Articoli di riviste sul tema "Cybersecurity Espionage"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Cybersecurity Espionage".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Alashi, Shahad A., e Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations". Journal of Information Security and Cybercrimes Research 3, n. 1 (15 dicembre 2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Testo completoHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n. 2 (30 aprile 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Testo completoRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n. 3 (1 luglio 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Testo completoSusila, Muh, e Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, n. 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.
Testo completoKatzan, Jr., Harry. "Cybersecurity Service Model". Journal of Service Science (JSS) 5, n. 2 (28 dicembre 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Testo completoKatzan, Harry. "Contemporary Issues in Cybersecurity". Journal of Cybersecurity Research (JCR) 1, n. 1 (21 giugno 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Testo completoCristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective". Politics in Central Europe 17, n. 4 (1 dicembre 2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.
Testo completoBeyer, Jessica L. "The Politics of Cybersecurity and the Global Internet". Perspectives on Politics 21, n. 2 (giugno 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.
Testo completoPatiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain". México y la Cuenca del Pacífico 8, n. 24 (1 settembre 2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.
Testo completoPIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges". BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, n. 2 (8 luglio 2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.
Testo completoTarhan, Kamil. "Historical Development of Cybersecurity Studies: A Literature Review and Its Place in Security Studies". Przegląd Strategiczny, n. 15 (15 febbraio 2023): 393–414. http://dx.doi.org/10.14746/ps.2022.1.23.
Testo completoSantana, Nathalie Ayala, e Ayad Barsoum. "Network Access Control for Government". International Journal of Cyber Research and Education 4, n. 1 (1 gennaio 2022): 1–11. http://dx.doi.org/10.4018/ijcre.309686.
Testo completoDiorditsa, I. V. "ADMINISTRATIVE AND LEGAL CONTENT OF THE NATIONAL CYBERSECURITY SYSTEM AS A COMPONENT OF THE NATIONAL SECURITY SYSTEM OF UKRAINE". Actual problems of native jurisprudence 1, n. 1 (4 marzo 2021): 79–83. http://dx.doi.org/10.15421/392117.
Testo completoShitova, Yu Yu, e Yu A. Shitov. "Contemporary Trends in Economic Cybersecurity". World of new economy 13, n. 4 (4 dicembre 2019): 22–30. http://dx.doi.org/10.26794/2220-6469-2019-13-4-22-30.
Testo completoDjenna, Amir, Ezedin Barka, Achouak Benchikh e Karima Khadir. "Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics". Sensors 23, n. 14 (11 luglio 2023): 6302. http://dx.doi.org/10.3390/s23146302.
Testo completoDawson, Maurice, Robert Bacius, Luis Borges Gouveia e Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors". Land Forces Academy Review 26, n. 1 (1 marzo 2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.
Testo completoAamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan". Strategic Studies 39, n. 1 (24 aprile 2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.
Testo completoMalik, Shairoze. "The Machine Learning in Malware Detection". International Journal for Electronic Crime Investigation 5, n. 3 (6 aprile 2022): 29–36. http://dx.doi.org/10.54692/ijeci.2022.050387.
Testo completoFedoniuk, Serhii, e Serhii Maghdysiuk. "US-China Confrontation in Cyber Security". Історико-політичні проблеми сучасного світу, n. 45 (27 giugno 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Testo completoHaiduk, Oleg, e Volodymyr Zverev. "ANALYSIS OF CYBER THREATS IN THE CONTEXT OF RAPID DEVELOPMENT OF INFORMATION TECHNOLOGY". Cybersecurity: Education, Science, Technique 3, n. 23 (2024): 225–36. http://dx.doi.org/10.28925/2663-4023.2024.23.225236.
Testo completoBardhant, Sara, e Pallabhi Chakraborty. "The Dark Web's Influence on International Relations: Unravelling the Hidden Threads". Journal of Judikaltura 2, n. 1 (30 dicembre 2023): 1–11. http://dx.doi.org/10.61963/jkt.v2i1.62.
Testo completoMatthews, Gerald, Ryan Wohleber, Jinchao Lin, Lauren Reinerman-Jones, Valarie Yerdon e Nathanael Pope. "Cognitive and Affective Eye Tracking Metrics for Detecting Insider Threat: A Study of Simulated Espionage". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, n. 1 (settembre 2018): 242–46. http://dx.doi.org/10.1177/1541931218621056.
