Controlling the Malicious Defendant

被引:0
|
作者
不详
机构
关键词
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
引用
收藏
页码:184 / 210
页数:27
相关论文
共 50 条
  • [1] Controlling malicious sources at Internet gateways
    Chhabra, P
    John, A
    Saran, H
    Shorey, R
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 1636 - 1640
  • [2] Familial Analysis of Malicious Android Apps Controlling IOT Devices
    Maikap, Subhadhriti
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Mohapatra, Durga Prasad
    [J]. INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2022, 340 : 205 - 214
  • [3] The prejudiced defendant: Unfairness suffered by a defendant in a joint trial
    Thornton, P
    [J]. CRIMINAL LAW REVIEW, 2003, : 433 - 445
  • [4] A 'DEFENDANT SPEAKS'
    MIDDLETON, D
    [J]. SOUTHERN REVIEW-BATON ROUGE, 1984, 20 (03): : 609 - 609
  • [5] The Judge and the Defendant
    刘淑梅
    [J]. 语言教育, 2008, (02) : 31 - 31
  • [6] BLAMING THE DEFENDANT
    SPENCER, JR
    [J]. NEW STATESMAN & SOCIETY, 1989, 2 (80): : 6 - 7
  • [7] The daily defendant
    Goldman, L
    [J]. FORBES, 2000, 166 (15): : 64 - +
  • [8] PREVAIL ON THE DEFENDANT
    Morales, Joao
    [J]. COLOQUIO-LETRAS, 2016, (192): : 247 - 249
  • [9] THE MEDICAL DEFENDANT
    不详
    [J]. LANCET, 1953, 264 (MAY2): : 887 - 887
  • [10] THE DESIGNATED DEFENDANT
    ROCHELSON, B
    STONE, ML
    [J]. OBSTETRICS AND GYNECOLOGY, 1987, 70 (04): : 662 - 663