Journal articles on the topic 'Cybersecurity Espionage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity Espionage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alashi, Shahad A., and Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 15, 2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Full textHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (April 30, 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Full textRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (July 1, 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Full textSusila, Muh, and Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, no. 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.
Full textKatzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Full textKatzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Full textCristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective." Politics in Central Europe 17, no. 4 (December 1, 2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.
Full textBeyer, Jessica L. "The Politics of Cybersecurity and the Global Internet." Perspectives on Politics 21, no. 2 (June 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.
Full textPatiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain." México y la Cuenca del Pacífico 8, no. 24 (September 1, 2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.
Full textPIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 2 (July 8, 2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.
Full textTarhan, Kamil. "Historical Development of Cybersecurity Studies: A Literature Review and Its Place in Security Studies." Przegląd Strategiczny, no. 15 (February 15, 2023): 393–414. http://dx.doi.org/10.14746/ps.2022.1.23.
Full textSantana, Nathalie Ayala, and Ayad Barsoum. "Network Access Control for Government." International Journal of Cyber Research and Education 4, no. 1 (January 1, 2022): 1–11. http://dx.doi.org/10.4018/ijcre.309686.
Full textDiorditsa, I. V. "ADMINISTRATIVE AND LEGAL CONTENT OF THE NATIONAL CYBERSECURITY SYSTEM AS A COMPONENT OF THE NATIONAL SECURITY SYSTEM OF UKRAINE." Actual problems of native jurisprudence 1, no. 1 (March 4, 2021): 79–83. http://dx.doi.org/10.15421/392117.
Full textShitova, Yu Yu, and Yu A. Shitov. "Contemporary Trends in Economic Cybersecurity." World of new economy 13, no. 4 (December 4, 2019): 22–30. http://dx.doi.org/10.26794/2220-6469-2019-13-4-22-30.
Full textDjenna, Amir, Ezedin Barka, Achouak Benchikh, and Karima Khadir. "Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics." Sensors 23, no. 14 (July 11, 2023): 6302. http://dx.doi.org/10.3390/s23146302.
Full textDawson, Maurice, Robert Bacius, Luis Borges Gouveia, and Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors." Land Forces Academy Review 26, no. 1 (March 1, 2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.
Full textAamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan." Strategic Studies 39, no. 1 (April 24, 2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.
Full textMalik, Shairoze. "The Machine Learning in Malware Detection." International Journal for Electronic Crime Investigation 5, no. 3 (April 6, 2022): 29–36. http://dx.doi.org/10.54692/ijeci.2022.050387.
Full textFedoniuk, Serhii, and Serhii Maghdysiuk. "US-China Confrontation in Cyber Security." Історико-політичні проблеми сучасного світу, no. 45 (June 27, 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Full textHaiduk, Oleg, and Volodymyr Zverev. "ANALYSIS OF CYBER THREATS IN THE CONTEXT OF RAPID DEVELOPMENT OF INFORMATION TECHNOLOGY." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 225–36. http://dx.doi.org/10.28925/2663-4023.2024.23.225236.
Full textBardhant, Sara, and Pallabhi Chakraborty. "The Dark Web's Influence on International Relations: Unravelling the Hidden Threads." Journal of Judikaltura 2, no. 1 (December 30, 2023): 1–11. http://dx.doi.org/10.61963/jkt.v2i1.62.
Full textMatthews, Gerald, Ryan Wohleber, Jinchao Lin, Lauren Reinerman-Jones, Valarie Yerdon, and Nathanael Pope. "Cognitive and Affective Eye Tracking Metrics for Detecting Insider Threat: A Study of Simulated Espionage." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (September 2018): 242–46. http://dx.doi.org/10.1177/1541931218621056.
Full textTANRIVERDIYEV, Elshan. "THE STATE OF THE CYBER ENVIRONMENT AND NATIONAL CYBERSECURITY STRATEGY IN DEVELOPED COUNTRIES." National Security Studies 23, no. 1 (March 30, 2022): 19–26. http://dx.doi.org/10.37055/sbn/149510.
