Artículos de revistas sobre el tema "United states - espionage"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "United states - espionage".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Arindiya, Ghina y Dewi Triwahyuni. "CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY". Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 7, n.º 1 (1 de julio de 2024): 1108–19. http://dx.doi.org/10.34010/icobest.v7i.624.
Texto completoClarke, Duncan L. "Israel's Economic Espionage in the United States". Journal of Palestine Studies 27, n.º 4 (1998): 20–35. http://dx.doi.org/10.2307/2538128.
Texto completoClarke, Duncan L. "Israel's Economic Espionage in the United States". Journal of Palestine Studies 27, n.º 4 (julio de 1998): 20–35. http://dx.doi.org/10.1525/jps.1998.27.4.00p00037.
Texto completoKlehr, Harvey. "REFLECTIONS ON ESPIONAGE". Social Philosophy and Policy 21, n.º 1 (enero de 2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.
Texto completoSmith, Michael M. "The Mexican Secret Service in the United States, 1910-1920". Americas 59, n.º 1 (julio de 2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.
Texto completoTerry, Patrick C. R. "“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law". German Law Journal 19, n.º 3 (1 de junio de 2018): 613–26. http://dx.doi.org/10.1017/s207183220002280x.
Texto completoSmith, Lieutenant Commander Ursula y Colonel Daniel J. Lecce. "Litigating National Security Cases under The United States Uniform Code of Military Justice". Journal of International Peacekeeping 20, n.º 3-4 (17 de agosto de 2016): 250–74. http://dx.doi.org/10.1163/18754112-02003007.
Texto completoAmusan, Lere y Siphiwe Mchunu. "Adventure into Peacetime Intra-Alliance Espionage: Assessment of the America-Germany Saga". Lithuanian Foreign Policy Review 33, n.º 1 (1 de diciembre de 2015): 64–82. http://dx.doi.org/10.1515/lfpr-2016-0010.
Texto completoWRÓBLEWSKA, Angelika. "SELECTED ADVANCED CYBER ESPIONAGE OPERATIONS". Cybersecurity & Cybercrime 1, n.º 1 (31 de marzo de 2021): 149–64. http://dx.doi.org/10.5604/01.3001.0053.8016.
Texto completoTerry, Patrick C. R. "“ABSOLUTE FRIENDS”: UNITED STATES ESPIONAGE AGAINST GERMANY AND PUBLIC INTERNATIONAL LAW". Revue québécoise de droit international 28, n.º 2 (2015): 173. http://dx.doi.org/10.7202/1067720ar.
Texto completoAvery, Donald. "Secrets Between Different Kinds of Friends: Canada’s Wartime Exchange of Scientific Military Information with the United States and the USSR, 1940‑1945". Historical Papers 21, n.º 1 (26 de abril de 2006): 225–53. http://dx.doi.org/10.7202/030955ar.
Texto completoFedoniuk, Serhii y Serhii Maghdysiuk. "US-China Confrontation in Cyber Security". Історико-політичні проблеми сучасного світу, n.º 45 (27 de junio de 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Texto completoSetzekorn, Eric. "The Contemporary Utility of 1930s Counterintelligence Prosecution Under the United States Espionage Act". International Journal of Intelligence and CounterIntelligence 29, n.º 3 (6 de abril de 2016): 545–63. http://dx.doi.org/10.1080/08850607.2016.1121050.
Texto completoAdzanas, Adrian y Bambang Ipto. "EDWARD SNOWDEN"S COMMUNICATION STRATEGY AGAINST INFORMATION DOMINATION GOVERNMENT OF THE UNITED STATES". dia 20, n.º 01 (20 de marzo de 2022): 121–35. http://dx.doi.org/10.30996/dia.v20i01.6295.
Texto completoSIBLEY, KATHERINE A. S. "Soviet Military-Industrial Espionage in the United States and the Emergence of an Espionage Paradigm in US-Soviet Relations, 1941-45". American Communist History 2, n.º 1 (junio de 2003): 21–51. http://dx.doi.org/10.1080/1474389032000112582.
Texto completoHaynes, John Earl. "The Cold War Debate Continues: A Traditionalist View of Historical Writing on Domestic Communism and Anti-Communism". Journal of Cold War Studies 2, n.º 1 (enero de 2000): 76–115. http://dx.doi.org/10.1162/15203970051032381.
Texto completoJonghaeng Yoon. "Recent Trends of Court's Decisions and Legislation on Economic Espionage in the United States". kangwon Law Review 44, n.º ll (febrero de 2015): 477–501. http://dx.doi.org/10.18215/kwlr.2015.44..477.
