Works matching DE "INTELLECTUAL property theft"
Results: 83
Intellectual property: Safeguard the ideas of junior scientists.
- Published in:
- 2015
- By:
- Publication type:
- Letter to the Editor
IS IT TIME FOR THE IRON SQUARE?
- Published in:
- Defense Acquisition, 2022, v. 51, n. 3, p. 18
- By:
- Publication type:
- Article
The China‐U.S. Trade War and Future Economic Relations.
- Published in:
- 2020
- By:
- Publication type:
- Book Review
INSTITUTIONAL FRAMEWORKS THAT GUIDE RESEARCH INTEGRITY AND SECURITY TOWARDS PROTECTION OF IP AND MANAGEMENT OF TECHNOLOGY TRANSFER IN UNIVERSITIES IN KENYA.
- Published in:
- African Journal of Food, Agriculture, Nutrition & Development, 2024, v. 24, n. 4, p. 1, doi. 10.18697/ajfand.129.SC016
- By:
- Publication type:
- Article
A Short History of Uighur Resistance.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Biden's Possible Strategic Blunder.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Will this journal exist in 5 years' time?
- Published in:
- 2024
- By:
- Publication type:
- Question & Answer
From "Bridge" to "Starlink": An Update on Kang Phee Seng's Model of Theology and Science Dialogue Toward a Chinese Theology of Science on Creativity.
- Published in:
- Theology & Science, 2025, v. 23, n. 1, p. 202, doi. 10.1080/14746700.2024.2436788
- By:
- Publication type:
- Article
China is the New Tesla.
- Published in:
- International Policy Digest, 2024, p. 1
- By:
- Publication type:
- Article
SOCIAL MEDIA AND THE ART OF INTELLECTUAL PROPERTY THEFT.
- Published in:
- Media Transformations / Mediju Transformacijos, 2016, v. 12, p. 98, doi. 10.7220/2029-8668.12.06
- By:
- Publication type:
- Article
Network intrusion detection system for DDoS attacks in ICS using deep autoencoders.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 5059, doi. 10.1007/s11276-022-03214-3
- By:
- Publication type:
- Article
Navigating subjectivity in AI-generated photography: The quest for ethics and creative agency.
- Published in:
- Philosophy of Photography, 2024, v. 15, n. 1/2, p. 143, doi. 10.1386/pop_00097_1
- By:
- Publication type:
- Article
Cyber Offense and a Changing Strategic Paradigm.
- Published in:
- Washington Quarterly, 2022, v. 45, n. 1, p. 38, doi. 10.1080/0163660X.2022.2054123
- By:
- Publication type:
- Article
Beyond Chinese Spy Balloons: Why We Need to Teach East Asian Studies in U.S. Homeland Security and Emergency Preparedness Programs.
- Published in:
- Journal of Homeland Security & Emergency Management, 2025, v. 22, n. 1, p. 81, doi. 10.1515/jhsem-2023-0029
- By:
- Publication type:
- Article
Advancing Kinesiology Through Improved Peer Review.
- Published in:
- Research Quarterly for Exercise & Sport, 2014, v. 85, n. 2, p. 127, doi. 10.1080/02701367.2014.898117
- By:
- Publication type:
- Article
A deep hybrid learning model for detection of cyber attacks in industrial IoT devices.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2022, v. 123, n. 5/6, p. 1973, doi. 10.1007/s00170-022-10329-6
- By:
- Publication type:
- Article
BLOOM ENERGY - VERY SATISFYING INVESTOR DAY.
- Published in:
- H2 International, 2022, n. 3, p. 52
- By:
- Publication type:
- Article
CYBERSECURITY -- the No. 1 threat facing manufacturers.
- Published in:
- Industrial Management, 2018, v. 60, n. 4, p. 24
- By:
- Publication type:
- Article
Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 19, p. 4018, doi. 10.3390/app9194018
- By:
- Publication type:
- Article
Intellectual Property & Global Policy.
- Published in:
- Global Policy, 2017, v. 8, n. 2, p. 149, doi. 10.1111/1758-5899.12381
- By:
- Publication type:
- Article
Intellectual Property Piracy: The Case of Manga and Anime in the US.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
Message from the Editor.
- Published in:
- Engineering Design Graphics Journal, 2021, v. 85, p. 5
- By:
- Publication type:
- Article
The Elephant in the Room of WTO Reform: China.
- Published in:
- CESifo Forum, 2021, v. 22, n. 2, p. 22
- By:
- Publication type:
- Article
Watchful Eye.
- Published in:
- Quality Progress, 2022, v. 55, n. 2, p. 8
- Publication type:
- Article
A cyber-physical attack taxonomy for production systems: a quality control perspective.
- Published in:
- Journal of Intelligent Manufacturing, 2019, v. 30, n. 6, p. 2489, doi. 10.1007/s10845-018-1408-9
- By:
- Publication type:
- Article
A Deep Learning Artificial Neural Network Algorithm for Instance-based Arabic Language Authorship Attribution.
- Published in:
- Advances in Data Science & Adaptive Analysis, 2021, v. 13, n. 3/4, p. 1, doi. 10.1142/S2424922X21430026
- By:
- Publication type:
- Article
Did Wallace's Ternate essay and letter on natural selection come as a reply to Darwin's letter of 22 December 1857? A brief review.
