Artigos de revistas sobre o tema "Cybersecurity Espionage"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Cybersecurity Espionage".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Alashi, Shahad A., e Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations". Journal of Information Security and Cybercrimes Research 3, n.º 1 (15 de dezembro de 2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Texto completo da fonteHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n.º 2 (30 de abril de 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Texto completo da fonteRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n.º 3 (1 de julho de 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Texto completo da fonteSusila, Muh, e Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, n.º 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.
Texto completo da fonteKatzan, Jr., Harry. "Cybersecurity Service Model". Journal of Service Science (JSS) 5, n.º 2 (28 de dezembro de 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Texto completo da fonteKatzan, Harry. "Contemporary Issues in Cybersecurity". Journal of Cybersecurity Research (JCR) 1, n.º 1 (21 de junho de 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Texto completo da fonteCristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective". Politics in Central Europe 17, n.º 4 (1 de dezembro de 2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.
Texto completo da fonteBeyer, Jessica L. "The Politics of Cybersecurity and the Global Internet". Perspectives on Politics 21, n.º 2 (junho de 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.
Texto completo da fontePatiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain". México y la Cuenca del Pacífico 8, n.º 24 (1 de setembro de 2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.
Texto completo da fontePIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges". BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, n.º 2 (8 de julho de 2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.
Texto completo da fonteTarhan, Kamil. "Historical Development of Cybersecurity Studies: A Literature Review and Its Place in Security Studies". Przegląd Strategiczny, n.º 15 (15 de fevereiro de 2023): 393–414. http://dx.doi.org/10.14746/ps.2022.1.23.
Texto completo da fonteSantana, Nathalie Ayala, e Ayad Barsoum. "Network Access Control for Government". International Journal of Cyber Research and Education 4, n.º 1 (1 de janeiro de 2022): 1–11. http://dx.doi.org/10.4018/ijcre.309686.
Texto completo da fonteDiorditsa, I. V. "ADMINISTRATIVE AND LEGAL CONTENT OF THE NATIONAL CYBERSECURITY SYSTEM AS A COMPONENT OF THE NATIONAL SECURITY SYSTEM OF UKRAINE". Actual problems of native jurisprudence 1, n.º 1 (4 de março de 2021): 79–83. http://dx.doi.org/10.15421/392117.
Texto completo da fonteShitova, Yu Yu, e Yu A. Shitov. "Contemporary Trends in Economic Cybersecurity". World of new economy 13, n.º 4 (4 de dezembro de 2019): 22–30. http://dx.doi.org/10.26794/2220-6469-2019-13-4-22-30.
Texto completo da fonteDjenna, Amir, Ezedin Barka, Achouak Benchikh e Karima Khadir. "Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics". Sensors 23, n.º 14 (11 de julho de 2023): 6302. http://dx.doi.org/10.3390/s23146302.
Texto completo da fonteDawson, Maurice, Robert Bacius, Luis Borges Gouveia e Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors". Land Forces Academy Review 26, n.º 1 (1 de março de 2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.
Texto completo da fonteAamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan". Strategic Studies 39, n.º 1 (24 de abril de 2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.
Texto completo da fonteMalik, Shairoze. "The Machine Learning in Malware Detection". International Journal for Electronic Crime Investigation 5, n.º 3 (6 de abril de 2022): 29–36. http://dx.doi.org/10.54692/ijeci.2022.050387.
Texto completo da fonteFedoniuk, Serhii, e Serhii Maghdysiuk. "US-China Confrontation in Cyber Security". Історико-політичні проблеми сучасного світу, n.º 45 (27 de junho de 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Texto completo da fonteHaiduk, Oleg, e Volodymyr Zverev. "ANALYSIS OF CYBER THREATS IN THE CONTEXT OF RAPID DEVELOPMENT OF INFORMATION TECHNOLOGY". Cybersecurity: Education, Science, Technique 3, n.º 23 (2024): 225–36. http://dx.doi.org/10.28925/2663-4023.2024.23.225236.
Texto completo da fonteBardhant, Sara, e Pallabhi Chakraborty. "The Dark Web's Influence on International Relations: Unravelling the Hidden Threads". Journal of Judikaltura 2, n.º 1 (30 de dezembro de 2023): 1–11. http://dx.doi.org/10.61963/jkt.v2i1.62.
Texto completo da fonteMatthews, Gerald, Ryan Wohleber, Jinchao Lin, Lauren Reinerman-Jones, Valarie Yerdon e Nathanael Pope. "Cognitive and Affective Eye Tracking Metrics for Detecting Insider Threat: A Study of Simulated Espionage". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, n.º 1 (setembro de 2018): 242–46. http://dx.doi.org/10.1177/1541931218621056.