Texto completoHouse, Jonathan M. "American Spies: Espionage against the United States from the Cold War to the Present". History: Reviews of New Books 42, n.º 4 (22 de julio de 2014): 129. http://dx.doi.org/10.1080/03612759.2014.903784.
Texto completoSegal, Adam. "The code not taken: China, the United States, and the future of cyber espionage". Bulletin of the Atomic Scientists 69, n.º 5 (septiembre de 2013): 38–45. http://dx.doi.org/10.1177/0096340213501344.
Texto completoArredondo, Ricardo. "DIPLOMACIA, ESPIONAJE Y ORDEN MUNDIAL: EL CIERRE DE CONSULADOS DE CHINA Y ESTADOS UNIDOS". Revista española de derecho internacional 73, n.º 1 (25 de enero de 2021): 35–56. http://dx.doi.org/10.17103/redi.73.1.2021.1.01.
Texto completoHaynes, John Earl y Harvey Klehr. "Alexander Vassiliev's Notebooks and the Documentation of Soviet Intelligence Activities in the United States during the Stalin Era". Journal of Cold War Studies 11, n.º 3 (julio de 2009): 6–25. http://dx.doi.org/10.1162/jcws.2009.11.3.6.
Texto completoKlehr, Harvey y John Earl Haynes. "The First U.S.-Based Soviet Nuclear Spy: The Saga of Clarence Hiskey and Arthur Adams". Journal of Cold War Studies 25, n.º 4 (2023): 53–69. http://dx.doi.org/10.1162/jcws_a_01170.
Texto completoHerken, Gregg. "Target Enormoz: Soviet Nuclear Espionage on the West Coast of the United States, 1942–1950". Journal of Cold War Studies 11, n.º 3 (julio de 2009): 68–90. http://dx.doi.org/10.1162/jcws.2009.11.3.68.
Texto completoXiaofeng, Wang. "China’s Alternative Roles in Countering International Economic Cyber Espionage". China Quarterly of International Strategic Studies 02, n.º 04 (enero de 2016): 549–68. http://dx.doi.org/10.1142/s2377740016500251.
Texto completoRovner, Joshua y Tyler Moore. "Does the Internet Need a Hegemon?" Journal of Global Security Studies 2, n.º 3 (1 de julio de 2017): 184–203. http://dx.doi.org/10.1093/jogss/ogx008.
Texto completoTuluș, Arthur. "The Condition of National Minorities in Eastern Europe in a Secret Cia Report From 1965". Eminak, n.º 2(34) (1 de julio de 2021): 210–28. http://dx.doi.org/10.33782/eminak2021.2(34).529.
Texto completoSelyanin, Yaroslav. "The US confrontation with China through the prism of cyberspace". Russia and America in the 21st Century, n.º 3 (2023): 0. http://dx.doi.org/10.18254/s207054760026344-5.
Texto completoPawlikowicz, Leszek. "Wykorzystanie radzieckich emigrantów doby détente w praktyce działań 1. Zarządu Głównego KGB i współczesne reminiscencje tego zjawiska. Casus Stanów Zjednoczonych Ameryki". Polityka i Społeczeństwo 20, n.º 4 (2022): 233–48. http://dx.doi.org/10.15584/polispol.2022.4.16.
Texto completoGul, Noman, Fareed Ullah y Azmat Ali Shah. "Sino-US Global Competitive Dynamics Post 9/11 and its Impacts on Pakistan's Security". Global Strategic & Securities Studies Review VI, n.º II (30 de junio de 2021): 162–73. http://dx.doi.org/10.31703/gsssr.2021(vi-ii).16.
Texto completoOlmsted, Kathryn. "British and US Anticommunism Between the World Wars". Journal of Contemporary History 53, n.º 1 (27 de octubre de 2016): 89–108. http://dx.doi.org/10.1177/0022009416653458.
Texto completoTrasciatti, Mary Anne. "Kairos, Free Speech, and the Material Conditions of State Power in the United States: The Case of World War I". Journal for the History of Rhetoric 18, n.º 2 (julio de 2015): 216–26. http://dx.doi.org/10.5325/jhistrhetoric.18.2.0216.
Texto completoUsdin, Steven. "The Face of Soviet Espionage in the United States during the Stalin Era: Vladimir Pravdin, “Man of Truth”". Journal of Cold War Studies 26, n.º 2 (2024): 78–122. http://dx.doi.org/10.1162/jcws_a_01211.