- Published in:
- Biological Journal of the Linnean Society, 2016, v. 118, n. 2, p. 421, doi. 10.1111/bij.12740
- By:
- Publication type:
- Article
Random sampling strategies for multivariate statistical process control to detect cyber-physical manufacturing attacks.
- Published in:
- Quality Engineering, 2021, v. 33, n. 2, p. 300, doi. 10.1080/08982112.2020.1838541
- By:
- Publication type:
- Article
Cyber-physical attack vulnerabilities in manufacturing quality control tools.
- Published in:
- Quality Engineering, 2020, v. 32, n. 4, p. 676, doi. 10.1080/08982112.2020.1737115
- By:
- Publication type:
- Article
Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED).
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 4, p. 621, doi. 10.1007/s10207-020-00522-7
- By:
- Publication type:
- Article
Entrepreneurial Resilience, High Impact Challenges, and Firm Performance.
- Published in:
- Journal of Management Policy & Practice, 2017, v. 18, n. 2, p. 28
- By:
- Publication type:
- Article
Illegal Adoption of a New Product: A Model of Software Piracy Behavior.
- Published in:
- Advances in Consumer Research, 1995, v. 22, n. 1, p. 693
- By:
- Publication type:
- Article
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.
- Published in:
- Entropy, 2022, v. 24, n. 10, p. 1379, doi. 10.3390/e24101379
- By:
- Publication type:
- Article
مفهوم الجريمة الالكترونية وأثرها السلبي على مستخدمي مواقع التواصل الاجتماعي الانترنت
- Published in:
- Rihan Journal for Science Publishing, 2024, n. 49, p. 363
- By:
- Publication type:
- Article
Beyond the Cell Walls: Cybersecurity Insights From The Shawshank Redemption.
- Published in:
- ISACA Journal, 2024, n. 4, p. 30
- By:
- Publication type:
- Article
Building Resilient Security in the Age of the Great Reshuffle.
- Published in:
- ISACA Journal, 2022, n. 5, p. 51
- By:
- Publication type:
- Article
A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 5, p. 1107, doi. 10.3390/electronics12051107
- By:
- Publication type:
- Article
Intellectual Property Theft Protection in IoT Based Precision Agriculture Using SDN.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 16, p. 1987, doi. 10.3390/electronics10161987
- By:
- Publication type:
- Article
ІНТЕРНЕТ-САЙТ ЯК ОБ’ЄКТ ІТ-ПРАВА.
- Published in:
- Law of Ukraine / Pravo Ukraini, 2018, n. 1, p. 103
- By:
- Publication type:
- Article
CHINA'S GRAND STRATEGY AND AUSTRALIA'S FUTURE IN THE NEW GLOBAL ORDER.
- Published in:
- 2021
- By:
- Publication type:
- Book Review
Daniel Fata: Ukraine does not only seek security guarantees; it can also enhance NATO's strength.
- Published in:
- Lithuanian Foreign Policy Review, 2023, v. 42, p. 26
- By:
- Publication type:
- Article
Weak IPRs as Impediments to Technology Transfer- Findings from Select Asian Countries.
- Published in:
- Journal of Intellectual Property Rights, 2013, v. 18, n. 5, p. 399
- By:
- Publication type:
- Article
Fateful Decisions: Choices That Will Shape China's Future.
- Published in:
- Developing Economies, 2020, v. 58, n. 4, p. 397, doi. 10.1111/deve.12251
- By:
- Publication type:
- Article
ინოვაციური მეწარმეობის როლი საქართველოს მდგრად ეკონომიკურ განვითარებაში
- Published in:
- Economics & Business (1987-5789), 2024, n. 3, p. 65, doi. 10.52340/eab.2024.16.03.05
- By:
- Publication type:
- Article
He Saved the Euro. Can He Now Save the Atlantic Alliance?
- Published in:
- International Economy, 2021, v. 35, n. 1, p. 5
- By:
- Publication type:
- Article
Global Economic Trumpism.
- Published in:
- 2018
- By:
- Publication type:
- Interview
Globalization of Clean Energy Technology: Lessons from China.
- Published in:
- 2022
- By:
- Publication type:
- Book Review
CONSUMER DECISION MODEL OF INTELLECTUAL PROPERTY THEFT IN EMERGING MARKETS.
- Published in:
- Organizations & Markets in Emerging Economies, 2012, v. 3, n. 1, p. 58, doi. 10.15388/omee.2012.3.1.14275
- By:
- Publication type:
- Article
DEFENDING AMERICA AGAINST CHINESE CYBER ESPIONAGE THROUGH THE USE OF ACTIVE DEFENSES.
- Published in:
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- By:
- Publication type:
- Article
The New Enlightenment and the Fight to Free Knowledge: by Peter B. Kaufman, New York, Seven Stories Press, 2021, 256 pp., $40 (hardcover); $18.95 (paperback); $7.79 (e-book), ISBN 9781644210604.
- Published in:
- Slavic & East European Information Resources, 2023, v. 24, n. 1, p. 94, doi. 10.1080/15228886.2023.2171716
- By:
- Publication type:
- Article