Results 1 to 10 of about 353,439 (278)

Realization of a fair trial in quasi-judicial authorities (Dispute Resolution Council) [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i Khuṣūṣī, 2022
Achieving a fair trial and ensuring justice in the trial is initially subject to identifying the principles governing the trial and adapting it to the principles and rules of the national and transnational legal system and adapting it to the ...
Hashem Farhadi, Ahma Shams
doaj   +1 more source

“Equality of arms” in criminal procedure in the context of the right to a fair trial

open access: yesRUDN Journal of Law, 2021
The level of realization of the right to a fair trial is one of the crucial indicators of democracy in any state. In order to ensure this right, all the minimum standards deriving from it must be clearly understood by law enforcement agencies and their ...
Fardin Y. Khalilov
doaj   +1 more source

Journalists' Adversarial Questions in Iran and the United States Political Interviews [PDF]

open access: yes̒Ilm-i Zabān, 2020
The present study, utilizing a descriptive approach and quantitative analysis, analyzed questions in the political interviews in Iran and the United States in order to show what types of adversarial are used in the journalists’ questions and whether ...
Maryam Farnia, Nasrin Abedian
doaj   +1 more source

Face Database Protection via Beautification with Chaotic Systems

open access: yesEntropy, 2023
The database of faces containing sensitive information is at risk of being targeted by unauthorized automatic recognition systems, which is a significant concern for privacy.
Tao Wang, Yushu Zhang, Ruoyu Zhao
doaj   +1 more source

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

open access: yesJournal of Cybersecurity and Privacy, 2021
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought.
Pavlos Papadopoulos   +5 more
doaj   +1 more source

A Systematic Approach for Evaluating Artificial Intelligence Models in Industrial Settings

open access: yesSensors, 2021
Artificial Intelligence (AI) is one of the hottest topics in our society, especially when it comes to solving data-analysis problems. Industry are conducting their digital shifts, and AI is becoming a cornerstone technology for making decisions out of ...
Paul-Lou Benedick   +2 more
doaj   +1 more source

El principio de igualdad de armas: un análisis conceptual

open access: yesDerecho Penal y Criminología, 2021
El principio de igualdad de armas es un mandato esencial que consiste en que “cada parte debe tener una oportunidad razonable para presentar su caso en condiciones que no la pongan en desventaja con respecto a su oponente”1.
Simón Moratto
doaj   +1 more source

A Review of Defence Pretrial Disclosures Within the Case Management Theory of Criminal Proceedings in Ghana

open access: yesJournal of Legal Studies, 2022
This article examines the concept of defense disclosures within the theory of managerialism in criminal proceedings in Ghana. Through a doctrinal and comparative legal analysis with the English jurisdiction, it finds that in substance, the requirement of
Tufuor Isidore Kwadwo
doaj   +1 more source

Learning new attack vectors from misuse cases with deep reinforcement learning

open access: yesFrontiers in Energy Research, 2023
Modern smart grids already consist of various components that interleave classical Operational Technology (OT) with Information and Communication Technology (ICT), which, in turn, have opened the power grid to advanced approaches using distributed ...
Eric M. S. P. Veith   +2 more
doaj   +1 more source

EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT

open access: yesHeliyon, 2023
The complexity of the Industrial Internet of Things (IIoT) presents higher requirements for intrusion detection systems (IDSs). An adversarial attack is a threat to the security of machine learning-based IDSs.
Shiming Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy