Search

Your search keyword '"THEFT"' showing total 168,977 results

Search Constraints

Start Over You searched for: Descriptor "THEFT" Remove constraint Descriptor: "THEFT"
168,977 results on '"THEFT"'

Search Results

1. A Review of the Tax Theft Loss Rules and Applicability to Cryptocurrency.

2. THE LOST ALTARPIECE.

3. Design of a Crime Prediction Model for Barranquilla Using Machine Learning Algorithms

6. Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks.

7. Corruption and Early Chief Constables in the County of Roxburgh: Sexual Misconduct, Thefts, Desertion and a 'Disreputable Drunkard'.

8. Does gambling expenditure have any effect on crime?

9. Book Theft as Social Deviance in Modern China: An Elegant Offense or the Intellectual Robin Hood.

10. Sentencing decisions around quantity thresholds: theory and experiment.

11. Exploring the value of holiday preferences and routine activities for understanding tourist victimisation while on holiday.

12. Forty Years of Soviet Spying in NATO: A Preliminary Study.

13. TraceGuard: Fine-Tuning Pre-Trained Model by Using Stego Images to Trace Its User.

14. AnomalyNet: a spatiotemporal motion-aware CNN approach for detecting anomalies in real-world autonomous surveillance.

15. The Impact and Relevance of Sensory Modulation-Related Occupational Therapy Interventions on Emotional Regulation in Preparation for Readiness to Change for Individuals Who Are Incarcerated and Have Experienced Trauma.

16. Before the ink dries? Creators misjudge idea thieves' preferences for early‐stage ideas.

17. Racial Regimes and White European Jewish Supremacy as Property.

18. Atoning vs. evading when caught transgressing: two multi-theory-based experiments investigating strategies for politicians responding to scandal.

19. Association of Victimization by Sex among Public Facing Bus and Subway Transit Workers, New York City.

20. Subsistence and Survival: Strategies Women in the Republic of Barbados Engaged in Transactional Sex Work Employ to Stay Safe.

21. Theft Victimization in Urban Settings: Comparison of Tourist and Resident Case Profiles.

22. İş Hukukunda İşçinin Küçük Hırsızlığı (Petty Theft).

23. Always on par? How small- and medium-sized enterprises manage coopetition strategies to innovate with large firms.

24. The intersection of methamphetamine and violence in the United States: a county-level assessment of methamphetamine overdose mortality and violent crime.

25. Victimized Teachers' Perceptions of Procedural Justice and the Impact on Satisfaction with School Responses.

26. The ecological impact of the COVID-19 pandemic on crime trends in Kerman Province of Iran

27. Modern steganography method based on Shearlet transformation with quad chain code.

28. IoT devices based on the ESP32 ultrawideband (UWB) for accurate livestock.

29. Intrusion detection in IoT: A deep learning approach.

32. Trends and Sources of Crime Guns in California: 2010-2021.

33. Shoplifters Gone Wild.

34. No Small Matter.

35. WHY WE STOLE.

36. Women’s crime in Munster in the first half of the XVII century

37. Lower social vulnerability is associated with a higher prevalence of social media-involved violent crimes in Prince George's County, Maryland, 2018–2023.

38. Kleptoparasitism in seabirds—A potential pathway for global avian influenza virus spread.

39. An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication.

40. Detection Method for Three-Phase Electricity Theft Based on Multi-Dimensional Feature Extraction.

41. Storage of firearms in vehicles: findings from a sample of firearm owners in nine U.S. states.

42. Who are the Culprits? Evaluation of Theft and Mutilation of Academic Library Materials: Experience from the Walton Whaley Library.

43. White-eyed, red-handed: Novel observations of nest material kleptoparasitism by Bridled White-eye (Zosterops conspicillatus) on Tinian Island, Northern Mariana Islands.

44. Peekaboo! The Effect of Different Visible Cash Display and Amount Options During Mail Contact When Recruiting to a Probability-Based Panel.

45. Like clockwork: A within‐person analysis of time theft in the workplace.

46. Surviving on the periphery of society: Experiences of street children in Accra, Ghana.

47. МЕТОДОЛОГІЧНІ ЗАСАДИ КРИМІНАЛІСТИЧНОЇ ХАРАКТЕРИСТИКИ КРАДІЖОК КУЛЬТУРНИХ ЦІННОСТЕЙ ІЗ КУЛЬТОВИХ СПОРУД

48. Radioactive isotopes theft in Mexico during 2011–2023: a green criminological approach.

49. HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.

50. A secure user authentication scheme for crypto-wallet in IoT environment.

Catalog

Books, media, physical & digital resources