Search

Your search keyword '"Lawful interception"' showing total 227 results

Search Constraints

Start Over You searched for: Descriptor "Lawful interception" Remove constraint Descriptor: "Lawful interception"
227 results on '"Lawful interception"'

Search Results

2. Interrogating the standardisation of surveillance in 5G amid US–China competition.

3. The Attorney's Wiretapping Authority in Special Crimes and Military Crime Connection Cases.

4. Quantum Computing and Lawful Interception Applications

5. REMOTE SURVEILLANCE: A MEANS OF INTELLIGENCE GATHERING FOR MINIMIZING SECURITY CHALLENGES IN NIGERIA

6. A Solution to Support Integrity in the Lawful Interception Ecosystem

7. Lawful Interception in WebRTC Peer-To-Peer Communication

9. A Comprehensive Overview of Government Hacking Worldwide

10. On the Optimal Lawful Intercept Access Points Placement Problem in Hybrid Software-Defined Networks

11. Regulating Social Network Services for Lawful Interception

12. A Bloom Filter-Based Monitoring Station for a Lawful Interception Platform

14. Wireless Sensing and Networking for the Internet of Things.

15. Requirements of EU law enforcement agencies for lawful interception of information in electronic communications networks

16. IPvest: Clustering the IP Traffic of Network Entities Hidden Behind a Single IP Address Using Machine Learning

17. "Lawful interception – A market access barrier in the European Union"?

18. A Framework for Secure and Verifiable Logging in Public Communication Networks

20. An Efficient Network Classification Based on Various-Widths Clustering and Semi-Supervised Stacking

21. Positioning Technology Trends and Solutions Toward 6G

22. Escrowed decryption protocols for lawful interception of encrypted data

23. Meeting lawful interception requirements for selected IP traffic offload and local IP access traffic.

24. Exploring the Optimal Intercept Access Point Placement Problem in Software-Defined Networks

25. Information security and the lawful interception of communications through telecom service providers infrastructure: advanced model system architecture

26. On the Optimal Lawful Intercept Access Points Placement Problem in Hybrid Software-Defined Networks

27. A Secure Encapsulation Schemes Based on Key Recovery System

28. A distributed flow correlation attack to anonymizing overlay networks based on wavelet multi-resolution analysis

29. Pegasus Spyware – 'A Privacy Killer'

30. Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations

31. Définir une approche des droits de l'homme à la législation sur la surveillance des communications à travers le système africain des droits de l'homme au Nigeria, en Afrique du Sud et en Ouganda

32. Information security and the lawful interception of communications through telecom service providers infrastructure: advanced model system architecture

33. ON IDENTITIES IN MODERN NETWORKS.

34. Implementation and performance of VoIP interception based on SIP session border controller.

35. Towards 5G cellular network forensics

36. Avlyssnad? : En studie om användandet av hemliga tvångsmedel i preventivt syfte

37. Secure SIP authentication scheme supporting lawful interception.

38. Private Clouds with No Silver Lining: Legal Risk in Private Cloud Services.

39. Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS).

40. A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.

41. Computational approaches to suspicion in adversarial settings.

42. A Comprehensive Overview of Government Hacking Worldwide

43. An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan.

44. A hybrid clustering-classification for accurate and efficient network classification

45. Wired? A study on preventive use of coercive measures

46. Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit

47. Requirements Analysis Required--Otherwise Targeted Monitoring Enables Pervasive Monitoring

48. Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations

49. Improving Lawful Interception in Virtual Datacenters

50. Defeating the Downgrade Attack on Identity Privacy in 5G

Catalog

Books, media, physical & digital resources