Showing 1,061 - 1,080 results of 1,172 for search '"forgery"', query time: 0.14s Refine Results
  1. 1061

    تراجع النِّظام الاجتماعي في مصر والشَّام زمن المماليك [انهيار الزِّيجات إنموذجًا] [648- 923ﻫ/ 1250- 1517م] by محمود عبد المقصود ثابت

    Published 2023-10-01
    “…Among these negative manifestations are: accusing or scandalizing each other, committing crimes of forgery, theft, and circumvention, committing murder, ending the marital relationship through divorce, annulment, or separation, marital infidelity, and evading filiation. …”
    Get full text
    Article
  2. 1062

    Verifikasi Citra Tanda Tangan Menggunakan Metode Prewitt dan Learning Vector Quantization by Asfanji Sefta, Syarif Hidayatulloh

    Published 2018-09-01
    “…There are often cases of signature forgery, partly due to a poor verification system. …”
    Get full text
    Article
  3. 1063

    Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study by Ying He, Efpraxia Zamani, Iryna Yevseyeva, Cunjin Luo

    Published 2023-04-01
    “…We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server). …”
    Get full text
    Article
  4. 1064
  5. 1065
  6. 1066

    Investigation of infrared hand vein pattern biometrics by Wang, Ling Yu

    Published 2008
    “…Whilst these features can offer relatively high accuracy, their tolerance to forgery is moderate. There is a recent developing trend of studying the unique interior features (e.g. iris, retina etc.) of the human body for biometric purposes. …”
    Get full text
    Thesis
  7. 1067

    A PUF-based data-device hash for tampered image detection and source camera identification by Zheng, Yue, Cao, Yuan, Chang, Chip-Hong

    Published 2020
    “…With the increasing prevalent of digital devices and their abuse for digital content creation, forgeries of digital images and video footage are more rampant than ever. …”
    Get full text
    Journal Article
  8. 1068

    Peri basileias by Murray, O, Murray, Oswyn

    Published 1971
    “…; his section on kingship in book iii of the <em>Politics</em> is analysed; and the Arabic treatise recently discovered is shown to be a forgery of Roman imperial date. The works of Xenocrates and Anaxarchus are also discussed. …”
    Thesis
  9. 1069

    Using digital forensics in higher education to detect academic misconduct by Clare Johnson, Ross Davies, Mike Reddy

    Published 2022-05-01
    “…They are sometimes used in cases relating to intellectual property to establish the legitimate ownership of a variety of objects, both written and graphical, as well as in fraud and forgery (Jeong and Lee, Digit Investig 23:3-10, 2017; Fu et. al, Digit Investig 8:44–55, 2011 ). …”
    Get full text
    Article
  10. 1070

    Physical profile of counterfeit tablets Viagra® and Cialis® by Rafael Scorsatto Ortiz, Kristiane de Cássia Mariotti, Renata Pereira Limberger, Paulo Mayorga

    Published 2012-09-01
    “…These data may be valuable to assist in the detection of pharmaceutical product forgery and may also be used in a forensic intelligence perspective when inserted into databases. …”
    Get full text
    Article
  11. 1071

    Fiddling the twiddle constants - fault injection analysis of the number theoretic transform by Ravi, Prasanna, Yang, Bolin, Bhasin, Shivam, Zhang, Fan, Chattopadhyay, Anupam

    Published 2023
    “…We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. …”
    Get full text
    Journal Article
  12. 1072

    Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience by Syed Khandker, Hannu Turtiainen, Andrei Costin, Timo Hamalainen

    Published 2022-01-01
    “…However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. …”
    Get full text
    Article
  13. 1073

    Vulnerabilidades de las cookies en aplicaciones web: Redes Sociales y Streaming by Aura Dolores Zambrano Rendón, Luis Cristóbal Cedeño-Valarezo, Diego Alexander Avellán Vera, Jahir Enrique Herrera Molina, Kevin Julio Cedeño Zambrano

    Published 2023-05-01
    “…El objetivo de esta investigación fue analizar la vulnerabilidad de los ataques relacionados con el Id de sesión y el uso de cookies en ataques Cross Site Request Forgery (CSRF) simulando un ciberataque real en un entorno controlado.  …”
    Get full text
    Article
  14. 1074
  15. 1075

    Deepfake forensics analysis: An explainable hierarchical ensemble of weakly supervised models by Samuel Henrique Silva, Mazal Bethany, Alexis Megan Votto, Ian Henry Scarff, Nicole Beebe, Peyman Najafirad

    Published 2022-01-01
    “…Recently, the detection and creation of such forgery became a popular research topic, leading to significant growth in publications related to the creation of deepfakes, detection methods, and datasets containing the latest deepfake creation methods. …”
    Get full text
    Article
  16. 1076

    A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks by Malekzadeh, Mina

    Published 2011
    “…The proposed models prevent DoS and replay attacks by detecting and discarding forgery control frames belong to the attackers and thereby guarantee availability of the IEEE 802.11 wireless networks. …”
    Get full text
    Thesis
  17. 1077

    PROBLEMS AND EFFORTS TO INCREASE THE MEMORY OF THE QUR'AN OF STUDENTS AT THE BINAUL UMMAH BAWURAN ISLAMIC BOARDING SCHOOL BAWURAN PLERET BANTUL by Yusqi Mahfuds

    Published 2022-07-01
    “…Allah SWT guarantees the purity and authenticity of His holy book, the Qur'an, and will always be protected from forgery until the Day of Judgment through the memorizers of the Qur'an. …”
    Get full text
    Article
  18. 1078

    Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature by Juniar Hutagalung, Puji Sari Ramadhan, Sarah Juliana Sihombing

    Published 2023-12-01
    “…This helps maintain the authenticity of documents so that others cannot copy them. To prevent letter forgery, data integrity, and data validity, the contents of protected documents are encoded using the SHA-256 and RSA cryptographic algorithms. …”
    Get full text
    Article
  19. 1079
  20. 1080

    „SEXTING”, „SEXTORSION”, „REVENGE PORN”: FENOMENE REFLECTATE ÎN CODUL PENAL AL REPUBLICII MOLDOVA? by Sergiu BRÎNZA, Vitalie STATI

    Published 2021-03-01
    “…In order to streamline the defence of the rule of law against the actions denoted by the words “sexting”, “sextortion” and “revenge porn”, it was proposed to supplement para.(2) art.177 of the Criminal Code with: letter a1) which would have the following content: “by means of information technologies or electronic communications”; letter c) which would have the following content: “if they were previously subjected to forgery in order to create the impression that the victim is doing or saying something that they did not do or said in fact”.…”
    Get full text
    Article