Works matching DE "SECURITY classification (Government documents)"
Results: 326
The Freedom of Information Act as a Methodological Tool: Suing the Government for Data.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2006, v. 48, n. 4, p. 499, doi. 10.3138/cjccj.48.4.499
- By:
- Publication type:
- Article
CLASSIFIED INFORMATION IN FEDERAL COURT.
- Published in:
- Villanova Law Review, 2008, v. 53, n. 5, p. 889
- By:
- Publication type:
- Article
An Improved Method of Automated Nonparametric Content Analysis for Social Science.
- Published in:
- Political Analysis, 2023, v. 31, n. 1, p. 42, doi. 10.1017/pan.2021.36
- By:
- Publication type:
- Article
A COMPARATIVE ASSESSMENT OF THE POVERTY AND FOOD INSECURITY EXPERIENCE BETWEEN FOOD ENTREPRENEURS AND SMALLHOLDER FARMERS IN RURAL ZAMBIA.
- Published in:
- Journal of Agribusiness & Rural Development, 2023, v. 69, n. 3, p. 279, doi. 10.17306/J.JARD.2023.01730
- By:
- Publication type:
- Article
Why Snowden and not Greenwald? On the Accountability of the Press for Unauthorized Disclosures of Classified Information.
- Published in:
- Law & Philosophy, 2020, v. 39, n. 2, p. 203, doi. 10.1007/s10982-019-09367-1
- By:
- Publication type:
- Article
The Feasibility of a Public Interest Defense for Whistleblowing.
- Published in:
- Law & Philosophy, 2020, v. 39, n. 1, p. 1, doi. 10.1007/s10982-019-09359-1
- By:
- Publication type:
- Article
ШТА НАВОДИ МИЛЕНИЈАЛЦЕ НА УЗБУЊИВАЊЕ? ОД КУЛТУРОЛОШКЕ ДО СОЦИО-ПСИХОЛОШКЕ ПЕРСПЕКТИВЕ УЗБУЊИВАЊА
- Published in:
- Socioloski Pregled, 2021, v. 55, n. 4, p. 1674, doi. 10.5937/socpreg55-34725
- By:
- Publication type:
- Article
RIGHT TO INFORMATION AND AMBIGUITIES GENERATED BY CLASSIFICATION OF DOCUMENTS.
- Published in:
- Constitutional Law Review / Revista de Drept Constitutional (RDC), 2024, n. 1, p. 49
- By:
- Publication type:
- Article
Straining our Security.
- Published in:
- ISSA Journal, 2024, v. 22, n. 6, p. 18
- By:
- Publication type:
- Article
Secrets, Lies, Discord, and Humility.
- Published in:
- ISSA Journal, 2023, v. 21, n. 12, p. 5
- By:
- Publication type:
- Article
CONSEQUENCES OF BREXIT: THE LONG-AWAITED AGREEMENT ON THE FUTURE RELATIONS OF THE UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND WITH THE EUROPEAN UNION.
- Published in:
- Journal of Law & Administrative Sciences, 2020, n. 14, p. 11
- By:
- Publication type:
- Article
A framework for a feedback process to analyze and personalize a document vector space in a feature extraction model.
- Published in:
- Information Technology & Management, 2009, v. 10, n. 2/3, p. 151, doi. 10.1007/s10799-009-0055-4
- By:
- Publication type:
- Article
ENCRYPTED CLASSIFIED VOICE INFORMATION AND THE MANAGEMENT OF ITS SUSTAINABILITY.
- Published in:
- Journal of Defense Resources Management, 2022, v. 13, n. 1, p. 204
- By:
- Publication type:
- Article
Explainable Security Requirements Classification Through Transformer Models.
- Published in:
- Future Internet, 2025, v. 17, n. 1, p. 15, doi. 10.3390/fi17010015
- By:
- Publication type:
- Article
Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays.
- Published in:
- Future Internet, 2024, v. 16, n. 9, p. 303, doi. 10.3390/fi16090303
- By:
- Publication type:
- Article
Automated Identification of Sensitive Financial Data Based on the Topic Analysis.
- Published in:
- Future Internet, 2024, v. 16, n. 2, p. 55, doi. 10.3390/fi16020055
- By:
- Publication type:
- Article
MANAGEMENTUL CONFLICTELOR ŞI COMUNICĂRII PERSUASIVE ÎN CADRUL STRUCTURILOR DE SECURITATE.
