARABAKH CONFLICT WITHIN INTERNATIONAL ORGANIZATIONS.
- Published in:
- Hileya: Scientific Bulletin / Gileya, 2020, n. 156, p. 293
- By:
- Publication type:
- Article
Improved Hybrid Bagging Resampling Framework for Deep Learning-Based Side-Channel Analysis.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 8, p. 210, doi. 10.3390/computers13080210
- By:
- Publication type:
- Article
ОСОБЛИВОСТІ ФОРМУВАННЯ ТЕХНІЧНИХ КАНАЛІВ ВИТОКУ ІНФОРМАЦІЇ ВІД СУЧАСНИХ ІКС.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2023, v. 29, n. 2, p. 80, doi. 10.18372/2225-5036.29.17872
- By:
- Publication type:
- Article
Fuzzy neural production network model for information security systems.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 231, doi. 10.18372/2225-5036.20.7548
- By:
- Publication type:
- Article
Whistleblowing: Reaping the benefits.
- Published in:
- Academy of Management Executive, 1994, v. 8, n. 3, p. 65, doi. 10.5465/AME.1994.9503101177
- By:
- Publication type:
- Article
Fuga de información por ultrasonido: un delito sobre datos personales.
- Published in:
- Revista Logos Ciencia & Tecnologia, 2022, v. 14, n. 3, p. 102, doi. 10.22335/rlct.v14i3.1618
- By:
- Publication type:
- Article
Securities Regulation, the Timing of Annual Report Release, and Market Implications: Evidence from China.
- Published in:
- Journal of International Financial Management & Accounting, 2006, v. 17, n. 2, p. 110, doi. 10.1111/j.1467-646X.2006.00123.x
- By:
- Publication type:
- Article
DESAFIOS DA COORDENAÇÃO DE UM PROGRAMA DE PÓS-GRADUAÇÃO: RELATO DE UMA EXPERIÊNCIA.
- Published in:
- RBPG. Revista Brasileira de Pós-Graduação, 2020, v. 16, n. 35, p. 1, doi. 10.21713/rbpg.v16i35.1710
- By:
- Publication type:
- Article
Millennials: Truthtellers or Threats?
- Published in:
- International Journal of Intelligence & Counterintelligence, 2019, v. 32, n. 2, p. 354, doi. 10.1080/08850607.2019.1565276
- By:
- Publication type:
- Article
A Psycho-Social Motivational Theory of Mass Leaking.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2018, v. 31, n. 1, p. 116, doi. 10.1080/08850607.2017.1374800
- By:
- Publication type:
- Article
IC Data Mining in the Post-Snowden Era.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2016, v. 29, n. 4, p. 700, doi. 10.1080/08850607.2016.1148488
- By:
- Publication type:
- Article
The Press as an Agent of Oversight: The NSA Leaks.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2016, v. 29, n. 1, p. 26, doi. 10.1080/08850607.2015.1083311
- By:
- Publication type:
- Article
Intelligence Exchange Through InterIntel.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 1, p. 1, doi. 10.1080/08850607.2011.598782
- By:
- Publication type:
- Article
Truth in Intelligence: A Cautionary Tale.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2009, v. 22, n. 2, p. 320, doi. 10.1080/08850600802698267
- By:
- Publication type:
- Article
Knowledge Leakages and Ways to Reduce Them in Small and Medium-Sized Enterprises (SMEs).
- Published in:
- Information (2078-2489), 2014, v. 5, n. 3, p. 440, doi. 10.3390/info5030440
- By:
- Publication type:
- Article
Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes.
- Published in:
- Future Internet, 2019, v. 11, n. 11, p. 234, doi. 10.3390/fi11110234
- By:
- Publication type:
- Article
An Improved Smart Card Based Remote user Authentication Scheme with Session Key Agreement During the Verification Phase.
- Published in:
- Journal of Applied Computer Science & Mathematics, 2011, n. 11, p. 38
- By:
- Publication type:
- Article
NEW LAWS CRIMINALISE RECORDING OF INFORMATION AND WHISTLEBLOWING.
- Published in:
- 2015
- By:
- Publication type:
- Opinion
Bargaining under the Illusion of Transparency.
- Published in:
- American Economic Review, 2021, v. 111, n. 11, p. 3500, doi. 10.1257/aer.20150004
- By:
- Publication type:
- Article
What's Hot.
