Search

Your search keyword '"FORGERY"' showing total 12,252 results

Search Constraints

Start Over You searched for: Descriptor "FORGERY" Remove constraint Descriptor: "FORGERY"
12,252 results on '"FORGERY"'

Search Results

201. Blockchain-Based Framework for Supply Chain Traceability.

202. Development, detection and decipherment of obfuscated fingerprints in humans: Implications for forensic casework.

203. Spectrogram Dataset of Korean Smartphone Audio Files Forged Using the "Mix Paste" Command.

204. A PÉNZÜGYI VÁLSÁG ELŐSZELE Az 1613. évi 28. törvénycikk nyomában.

205. جريمة التزوير الإلكتروني في الكويت إعا.

206. COUNTERFEIT/FORGERY OF TRAVEL DOCUMENTS - TRENDS.

207. The proliferation of counterfeit and substandard medicines in Iraq and the Kurdistan Region of Iraq (KRI): why does it matter?

208. Vehicular Localization Framework with UWB and DAG-Based Distributed Ledger for Ensuring Positioning Accuracy and Security.

209. A survey on passive digital video forgery detection techniques.

210. DETECTION OF IMAGE FORGERY USING DEEP LEARNING THROUGH CONVOLUTIONAL NEURAL NETWORKS.

211. Multi-region minutiae depth value-based efficient forged finger print analysis.

212. Frame Duplication Forgery Detection in Surveillance Video Sequences Using Textural Features.

213. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid.

214. METAPHYSICAL TURMOIL.

215. Model verification for population detection of counterfeits.

216. Enhancing Educational Certificate Verification With Blockchain and IPFS: A Decentralized Approach Using Hyperledger Fab.

217. Video face forgery detection via facial motion-assisted capturing dense optical flow truncation.

218. Contextualising Counterfeits: Roman Coin Moulds in Britain and the Channel Islands.

219. CRIMINAL COUNTERFEITING DEED AUTHENTIC SHAPED DIPLOMAS BY A NOTARY; FIQH LEGAL PERSPECTIVE JINAYA, INDONESIA.

220. Image Copy-move Forgery Detection and Classification Using Golden Jackal Optimization Based Multi-Support Vector Machine.

221. PURCHASERS ATTITUDE TOWARDS COUNTERFEIT ITEMS - A SURVEY STUDY OF NAGERCOIL TOWN IN TAMILNADU.

222. GP-Net: Image Manipulation Detection and Localization via Long-Range Modeling and Transformers.

223. МЕМОАРИ И СЪВРЕМЕННОСТ.

224. Blockchain-Enabled land management systems.

225. Counterfeits on dark markets: a measurement between Jan-2014 and Sep-2015.

226. Evaluate the Performance of Deep CNN Algorithm based on Parameters and Various Geometrical Attacks.

227. Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications.

228. Unreasonable Reliance-Defending a Claim for an Alleged Item 7 Misrepresentation.

229. The Presumption of Irreparable Harm After the Trademark Modernization Act of 2020: Have All Issues Been Resolved?

230. SI-Net: spatial interaction network for deepfake detection.

231. ARKEOLOJİDE MALZEME ANALİZİ VE SAHTE ESERLERİN BELİRLENMESİ.

232. A Blockchain-based Conceptual Model to Address Educational Certificate Verification Challenges in Tanzania.

233. Farm Crime Victimisation and Prevention Decision Making: Can insights from England and Wales inform the Baltic Sea Region?

234. FORGERY OF DOCUMENTS, ARISING RESPONSIBILITY UNDER CRIMINAL LAW.

235. Combating deceptive counterfeiting in digital supply chain.

236. Semiquantitative X-ray Powder Diffraction Analysis in Counterfeit Medicines Investigation—The Viagra Example.

237. Video-Based Discrimination of Genuine and Counterfeit Facial Features Leveraging Cardiac Pulse Rhythm Signals in Access Control Systems.

238. Identification of Polymer of Counterfeit Documents.

239. Latest trends in signatures and signature fraud detection.

240. Profectio Moysis in Aegyptum (1784): A 'Fake' Neapolitan Oratorio?

241. Fake product detection in textile industry.

242. An Introduction to Questioned Documents

243. Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices

244. Copy-Move Forgery Detection Using Canny Edge Detector and SIFT-Based Blob Analysis

246. Two Ways to Scare a Gruffalo

247. The structure of the forensic characteristics of offences under Article 200 of the Criminal Code of Ukraine

250. 'Bitcoin inventor' accused of perjury and forgery

Catalog

Books, media, physical & digital resources