- Published in:
- Review of Management & Economic Engineering, 2011, v. 10, n. 3, p. 197
- By:
- Publication type:
- Article
Covert Communication: The Intelligibility and Credibility of Signaling in Secret.
- Published in:
- Security Studies, 2017, v. 26, n. 1, p. 124, doi. 10.1080/09636412.2017.1243921
- By:
- Publication type:
- Article
DroidChamber: Multilevel Security for Mobile Devices to Support Telemedicine on the Battlefield.
- Published in:
- Military Medicine, 2023, v. 188, p. 192, doi. 10.1093/milmed/usad084
- By:
- Publication type:
- Article
УЛОГА ОРГАНА УПРАВЕ И НАРОДНЕ СКУПШТИНЕ У ЗАШТИТИ ТАЈНИХ ПОДАТАКА.
- Published in:
- Novi Sad Faculty of Law: Collected Papers / Zbornik Radova: Pravni Fakultet u Novom Sadu, 2023, v. 57, n. 3, p. 705, doi. 10.5937/zrpfns57-45359
- By:
- Publication type:
- Article
REMODELING THE CLASSIFIED INFORMATION PROCEDURES ACT (CIPA).
- Published in:
- Cardozo Law Review, 2010, v. 32, n. 2, p. 437
- By:
- Publication type:
- Article
Secretos, mentiras y juicio ciudadano.
- Published in:
- IBEROAMERICANA. América Latina - España - Portugal, 2011, n. 44, p. 144
- By:
- Publication type:
- Article
German Documents in the United States.
- Published in:
- Central European History (Cambridge University Press / UK), 2008, v. 41, n. 4, p. 555, doi. 10.1017/S0008938908000848
- By:
- Publication type:
- Article
TRANSPARENCY REPORTS AND THEIR RELATIONSHIP WITH THE ESPIONAGE ACT.
- Published in:
- Rutgers Computer & Technology Law Journal, 2018, v. 44, n. 2, p. 210
- By:
- Publication type:
- Article
Gerrymandering the National Security Narrative: A Case Study of the Canadian Security Intelligence Service's Handling of its Bulk Metadata Exploitation Program.
- Published in:
- Surveillance & Society, 2020, v. 18, n. 3, p. 370, doi. 10.24908/ss.v18i3.13428
- By:
- Publication type:
- Article
CONFLICTS IN WITHHOLDING CLASSIFIED EVIDENCE FROM CRIMINAL DEFENDANTS: LOOKING BEYOND STATUTORY COMPLIANCE IN UNITED STATES V. DAOUD, 755 F.3D 479, (7TH CIR. 2014).
- Published in:
- Southern Illinois University Law Journal, 2018, v. 42, n. 2, p. 99
- By:
- Publication type:
- Article
THE USE OF CLASSIFIED INFORMATION IN TERRORISM TRIALS.
- Published in:
- Southern Illinois University Law Journal, 2017, v. 42, n. 1, p. 63
- By:
- Publication type:
- Article
ASATM: Automated security assistant of threat models in intelligent transportation systems.
- Published in:
- IET Computers & Digital Techniques (Wiley-Blackwell), 2022, v. 16, n. 5, p. 141, doi. 10.1049/cdt2.12045
- By:
- Publication type:
- Article
CIPA CREEP: THE CLASSIFIED INFORMATION PROCEDURES ACT AND ITS DRIFT INTO CIVIL NATIONAL SECURITY LITIGATION.
- Published in:
- Columbia Human Rights Law Review, 2014, v. 45, n. 2, p. 668
- By:
- Publication type:
- Article
基于区块链的煤矿安监云数据安全访问模型研究.
- Published in:
- Journal of Mine Automation, 2022, v. 48, n. 5, p. 93, doi. 10.13272/j.issn.1671-251x.2022030023
- By:
- Publication type:
- Article
INFORMATION CONTROL: MAKING SECRETS AND KEEPING THEM SAFE.
- Published in:
- Arizona Law Review, 2015, v. 57, n. 2, p. 581
- By:
- Publication type:
- Article
Government still too good at keeping secrets.
- Published in:
- Issues in Science & Technology, 1997, v. 13, n. 4, p. 19
- By:
- Publication type:
- Article
Network Context and the Effectiveness of International Agreements.