- Published in:
- Asia-Pacific Journal: Japan Focus, 2010, n. 49, p. 4
- Publication type:
- Article
LEAKER TRAITOR WHISTLEBLOWER SPY: NATIONAL SECURITY LEAKS AND THE FIRST AMENDMENT.
- Published in:
- Boston University Law Review, 2014, v. 94, n. 2, p. 449
- By:
- Publication type:
- Article
Critical Infrastructure: Mapping the Leaky Plumbing of US Hegemony.
- Published in:
- Antipode, 2012, v. 44, n. 1, p. 5, doi. 10.1111/j.1467-8330.2011.00931.x
- By:
- Publication type:
- Article
A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client.
- Published in:
- PLoS ONE, 2024, v. 19, n. 4, p. 1, doi. 10.1371/journal.pone.0301277
- By:
- Publication type:
- Article
MOTIVES AND ACCOUNTANTS' ROLE FOR GREEN ACCOUNTING-REPORTING TO WARDS MINIMIZING FINANCIAL LEAKAGES.
- Published in:
- Malaysian Accounting Review, 2016, v. 15, n. 2, p. 35
- By:
- Publication type:
- Article
Commonwealth of Australia.
- Published in:
- Australian Journal of Politics & History, 2019, v. 65, n. 2, p. 295, doi. 10.1111/ajph.12576
- By:
- Publication type:
- Article
Commonwealth of Australia January to June 2018.
- Published in:
- Australian Journal of Politics & History, 2018, v. 64, n. 4, p. 657, doi. 10.1111/ajph.12521
- By:
- Publication type:
- Article
Trump's "Madman" game in North Korea and the Pakistan Model.
- Published in:
- North Korean Review, 2020, v. 16, n. 1, p. 82
- By:
- Publication type:
- Article
Doctor jailed for 15 years for leaking 'state secrets'.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2009, v. 44, n. 11, p. 6
- Publication type:
- Article
Outwitting the White House.
- Published in:
- Journalism Educator, 1973, v. 28, n. 1, p. 42
- Publication type:
- Article
The Unintended Consequences of Disclosure: Effect of Manipulating Sponsor Identification on the Perceived Credibility and Effectiveness of Smoking Cessation Advertisements.
- Published in:
- Journal of Health Communication, 2012, v. 17, n. 10, p. 1119, doi. 10.1080/10810730.2012.665425
- By:
- Publication type:
- Article
Project Disharmony: The Murdoch Family in Court.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
Automated redaction of names in adverse event reports using transformer-based neural networks.
- Published in:
- BMC Medical Informatics & Decision Making, 2024, v. 24, n. 1, p. 1, doi. 10.1186/s12911-024-02785-9
- By:
- Publication type:
- Article
LEAK PROSECUTIONS AND THE FIRST AMENDMENT: NEW DEVELOPMENTS AND A CLOSER LOOK AT THE FEASIBILITY OF PROTECTING LEAKERS.
- Published in:
- William & Mary Law Review, 2015, v. 56, n. 4, p. 1221
- By:
- Publication type:
- Article
The Dobbs Leak and Reproductive Justice.
- Published in:
- Quarterly Journal of Speech, 2022, v. 108, n. 4, p. 421, doi. 10.1080/00335630.2022.2128205
- By:
- Publication type:
- Article
Contests with revisions.
- Published in:
- Experimental Economics, 2023, v. 26, n. 4, p. 915, doi. 10.1007/s10683-023-09803-z
- By:
- Publication type:
- Article
Verification of serialising instructions for security against transient execution attacks.
- Published in:
- IET Computers & Digital Techniques (Wiley-Blackwell), 2023, v. 17, n. 3/4, p. 127, doi. 10.1049/cdt2.12058
- By:
- Publication type:
- Article
Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists.
- Published in:
- IET Computers & Digital Techniques (Wiley-Blackwell), 2023, v. 17, n. 3/4, p. 75, doi. 10.1049/cdt2.12057
- By:
- Publication type:
- Article
MİLLİ İSTİHBARAT TEŞKİLATININ 1966-1982 YILLARI ARASINDA EDİNDİĞİ CİHAZ VE ARAÇLAR.
- Published in:
- Belgi Dergisi, 2023, n. 25, p. 159, doi. 10.33431/belgi.1174275
- By:
- Publication type:
- Article