X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (759) 759
Conference Proceeding (250) 250
Book Chapter (217) 217
Book / eBook (89) 89
Magazine Article (29) 29
Newspaper Article (20) 20
Government Document (19) 19
Dissertation (15) 15
Web Resource (15) 15
Reference (8) 8
Newsletter (2) 2
Publication (2) 2
Book Review (1) 1
Journal / eJournal (1) 1
Paper (1) 1
Streaming Video (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
adversary system (554) 554
analysis (232) 232
science & technology (185) 185
computer science (179) 179
technology (172) 172
laws, regulations and rules (137) 137
law (124) 124
adversary (110) 110
social sciences (105) 105
evaluation (90) 90
computer science, information systems (78) 78
government & law (78) 78
security (78) 78
legal ethics (75) 75
engineering (74) 74
criminal procedure (73) 73
adversary model (65) 65
attorneys (61) 61
engineering, electrical & electronic (61) 61
adversaries (60) 60
justice, administration of (59) 59
history (57) 57
malicious adversary (55) 55
trials (53) 53
cryptography (52) 52
united states (52) 52
telecommunications (49) 49
algorithms (47) 47
computer science, theory & methods (45) 45
social aspects (43) 43
evidence (40) 40
studies (40) 40
trial practice (40) 40
adaptive adversary (37) 37
ethical aspects (37) 37
litigation (36) 36
protocols (36) 36
research (36) 36
enemies (34) 34
networks (34) 34
dispute resolution (33) 33
management (33) 33
privacy (33) 33
judicial process (32) 32
usage (32) 32
civil procedure (30) 30
mathematics (30) 30
verschlüsselung (30) 30
physical sciences (29) 29
computer security (28) 28
methods (27) 27
oblivious transfer (27) 27
criminal justice (26) 26
criminal justice, administration of (26) 26
mathematical models (26) 26
political science (26) 26
criminal law (25) 25
judges (25) 25
optimization (25) 25
secret sharing (24) 24
sensors (24) 24
antagonists (23) 23
evidence, expert (23) 23
foes (23) 23
opponents (23) 23
authentication (22) 22
computer networks (22) 22
comparative analysis (21) 21
computational modeling (21) 21
computer science, software engineering (21) 21
data security (21) 21
defendants (21) 21
adversary structure (20) 20
defense (20) 20
multi-user (20) 20
passive adversary (20) 20
systemsicherheit (20) 20
wireless sensor networks (20) 20
adversary method (19) 19
consensus (19) 19
influence (19) 19
politics and government (19) 19
public opinion (19) 19
general (18) 18
homomorphic encryption (18) 18
lower bounds (18) 18
political aspects (18) 18
secure multiparty computation (18) 18
adversarial systems (17) 17
adversary models (17) 17
common law (17) 17
computer simulation (17) 17
datenverschlüsselung (17) 17
mobile adversary (17) 17
randomization (17) 17
resilience (17) 17
active adversary (16) 16
byzantine adversary (16) 16
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (49) 49
Law (Bora Laskin) - Stacks (23) 23
Online Resources - Online (17) 17
Collection Dvlpm't (Acquisitions) - Vendor file (11) 11
UofT at Mississauga - Stacks (7) 7
Collection Dvlpm't (Acquisitions) - Closed Orders (6) 6
Trinity College (John W Graham) - Stacks (5) 5
Criminology - Stacks (4) 4
UofT at Scarborough - Stacks (4) 4
St. Michael's College (John M. Kelly) - 2nd Floor (3) 3
UTL at Downsview - May be requested (3) 3
Pontifical Inst. Mediaeval Studies - Library use only (2) 2
St. Michael's College (John M. Kelly) - 3rd Floor (2) 2
Knox College (Caven) - Stacks (1) 1
New College (Ivey) - Stacks (1) 1
Regis College - Stacks (1) 1
Thomas Fisher Rare Book - Rare Book (1) 1
Victoria University CRRS - Library use only (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1391) 1391
Korean (18) 18
Chinese (6) 6
French (6) 6
Portuguese (6) 6
Japanese (5) 5
Spanish (5) 5
German (3) 3
Italian (2) 2
Russian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2003, Oxford studies in modern legal history, ISBN 0199258880, xxii, 354
The adversary system of trial, now the defining feature of Anglo-American criminal procedure, developed late in English legal history... 
