Search

Your search keyword '"INTELLECTUAL property theft"' showing total 1,025 results

Search Constraints

Start Over You searched for: Descriptor "INTELLECTUAL property theft" Remove constraint Descriptor: "INTELLECTUAL property theft"
1,025 results on '"INTELLECTUAL property theft"'

Search Results

1. Visa Status: Divisive.

2. Research: How Keeping Organizational Secrets Impacts Employees.

3. Revisiting Trump's China Policies.

4. Advancing physiology through transparency: Celebrating our first registered report.

5. AutoCRW: Learning based robust watermarking for smart city applications.

6. Network intrusion detection system for DDoS attacks in ICS using deep autoencoders.

7. Secure Chip To Chip Communication Based On Zero Trust Architecture In Embedded Systems.

8. Cyber Insurance Need of the Hour: To Combat Growing Cyber-Attacks within Cyber Space.

9. ინოვაციური მეწარმეობის როლი საქართველოს მდგრად ეკონომიკურ განვითარებაში

10. Beyond the Cell Walls: Cybersecurity Insights From The Shawshank Redemption.

11. THE MIRAGE OF CHINA’S I.P.THEFT.

12. “Its All About the People”.

13. Foreign Ownership, Control, and Influence (FOCI) Risks in the Food and Agriculture Sector.

14. Fox in the Henhouse: The Growing Harms of North Korea’s Remote IT Workforce.

15. INSTITUTIONAL FRAMEWORKS THAT GUIDE RESEARCH INTEGRITY AND SECURITY TOWARDS PROTECTION OF IP AND MANAGEMENT OF TECHNOLOGY TRANSFER IN UNIVERSITIES IN KENYA.

16. For Microsoft, 2025 could be a game-changing year.

17. Has Microsoft finally agreed to pay for intellectual property to train its genAI tools? Microsoft and other genAI companies have a dirty little secret: Copilot and other genAI tools are built on what might be the biggest theft of intellectual property in history

18. Four über effective ways to steer your way out of a crisis: In times of difficulty, knowing when to get involved and learning to master your emotions are essential skills to prevent making a bad situation worse.

19. Sideloading: A 'hole' new mobile security debate: As the world waits for Apple's stance on Sideloading, it is a good time to unpack doubts, trends, and possibilities around it.

20. THE POTENTIAL IMPACT OF THE AFRICAN CONTINENTAL FREE TRADE AREA (AFCFTA) ON MULTINATIONAL COMPANIES IN SOUTH AFRICA.

21. The Language of Deception: Applying Findings on Opinion Spam to Legal and Forensic Discourses.

22. Digital Forensic Investigation on Social Media Platforms: A Survey on Emerging Machine Learning Approaches.

23. Java code obfuscator to prevent reverse engineering of android application.

24. What a Second Trump Term Could Mean for Global Trade: Who Trump Would Tariff, and How They Would Respond.

26. Best practices in supplier relationship management and response when supply is disrupted by cyber attack : An incident response framework.

27. MELTDOWN IN THE MAKING: WHY FOUNDRY CYBERSECURITY CAN'T BE CAST ASIDE.

29. US-China Trade Rivalry: Ramifications on Global Economic Politics.

30. Balancing Digital Forensic Investigation with Cybersecurity for Heavy Vehicle Traffic Crashes.

31. SMALL BUSINESS RESEARCH PROGRAMS: Agencies Identified Foreign Risks, but Some Due Diligence Programs Lack Clear Procedures.

32. EDITORIAL.

33. China's technology acquisition for military innovation: spectrum of legality in strategic competition.

34. The conflict thesis between science and Christianity: it makes for a good story: David Hutchings and James C. Ungureanu: Of popes and unicorns: science, Christianity, and how the conflict thesis fooled the world. Oxford: Oxford University Press, 2021, 280 pp, 25.99 £ HB

35. A New Optimal Method for the Secure Design of Combinational Circuits against Hardware Trojans Using Interference Logic Locking.

36. What the Trump election means for Microsoft's AI dreams.

37. Accelerating Defense Innovation Requires Changes to Acquisition Approach.

38. Toward a Mutually Beneficial Partnership with India to Improve U.S. Strategy in the U.S. Indo-Pacific Command.

40. 4 Areas of Cyber Risk That Boards Need to Address.

41. The New Enlightenment and the Fight to Free Knowledge: by Peter B. Kaufman, New York, Seven Stories Press, 2021, 256 pp., $40 (hardcover); $18.95 (paperback); $7.79 (e-book), ISBN 9781644210604.

42. Informational Sovereignty: A New Framework for AI Regulation.

43. A deep hybrid learning model for detection of cyber attacks in industrial IoT devices.

45. Counterfeit Corner.

46. FROM UNDESIRABLE TO UNDENIABLE.

49. Will this journal exist in 5 years' time?

50. The Role of Social Media on the Research Productivity of Neurosurgeons During the COVID-19 Pandemic.

Catalog

Books, media, physical & digital resources