Texto completoActon, James M. "Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War". International Security 43, n.º 1 (agosto de 2018): 56–99. http://dx.doi.org/10.1162/isec_a_00320.
Texto completoLi, Wei. "The Security Service for Chinese Central Leaders". China Quarterly 143 (septiembre de 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.
Texto completoGoodman, Michael S. "Who Is Trying to Keep What Secret from Whom and Why? MI5-FBI Relations and the Klaus Fuchs Case". Journal of Cold War Studies 7, n.º 3 (junio de 2005): 124–46. http://dx.doi.org/10.1162/1520397054377160.
Texto completoNeagu, Florentina Stefania y Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt". Proceedings of the International Conference on Business Excellence 13, n.º 1 (1 de mayo de 2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.
Texto completoDYACHKOV, Ilya Vladimirovich. "UN SANCTIONS AGAINST THE DPRK: AN ASSESSMENT OF EFFICIENCY". Tambov University Review. Series: Humanities, n.º 177 (2018): 173–79. http://dx.doi.org/10.20310/1810-0201-2018-23-177-173-179.
Texto completoBessonova, Maryna. "Canada and the Beginning of the Cold War: Modern Interpretations". American History & Politics Scientific edition, n.º 8 (2019): 47–56. http://dx.doi.org/10.17721/2521-1706.2019.08.05.
Texto completoGilli, Andrea y Mauro Gilli. "Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage". International Security 43, n.º 3 (febrero de 2019): 141–89. http://dx.doi.org/10.1162/isec_a_00337.
Texto completoLeaf, Jeffrey. "Bug Off". Mechanical Engineering 125, n.º 10 (1 de octubre de 2003): 56–59. http://dx.doi.org/10.1115/1.2003-oct-4.
Texto completoEhrenman, Gayle. "Not a Drop to Drink". Mechanical Engineering 125, n.º 09 (1 de septiembre de 2003): 46–49. http://dx.doi.org/10.1115/1.2003-sep-1.
Texto completoChen, Ping-Hsun. "Trade Secret Protection of Genetically Engineered Rice Through the Economic Espionage Act: A Lesson from United States v. Weiqiang Zhang". Biotechnology Law Report 37, n.º 4 (agosto de 2018): 205–10. http://dx.doi.org/10.1089/blr.2018.29075.sz.
Texto completoManchester, Margaret Murányi. "The Corporate Dimension of the Cold War in Hungary: ITT and the Vogeler/Sanders Case Reconsidered". Journal of Cold War Studies 23, n.º 2 (2021): 41–74. http://dx.doi.org/10.1162/jcws_a_00983.
Texto completoKhoday, Amar. "Seen in Its True Light: Desertion as a Pure Political Crime". Refuge: Canada's Journal on Refugees 30, n.º 2 (19 de noviembre de 2014): 93–102. http://dx.doi.org/10.25071/1920-7336.39614.
Texto completoRosenfeldt, Niels Erik y Julie Birkedal Riisbro. "En spionsag i 1930rnes København". Fund og Forskning i Det Kongelige Biblioteks Samlinger 55 (3 de marzo de 2016): 317. http://dx.doi.org/10.7146/fof.v55i0.118919.
Texto completoKhalid, Dr Mohammed. "Emerging Challenges to India’s National Security: a Domestic Dimension". Scholars Journal of Arts, Humanities and Social Sciences 9, n.º 11 (18 de noviembre de 2021): 600–603. http://dx.doi.org/10.36347/sjahss.2021.v09i11.006.
Texto completoBernstein, Seth. "Burying the Alliance: Interment, Repatriation and the Politics of the Sacred in Occupied Germany". Journal of Contemporary History 52, n.º 3 (27 de julio de 2016): 710–30. http://dx.doi.org/10.1177/0022009416644665.
Texto completoKim, Ga-Bin y Hyun-Goo Kang. "Studying Trends in Domestic and International News Reports on Industrial Espionage through Big Data Analysis: Focusing on Comparison with the United States". Korean Journal of Industry Security 14 (2 de enero de 2024): 1–27. http://dx.doi.org/10.33388/kais.2024.14.s.001.
Texto completoCASIS. "Canadian Supercomputer Threat Assessment and Potential Responses". Journal of Intelligence, Conflict, and Warfare 2, n.º 1 (17 de mayo de 2019): 12. http://dx.doi.org/10.21810/jicw.v2i1.955.
Texto completoЕфремов, Андрей y Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001". Journal of Foreign Legislation and Comparative Law 3, n.º 3 (10 de julio de 2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.
Texto completo