-
1061
تراجع النِّظام الاجتماعي في مصر والشَّام زمن المماليك [انهيار الزِّيجات إنموذجًا] [648- 923ﻫ/ 1250- 1517م]
Published 2023-10-01“…Among these negative manifestations are: accusing or scandalizing each other, committing crimes of forgery, theft, and circumvention, committing murder, ending the marital relationship through divorce, annulment, or separation, marital infidelity, and evading filiation. …”
Get full text
Article -
1062
Verifikasi Citra Tanda Tangan Menggunakan Metode Prewitt dan Learning Vector Quantization
Published 2018-09-01“…There are often cases of signature forgery, partly due to a poor verification system. …”
Get full text
Article -
1063
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
Published 2023-04-01“…We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server). …”
Get full text
Article -
1064
-
1065
-
1066
Investigation of infrared hand vein pattern biometrics
Published 2008“…Whilst these features can offer relatively high accuracy, their tolerance to forgery is moderate. There is a recent developing trend of studying the unique interior features (e.g. iris, retina etc.) of the human body for biometric purposes. …”
Get full text
Thesis -
1067
A PUF-based data-device hash for tampered image detection and source camera identification
Published 2020“…With the increasing prevalent of digital devices and their abuse for digital content creation, forgeries of digital images and video footage are more rampant than ever. …”
Get full text
Journal Article -
1068
Peri basileias
Published 1971“…; his section on kingship in book iii of the <em>Politics</em> is analysed; and the Arabic treatise recently discovered is shown to be a forgery of Roman imperial date. The works of Xenocrates and Anaxarchus are also discussed. …”
Thesis -
1069
Using digital forensics in higher education to detect academic misconduct
Published 2022-05-01“…They are sometimes used in cases relating to intellectual property to establish the legitimate ownership of a variety of objects, both written and graphical, as well as in fraud and forgery (Jeong and Lee, Digit Investig 23:3-10, 2017; Fu et. al, Digit Investig 8:44–55, 2011 ). …”
Get full text
Article -
1070
Physical profile of counterfeit tablets Viagra® and Cialis®
Published 2012-09-01“…These data may be valuable to assist in the detection of pharmaceutical product forgery and may also be used in a forensic intelligence perspective when inserted into databases. …”
Get full text
Article -
1071
Fiddling the twiddle constants - fault injection analysis of the number theoretic transform
Published 2023“…We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. …”
Get full text
Journal Article -
1072
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
Published 2022-01-01“…However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. …”
Get full text
Article -
1073
Vulnerabilidades de las cookies en aplicaciones web: Redes Sociales y Streaming
Published 2023-05-01“…El objetivo de esta investigación fue analizar la vulnerabilidad de los ataques relacionados con el Id de sesión y el uso de cookies en ataques Cross Site Request Forgery (CSRF) simulando un ciberataque real en un entorno controlado. …”
Get full text
Article -
1074
The Face Deepfake Detection Challenge
Published 2022-09-01“…Multimedia data manipulation and forgery has never been easier than today, thanks to the power of Artificial Intelligence (AI). …”
Get full text
Article -
1075
Deepfake forensics analysis: An explainable hierarchical ensemble of weakly supervised models
Published 2022-01-01“…Recently, the detection and creation of such forgery became a popular research topic, leading to significant growth in publications related to the creation of deepfakes, detection methods, and datasets containing the latest deepfake creation methods. …”
Get full text
Article -
1076
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
Published 2011“…The proposed models prevent DoS and replay attacks by detecting and discarding forgery control frames belong to the attackers and thereby guarantee availability of the IEEE 802.11 wireless networks. …”
Get full text
Thesis -
1077
PROBLEMS AND EFFORTS TO INCREASE THE MEMORY OF THE QUR'AN OF STUDENTS AT THE BINAUL UMMAH BAWURAN ISLAMIC BOARDING SCHOOL BAWURAN PLERET BANTUL
Published 2022-07-01“…Allah SWT guarantees the purity and authenticity of His holy book, the Qur'an, and will always be protected from forgery until the Day of Judgment through the memorizers of the Qur'an. …”
Get full text
Article -
1078
Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature
Published 2023-12-01“…This helps maintain the authenticity of documents so that others cannot copy them. To prevent letter forgery, data integrity, and data validity, the contents of protected documents are encoded using the SHA-256 and RSA cryptographic algorithms. …”
Get full text
Article -
1079
-
1080
„SEXTING”, „SEXTORSION”, „REVENGE PORN”: FENOMENE REFLECTATE ÎN CODUL PENAL AL REPUBLICII MOLDOVA?
Published 2021-03-01“…In order to streamline the defence of the rule of law against the actions denoted by the words “sexting”, “sextortion” and “revenge porn”, it was proposed to supplement para.(2) art.177 of the Criminal Code with: letter a1) which would have the following content: “by means of information technologies or electronic communications”; letter c) which would have the following content: “if they were previously subjected to forgery in order to create the impression that the victim is doing or saying something that they did not do or said in fact”.…”
Get full text
Article