Texto completo da fonteTANRIVERDIYEV, Elshan. "THE STATE OF THE CYBER ENVIRONMENT AND NATIONAL CYBERSECURITY STRATEGY IN DEVELOPED COUNTRIES". National Security Studies 23, n.º 1 (30 de março de 2022): 19–26. http://dx.doi.org/10.37055/sbn/149510.
Texto completo da fonteLindsay, Jon Randall. "Restrained by design: the political economy of cybersecurity". Digital Policy, Regulation and Governance 19, n.º 6 (11 de setembro de 2017): 493–514. http://dx.doi.org/10.1108/dprg-05-2017-0023.
Texto completo da fonteSelján, Gábor. "The Remarkable 10th Anniversary of Stuxnet". Academic and Applied Research in Military and Public 19, n.º 3 (2020): 85–98. http://dx.doi.org/10.32565/aarms.2020.3.6.
Texto completo da fonteHagen, Raymond André, e Kirsi Helkala. "Complexity of Contemporary Indicators of Compromise". European Conference on Cyber Warfare and Security 23, n.º 1 (21 de junho de 2024): 697–707. http://dx.doi.org/10.34190/eccws.23.1.2149.
Texto completo da fonteTrofymenko, Olena, Nataliia Loginova, Manakov Serhii e Yaroslav Dubovoil. "CYBERTHREATS IN HIGHER EDUCATION". Cybersecurity: Education, Science, Technique 16, n.º 4 (2022): 76–84. http://dx.doi.org/10.28925/2663-4023.2022.16.7684.
Texto completo da fonteBaloch, Rafay. "Cyber Warfare Trends, Tactics and Strategies: Lessons for Pakistan". Journal of Development Policy, Research & Practice (JoDPRP) 3, n.º 1 (31 de dezembro de 2019): 23–43. http://dx.doi.org/10.59926/jodprp.vol03/02.
Texto completo da fonteNikolaienko, Bohdan, e Serhii Vasylenko. "APPLICATION OF THE THREAT INTELLIGENCE PLATFORM TO INCREASE THE SECURITY OF GOVERNMENT INFORMATION RESOURCES". Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, n.º 4 (20 de dezembro de 2021): 9–13. http://dx.doi.org/10.35784/iapgos.2822.
Texto completo da fonteKhalid, Dr Mohammed. "Emerging Challenges to India’s National Security: a Domestic Dimension". Scholars Journal of Arts, Humanities and Social Sciences 9, n.º 11 (18 de novembro de 2021): 600–603. http://dx.doi.org/10.36347/sjahss.2021.v09i11.006.
Texto completo da fonteLavanya M. "A Review on Detection of Cybersecurity Threats in Banking Sectors Using Ai Based Risk Assessment". Journal of Electrical Systems 20, n.º 6s (29 de abril de 2024): 1359–65. http://dx.doi.org/10.52783/jes.2909.
Texto completo da fonteKWA, Patrick Aurélien AMPIRI, Rostand Martialy Davy Loembe Souamy e Aristide MANKITI FATI. "Contribution to Securing BYOD Systems in Financial Authorities and Public Administrations in Free Trade Zones". International Journal of Managing Value and Supply Chains 15, n.º 2 (15 de junho de 2024): 01–12. http://dx.doi.org/10.5121/ijmvsc.2024.15201.
Texto completo da fonteРЫБИНЕЦ В.А., РЫБИНЕЦ В. А. "RISKS OF MALICIOUS USE OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES FOR THE GLOBAL ECONOMY: INFORMATION AND PSYCHOLOGICAL ASPECT". Экономика и предпринимательство, n.º 2(163) (9 de maio de 2024): 1400–1404. http://dx.doi.org/10.34925/eip.2024.163.2.279.
Texto completo da fonteAli, Hisham, Jawad Ahmad, Zakwan Jaroucheh, Pavlos Papadopoulos, Nikolaos Pitropakis, Owen Lo, Will Abramson e William J. Buchanan. "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform". Entropy 24, n.º 10 (28 de setembro de 2022): 1379. http://dx.doi.org/10.3390/e24101379.
Texto completo da fonteSkitsko, Oleksii. "ATTACK SURFACE IN THE CONTEXT OF ITS USERS (“TREAT ACTORS”) FOR CRITICAL INFRASTRUCTURE FACILITIES". Cybersecurity: Education, Science, Technique 4, n.º 24 (2024): 229–40. http://dx.doi.org/10.28925/2663-4023.2024.24.229240.