Full textLindsay, Jon Randall. "Restrained by design: the political economy of cybersecurity." Digital Policy, Regulation and Governance 19, no. 6 (September 11, 2017): 493–514. http://dx.doi.org/10.1108/dprg-05-2017-0023.
Full textSelján, Gábor. "The Remarkable 10th Anniversary of Stuxnet." Academic and Applied Research in Military and Public 19, no. 3 (2020): 85–98. http://dx.doi.org/10.32565/aarms.2020.3.6.
Full textHagen, Raymond André, and Kirsi Helkala. "Complexity of Contemporary Indicators of Compromise." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 697–707. http://dx.doi.org/10.34190/eccws.23.1.2149.
Full textTrofymenko, Olena, Nataliia Loginova, Manakov Serhii, and Yaroslav Dubovoil. "CYBERTHREATS IN HIGHER EDUCATION." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 76–84. http://dx.doi.org/10.28925/2663-4023.2022.16.7684.
Full textBaloch, Rafay. "Cyber Warfare Trends, Tactics and Strategies: Lessons for Pakistan." Journal of Development Policy, Research & Practice (JoDPRP) 3, no. 1 (December 31, 2019): 23–43. http://dx.doi.org/10.59926/jodprp.vol03/02.
Full textNikolaienko, Bohdan, and Serhii Vasylenko. "APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, no. 4 (December 20, 2021): 9–13. http://dx.doi.org/10.35784/iapgos.2822.
Full textKhalid, Dr Mohammed. "Emerging Challenges to India’s National Security: a Domestic Dimension." Scholars Journal of Arts, Humanities and Social Sciences 9, no. 11 (November 18, 2021): 600–603. http://dx.doi.org/10.36347/sjahss.2021.v09i11.006.
Full textLavanya M. "A Review on Detection of Cybersecurity Threats in Banking Sectors Using Ai Based Risk Assessment." Journal of Electrical Systems 20, no. 6s (April 29, 2024): 1359–65. http://dx.doi.org/10.52783/jes.2909.
Full textKWA, Patrick Aurélien AMPIRI, Rostand Martialy Davy Loembe Souamy, and Aristide MANKITI FATI. "Contribution to Securing BYOD Systems in Financial Authorities and Public Administrations in Free Trade Zones." International Journal of Managing Value and Supply Chains 15, no. 2 (June 15, 2024): 01–12. http://dx.doi.org/10.5121/ijmvsc.2024.15201.
Full textРЫБИНЕЦ В.А., РЫБИНЕЦ В. А. "RISKS OF MALICIOUS USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES FOR THE GLOBAL ECONOMY: INFORMATION AND PSYCHOLOGICAL ASPECT." Экономика и предпринимательство, no. 2(163) (May 9, 2024): 1400–1404. http://dx.doi.org/10.34925/eip.2024.163.2.279.
Full textAli, Hisham, Jawad Ahmad, Zakwan Jaroucheh, Pavlos Papadopoulos, Nikolaos Pitropakis, Owen Lo, Will Abramson, and William J. Buchanan. "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform." Entropy 24, no. 10 (September 28, 2022): 1379. http://dx.doi.org/10.3390/e24101379.
Full textSkitsko, Oleksii. "ATTACK SURFACE IN THE CONTEXT OF ITS USERS (“TREAT ACTORS”) FOR CRITICAL INFRASTRUCTURE FACILITIES." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 229–40. http://dx.doi.org/10.28925/2663-4023.2024.24.229240.
Full textTrân Dai, Candice. "CHINA AND CYBERSECURITY. ESPIONAGE, STRATEGY AND POLITICS IN THE DIGITAL DOMAIN, Jon R. Lindsay, Tai Ming Cheung et Derek S. Reveron, Oxford, Oxford University Press, 2015, 398 pages." Politique étrangère Hiver, no. 4 (November 9, 2015): XXI. http://dx.doi.org/10.3917/pe.154.0187u.