Defense (Criminal procedure) | Trials | Adversary system (Law) | History | Evidence, Criminal | Prosecution | Criminal procedure | Criminal Law | History of Law | Great Britain | 18th century | Criminal defendant | Old Bailey | Evidence law | Criminal justice | Criminal trial | Defense counsel | Adversary system | Crown witness
Book
2016, First edition., Zones of Religion, ISBN 1138642452, xxv, 226 pages
For law students and lawyers to successfully understand and practice law in the U.S., recognition of the wider context and culture which informs the law is... 
Justice, Administration of | Law | Methodology | Culture and law | Adversary system (Law) | Sociological jurisprudence | Social aspects | U.S. Law | Comparative Law | Jurisprudence & General Issues | Legal Skills | Method & System
Book
1984, AEI studies, ISBN 0844735337, Volume 390, 55
Book
Transactions on emerging telecommunications technologies, ISSN 2161-3915, 07/2018, Volume 29, Issue 7, pp. e3209 - n/a
The use of control‐theoretic solutions to detect attacks against cyber‐physical industrial systems is a growing area of research... 
Technology | Telecommunications | Science & Technology | Cryptography and Security | Computer Science
Journal Article
International journal of electrical and computer engineering (Malacca, Malacca), ISSN 2088-8708, 2017, Volume 7, Issue 4, pp. 2101 - 2108
....pp2101-2108 2101 Journal homepage: http://iaesjournal.com/online/index.php/IJECE Source based Security Issues in WDM Systems A. Antwiwaa, A. Kumar, A. K Jaiswal... 
Attack | Security | Source based | Adversary | Clone
Journal Article
1978, Contributions in legal studies, ISBN 9780313203121, Volume no. 4, x, 391
Book
2001, ISBN 9780674006218, xii, 339
American methods of policy implementation and dispute resolution are more adversarial and legalistic when compared with the systems of other economically advanced countries... 
Adversary system (Law) | Justice, Administration of | Law | Political aspects | United States | Law and politics
Book
IEEE transactions on automatic control, ISSN 0018-9286, 06/2020, Volume 65, Issue 6, pp. 2434 - 2449
Prior work on automatic control synthesis for cyber-physical systems under logical constraints has primarily focused on environmental disturbances or modeling uncertainties, however, the impact... 
Uncertainty | Computational modeling | Stochastic processes | Games | Probabilistic logic | stochastic game (SG) | Safety | linear temporal logic (LTL) | Security | Adversary | Engineering, Electrical & Electronic | Engineering | Automation & Control Systems | Technology | Science & Technology
Journal Article
2017, Yale Law Library Series in Legal History and Reference., ISBN 0300198078, xi, 449 pages
... imagine their legal system, it is the adversarial trial-dominated by dueling larger-than-life lawyers undertaking grand public performances-that first comes to mind... 
Adversary system (Law) | History | Law | United States | Sociological jurisprudence
Book
Performance evaluation review, ISSN 0163-5999, 03/2012, Volume 39, Issue 4, pp. 108 - 117
In this paper we present an in-depth study of the dynamicity and robustness properties of large-scale distributed systems, and in particular of peer-to-peer systems... 
Computer Science and Game Theory | Computer Science
Journal Article
2005, International and comparative criminal justice series, ISBN 0754624676, vi, 330
Criminal justice procedure is the bedrock of human rights. Surprisingly, however, in an era of unprecedented change in criminal justice around the world, it is... 
Criminal justice, Administration of | Law reform | Criminal procedure | Criminology and Criminal Justice | Criminal Law & Practice | Socio-Legal Studies | Comparative Law | International Law - Law
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.