Texto completo da fonteTrân Dai, Candice. "CHINA AND CYBERSECURITY. ESPIONAGE, STRATEGY AND POLITICS IN THE DIGITAL DOMAIN, Jon R. Lindsay, Tai Ming Cheung et Derek S. Reveron, Oxford, Oxford University Press, 2015, 398 pages". Politique étrangère Hiver, n.º 4 (9 de novembro de 2015): XXI. http://dx.doi.org/10.3917/pe.154.0187u.
Texto completo da fonteGriffin, Brandon, Keitavius Alexander, Xavier-Lewis Palmer e Lucas Potter. "Social-Engineering, Bio-economies, and Nation-State Ontological Security: A Commentary". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de fevereiro de 2023): 111–18. http://dx.doi.org/10.34190/iccws.18.1.1021.
Texto completo da fonteAustin, Greg. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron. New York: Oxford University Press, 2015. 398 pp. US$99.00/£22.99 (paper)." China Journal 75 (janeiro de 2016): 161–63. http://dx.doi.org/10.1086/684056.
Texto completo da fonteSemenov, B. R. "International Aspect of PRC Information Security Policy". EURASIAN INTEGRATION: economics, law, politics 18, n.º 2 (14 de julho de 2024): 148–58. http://dx.doi.org/10.22394/2073-2929-2024-02-148-158.
Texto completo da fonteMr. Sharan L. Pais, Shrihstha, Shrikara R M, Shruthi C S e Sudheepa Poojari. "Cyber Warfare: Espionage, Botnet". International Journal of Advanced Research in Science, Communication and Technology, 20 de julho de 2022, 271–74. http://dx.doi.org/10.48175/ijarsct-5819.
Texto completo da fonteAl Balushi, Mohamed Rashid. "Regulating Cybersecurity in Corporate America. Specific Reference to Corporate Espionage." SSRN Electronic Journal, 2017. http://dx.doi.org/10.2139/ssrn.3037161.
Texto completo da fonte"China and cybersecurity: espionage, strategy, and politics in the digital domain". Choice Reviews Online 53, n.º 03 (20 de outubro de 2015): 53–1504. http://dx.doi.org/10.5860/choice.192972.
Texto completo da fonteHaner, Justin K., e Robert K. Knake. "Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity". Journal of Cybersecurity 7, n.º 1 (1 de janeiro de 2021). http://dx.doi.org/10.1093/cybsec/tyab003.
Texto completo da fonteVanshika Shukla. "A BRIEF STUDY OF INTERNATIONAL LAW IN THE AGE OF CYBERSECURITY". EPRA International Journal of Multidisciplinary Research (IJMR), 17 de novembro de 2023, 269–73. http://dx.doi.org/10.36713/epra14915.
Texto completo da fonteLindsay, Jon R. "Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity". Journal of Peace Research, 30 de janeiro de 2024. http://dx.doi.org/10.1177/00223433231217664.
Texto completo da fonteSanjeev Arora. "The Hidden Threat: Exposing OSINT Exploitation in Cyber Attacks". International Journal of Advanced Research in Science, Communication and Technology, 19 de abril de 2024, 421–25. http://dx.doi.org/10.48175/ijarsct-17472.
Texto completo da fonteGÖRKAN EVRE, Özlem, e Bünyamin CİYLAN. "Measurement of the Cybersecurity Strategy Effectiveness with a Scorecard Based On Risk Analysis". Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, 30 de outubro de 2023. http://dx.doi.org/10.29109/gujsc.1345984.
Texto completo da fonteTurcanu, Dinu, Natalia Spinu, Serghei Popovici e Tatiana Turcanu. "CYBERSECURITY OF THE REPUBLIC OF MOLDOVA: A RETROSPECTIVE FOR THE PERIOD 2015-2020". Journal of Social Sciences IV(1) (março de 2021). http://dx.doi.org/10.52326/jss.utm.2021.4(1).10.
Texto completo da fonteNagathota, Joshua, Jothsna Kethar e Sarada Prasad Gochhayat, Ph.D. "Effects of Technology and Cybercrimes on Business and Social Media". Journal of Student Research 12, n.º 4 (30 de novembro de 2023). http://dx.doi.org/10.47611/jsr.v12i4.2284.
Texto completo da fonteChunlei, Si, e Liu Yuxin. "Exploring the discourse of enterprise cyber governance in the covid-19 era: a sociosemiotic perspective". International Journal of Legal Discourse, 20 de abril de 2022. http://dx.doi.org/10.1515/ijld-2022-2064.
Texto completo da fonte