Testo completoTANRIVERDIYEV, Elshan. "THE STATE OF THE CYBER ENVIRONMENT AND NATIONAL CYBERSECURITY STRATEGY IN DEVELOPED COUNTRIES". National Security Studies 23, n. 1 (30 marzo 2022): 19–26. http://dx.doi.org/10.37055/sbn/149510.
Testo completoLindsay, Jon Randall. "Restrained by design: the political economy of cybersecurity". Digital Policy, Regulation and Governance 19, n. 6 (11 settembre 2017): 493–514. http://dx.doi.org/10.1108/dprg-05-2017-0023.
Testo completoSelján, Gábor. "The Remarkable 10th Anniversary of Stuxnet". Academic and Applied Research in Military and Public 19, n. 3 (2020): 85–98. http://dx.doi.org/10.32565/aarms.2020.3.6.
Testo completoHagen, Raymond André, e Kirsi Helkala. "Complexity of Contemporary Indicators of Compromise". European Conference on Cyber Warfare and Security 23, n. 1 (21 giugno 2024): 697–707. http://dx.doi.org/10.34190/eccws.23.1.2149.
Testo completoTrofymenko, Olena, Nataliia Loginova, Manakov Serhii e Yaroslav Dubovoil. "CYBERTHREATS IN HIGHER EDUCATION". Cybersecurity: Education, Science, Technique 16, n. 4 (2022): 76–84. http://dx.doi.org/10.28925/2663-4023.2022.16.7684.
Testo completoBaloch, Rafay. "Cyber Warfare Trends, Tactics and Strategies: Lessons for Pakistan". Journal of Development Policy, Research & Practice (JoDPRP) 3, n. 1 (31 dicembre 2019): 23–43. http://dx.doi.org/10.59926/jodprp.vol03/02.
Testo completoNikolaienko, Bohdan, e Serhii Vasylenko. "APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES". Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, n. 4 (20 dicembre 2021): 9–13. http://dx.doi.org/10.35784/iapgos.2822.
Testo completoKhalid, Dr Mohammed. "Emerging Challenges to India’s National Security: a Domestic Dimension". Scholars Journal of Arts, Humanities and Social Sciences 9, n. 11 (18 novembre 2021): 600–603. http://dx.doi.org/10.36347/sjahss.2021.v09i11.006.
Testo completoLavanya M. "A Review on Detection of Cybersecurity Threats in Banking Sectors Using Ai Based Risk Assessment". Journal of Electrical Systems 20, n. 6s (29 aprile 2024): 1359–65. http://dx.doi.org/10.52783/jes.2909.
Testo completoKWA, Patrick Aurélien AMPIRI, Rostand Martialy Davy Loembe Souamy e Aristide MANKITI FATI. "Contribution to Securing BYOD Systems in Financial Authorities and Public Administrations in Free Trade Zones". International Journal of Managing Value and Supply Chains 15, n. 2 (15 giugno 2024): 01–12. http://dx.doi.org/10.5121/ijmvsc.2024.15201.
Testo completoРЫБИНЕЦ В.А., РЫБИНЕЦ В. А. "RISKS OF MALICIOUS USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES FOR THE GLOBAL ECONOMY: INFORMATION AND PSYCHOLOGICAL ASPECT". Экономика и предпринимательство, n. 2(163) (9 maggio 2024): 1400–1404. http://dx.doi.org/10.34925/eip.2024.163.2.279.
Testo completoAli, Hisham, Jawad Ahmad, Zakwan Jaroucheh, Pavlos Papadopoulos, Nikolaos Pitropakis, Owen Lo, Will Abramson e William J. Buchanan. "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform". Entropy 24, n. 10 (28 settembre 2022): 1379. http://dx.doi.org/10.3390/e24101379.
Testo completoSkitsko, Oleksii. "ATTACK SURFACE IN THE CONTEXT OF ITS USERS (“TREAT ACTORS”) FOR CRITICAL INFRASTRUCTURE FACILITIES". Cybersecurity: Education, Science, Technique 4, n. 24 (2024): 229–40. http://dx.doi.org/10.28925/2663-4023.2024.24.229240.