Full textGriffin, Brandon, Keitavius Alexander, Xavier-Lewis Palmer, and Lucas Potter. "Social-Engineering, Bio-economies, and Nation-State Ontological Security: A Commentary." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 111–18. http://dx.doi.org/10.34190/iccws.18.1.1021.
Full textAustin, Greg. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron. New York: Oxford University Press, 2015. 398 pp. US$99.00/£22.99 (paper)." China Journal 75 (January 2016): 161–63. http://dx.doi.org/10.1086/684056.
Full textSemenov, B. R. "International Aspect of PRC Information Security Policy." EURASIAN INTEGRATION: economics, law, politics 18, no. 2 (July 14, 2024): 148–58. http://dx.doi.org/10.22394/2073-2929-2024-02-148-158.
Full textMr. Sharan L. Pais, Shrihstha, Shrikara R M, Shruthi C S, and Sudheepa Poojari. "Cyber Warfare: Espionage, Botnet." International Journal of Advanced Research in Science, Communication and Technology, July 20, 2022, 271–74. http://dx.doi.org/10.48175/ijarsct-5819.
Full textAl Balushi, Mohamed Rashid. "Regulating Cybersecurity in Corporate America. Specific Reference to Corporate Espionage." SSRN Electronic Journal, 2017. http://dx.doi.org/10.2139/ssrn.3037161.
Full text"China and cybersecurity: espionage, strategy, and politics in the digital domain." Choice Reviews Online 53, no. 03 (October 20, 2015): 53–1504. http://dx.doi.org/10.5860/choice.192972.
Full textHaner, Justin K., and Robert K. Knake. "Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity." Journal of Cybersecurity 7, no. 1 (January 1, 2021). http://dx.doi.org/10.1093/cybsec/tyab003.
Full textVanshika Shukla. "A BRIEF STUDY OF INTERNATIONAL LAW IN THE AGE OF CYBERSECURITY." EPRA International Journal of Multidisciplinary Research (IJMR), November 17, 2023, 269–73. http://dx.doi.org/10.36713/epra14915.
Full textLindsay, Jon R. "Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity." Journal of Peace Research, January 30, 2024. http://dx.doi.org/10.1177/00223433231217664.
Full textSanjeev Arora. "The Hidden Threat: Exposing OSINT Exploitation in Cyber Attacks." International Journal of Advanced Research in Science, Communication and Technology, April 19, 2024, 421–25. http://dx.doi.org/10.48175/ijarsct-17472.
Full textGÖRKAN EVRE, Özlem, and Bünyamin CİYLAN. "Measurement of the Cybersecurity Strategy Effectiveness with a Scorecard Based On Risk Analysis." Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, October 30, 2023. http://dx.doi.org/10.29109/gujsc.1345984.
Full textTurcanu, Dinu, Natalia Spinu, Serghei Popovici, and Tatiana Turcanu. "CYBERSECURITY OF THE REPUBLIC OF MOLDOVA: A RETROSPECTIVE FOR THE PERIOD 2015-2020." Journal of Social Sciences IV(1) (March 2021). http://dx.doi.org/10.52326/jss.utm.2021.4(1).10.
Full textNagathota, Joshua, Jothsna Kethar, and Sarada Prasad Gochhayat, Ph.D. "Effects of Technology and Cybercrimes on Business and Social Media." Journal of Student Research 12, no. 4 (November 30, 2023). http://dx.doi.org/10.47611/jsr.v12i4.2284.
Full textChunlei, Si, and Liu Yuxin. "Exploring the discourse of enterprise cyber governance in the covid-19 era: a sociosemiotic perspective." International Journal of Legal Discourse, April 20, 2022. http://dx.doi.org/10.1515/ijld-2022-2064.
Full text