- Published in:
- International Studies Quarterly, 2024, v. 68, n. 3, p. 1, doi. 10.1093/isq/sqae099
- By:
- Publication type:
- Article
New Sources on the Holocaust in Italy.
- Published in:
- Holocaust & Genocide Studies, 2002, v. 16, n. 3, p. 402, doi. 10.1093/hgs/16.3.402
- By:
- Publication type:
- Article
Millions of People Around the World Face Imminent Disaster.
- Published in:
- International Policy Digest, 2024, p. 3
- By:
- Publication type:
- Article
Joe Biden: The Damnation of Age.
- Published in:
- International Policy Digest, 2024, p. 3
- By:
- Publication type:
- Article
Dreams of Declassification: The Early Cold War Quest for Nuclear Knowledge in The Netherlands and Norway.
- Published in:
- Physics in Perspective, 2023, v. 25, n. 3, p. 106, doi. 10.1007/s00016-023-00305-2
- By:
- Publication type:
- Article
Indecent Exposures.
- Published in:
- 2017
- By:
- Publication type:
- Film/TV Criticism and Review
Intralayer-Connected Spiking Neural Network with Hybrid Training Using Backpropagation and Probabilistic Spike-Timing Dependent Plasticity.
- Published in:
- International Journal of Intelligent Systems, 2023, p. 1, doi. 10.1155/2023/3135668
- By:
- Publication type:
- Article
DAM: A Theoretical Framework for Sensor Security in IoT Applications.
- Published in:
- International Journal of Next-Generation Computing, 2021, v. 12, n. 3, p. 309, doi. 10.47164/ijngc.v12i3.830
- By:
- Publication type:
- Article
A Survey on Various Cryptanalytic Attacks on the AES Algorithm.
- Published in:
- International Journal of Next-Generation Computing, 2021, v. 12, n. 2, p. 115
- By:
- Publication type:
- Article
Food security in low developed countries - the case of the D.R. Congo.
- Published in:
- Scientific Papers: Animal Science & Biotechnologies / Lucrari Stiintifice: Zootehnie si Biotehnologii, 2022, v. 55, n. 2, p. 154
- By:
- Publication type:
- Article
Security Cooperation between South Korea and Australia: Bilateral for Minilateral?
- Published in:
- Pacific Focus, 2016, v. 31, n. 2, p. 167, doi. 10.1111/pafo.12069
- By:
- Publication type:
- Article
Security and the shaping of identity for nuclear specialists.
- Published in:
- History & Technology, 2011, v. 27, n. 2, p. 123, doi. 10.1080/07341512.2011.573265
- By:
- Publication type:
- Article
Security and Privacy Challenges of Big Data Adoption: A Qualitative Study in Telecommunication Industry.
- Published in:
- International Journal of Interactive Mobile Technologies, 2022, v. 16, n. 19, p. 81, doi. 10.3991/ijim.v16i19.32093
- By:
- Publication type:
- Article
CLASSIFIED INFORMATION POLICY AND EXECUTIVE ORDER 13526.
- Published in:
- White House Studies, 2015, v. 15, n. 2/3, p. 43
- By:
- Publication type:
- Article
Before the High Court: Hocking v Director-General of the National Archives of Australia: Can Kerr's Correspondence with the Queen Be Kept Secret Forever?
- Published in:
- Sydney Law Review, 2020, v. 42, n. 1, p. 99
- By:
- Publication type:
- Article
ARTICLE III COURTS V. MILITARY COMMISSIONS: A COMPARISON OF PROTECTION OF CLASSIFIED INFORMATION AND ADMISSIBILITY OF EVIDENCE IN TERRORISM PROSECUTIONS.
- Published in:
- St. Mary's Law Journal, 2019, v. 50, n. 3, p. 787
- By:
- Publication type:
- Article
THE SILENT WITNESS RULE: A SECRET SAFEGUARD TO THE FIRST AND SIXTH AMENDMENTS.
- Published in:
- George Mason University Civil Rights Law Journal, 2014, v. 24, n. 3, p. 325
- By:
- Publication type:
- Article
CASTAWAY: NAVIGATING UNCHARTED WATERS.
- Published in:
- Brooklyn Journal of International Law, 2015, v. 40, n. 3, p. 989
- By:
- Publication type:
- Article