Testo completoTrân Dai, Candice. "CHINA AND CYBERSECURITY. ESPIONAGE, STRATEGY AND POLITICS IN THE DIGITAL DOMAIN, Jon R. Lindsay, Tai Ming Cheung et Derek S. Reveron, Oxford, Oxford University Press, 2015, 398 pages". Politique étrangère Hiver, n. 4 (9 novembre 2015): XXI. http://dx.doi.org/10.3917/pe.154.0187u.
Testo completoGriffin, Brandon, Keitavius Alexander, Xavier-Lewis Palmer e Lucas Potter. "Social-Engineering, Bio-economies, and Nation-State Ontological Security: A Commentary". International Conference on Cyber Warfare and Security 18, n. 1 (28 febbraio 2023): 111–18. http://dx.doi.org/10.34190/iccws.18.1.1021.
Testo completoAustin, Greg. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron. New York: Oxford University Press, 2015. 398 pp. US$99.00/£22.99 (paper)." China Journal 75 (gennaio 2016): 161–63. http://dx.doi.org/10.1086/684056.
Testo completoSemenov, B. R. "International Aspect of PRC Information Security Policy". EURASIAN INTEGRATION: economics, law, politics 18, n. 2 (14 luglio 2024): 148–58. http://dx.doi.org/10.22394/2073-2929-2024-02-148-158.
Testo completoMr. Sharan L. Pais, Shrihstha, Shrikara R M, Shruthi C S e Sudheepa Poojari. "Cyber Warfare: Espionage, Botnet". International Journal of Advanced Research in Science, Communication and Technology, 20 luglio 2022, 271–74. http://dx.doi.org/10.48175/ijarsct-5819.
Testo completoAl Balushi, Mohamed Rashid. "Regulating Cybersecurity in Corporate America. Specific Reference to Corporate Espionage." SSRN Electronic Journal, 2017. http://dx.doi.org/10.2139/ssrn.3037161.
Testo completo"China and cybersecurity: espionage, strategy, and politics in the digital domain". Choice Reviews Online 53, n. 03 (20 ottobre 2015): 53–1504. http://dx.doi.org/10.5860/choice.192972.
Testo completoHaner, Justin K., e Robert K. Knake. "Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity". Journal of Cybersecurity 7, n. 1 (1 gennaio 2021). http://dx.doi.org/10.1093/cybsec/tyab003.
Testo completoVanshika Shukla. "A BRIEF STUDY OF INTERNATIONAL LAW IN THE AGE OF CYBERSECURITY". EPRA International Journal of Multidisciplinary Research (IJMR), 17 novembre 2023, 269–73. http://dx.doi.org/10.36713/epra14915.
Testo completoLindsay, Jon R. "Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity". Journal of Peace Research, 30 gennaio 2024. http://dx.doi.org/10.1177/00223433231217664.
Testo completoSanjeev Arora. "The Hidden Threat: Exposing OSINT Exploitation in Cyber Attacks". International Journal of Advanced Research in Science, Communication and Technology, 19 aprile 2024, 421–25. http://dx.doi.org/10.48175/ijarsct-17472.
Testo completoGÖRKAN EVRE, Özlem, e Bünyamin CİYLAN. "Measurement of the Cybersecurity Strategy Effectiveness with a Scorecard Based On Risk Analysis". Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, 30 ottobre 2023. http://dx.doi.org/10.29109/gujsc.1345984.
Testo completoTurcanu, Dinu, Natalia Spinu, Serghei Popovici e Tatiana Turcanu. "CYBERSECURITY OF THE REPUBLIC OF MOLDOVA: A RETROSPECTIVE FOR THE PERIOD 2015-2020". Journal of Social Sciences IV(1) (marzo 2021). http://dx.doi.org/10.52326/jss.utm.2021.4(1).10.
Testo completoNagathota, Joshua, Jothsna Kethar e Sarada Prasad Gochhayat, Ph.D. "Effects of Technology and Cybercrimes on Business and Social Media". Journal of Student Research 12, n. 4 (30 novembre 2023). http://dx.doi.org/10.47611/jsr.v12i4.2284.
Testo completoChunlei, Si, e Liu Yuxin. "Exploring the discourse of enterprise cyber governance in the covid-19 era: a sociosemiotic perspective". International Journal of Legal Discourse, 20 aprile 2022. http://dx.doi.org/10.1515/ijld-2022-2064.
Testo completo