Suggested Topics within your search.
Suggested Topics within your search.
International relations
16
Military history
12
Terrorism, armed struggle
9
Warfare & defence
9
Warfare and defence
6
Defence strategy, planning & research
5
Espionage & secret services
5
Cyber security
4
Espionage and secret services
4
History of engineering and technology
4
Military and defence strategy
4
Diplomacy
3
International humanitarian law
3
International institutions
3
Politics & government
3
Public international law
3
Computer security
2
Cybersecurity
2
Gender studies, gender groups
2
Malaysia
2
Media studies
2
Political control & freedoms
2
Technology: general issues
2
Abstracting
1
Academic literature
1
Armed conflict
1
Artificial intelligence
1
BP Islam. Bahaism. Theosophy, etc
1
Biography: general
1
Biography: science, technology and medicine
1
-
81
-
82by Moore, Ryan J.“... dramatically. Neither security policies nor international laws have been able to keep up with the demands...”
Published 2012
Get full text
-
83
-
84“...) argue that the existing international law sufficiently addresses the relationships in the area...”
Get full text
Article -
85
-
86
-
87by Sissing, Shandre KimSubjects: “...Cyber stalking...”
Published 2014
Get full text
Get full text
Others -
88
-
89by Hossein Mohammad Kourepaz, Seyyed Mahmood Mirkhalili, Abdoulali Tavajohi, Hamid BahremandSubjects: “...Criminal profile; Criminal profiling; Cyber criminals; Criminal identification; Social...”
Published 2015-01-01
Get full text
Article -
90
-
91by Li, Qiao“...Cyber-physical systems (CPS) refer to a promising class of systems featuring intimate coupling...”
Published 2012
Get full text
Get full text
Others -
92
-
93by Homem, Irvin“.... It is no different within the society interconnected by the Internet (The Internet Society). Law enforcement in every...”
Published 2013
Get full text
Others -
94
-
95by Reindl-Krauskopf, SusanneSubjects: “...Cyber Crime...”
Published 2017-12-01
Get full text
Article -
96
-
97by Dian Alan Setiawan“...Cyber technology gives birth to criminal activities carried out inside the cyberspace which...”
Published 2020-12-01
Get full text
Article -
98by Antonyan Elena Aleksandrovna, Grishko Natalya Aleksandrovna, Milovanova Marina Mikhailovna“... of human life support where its application is an opportunity to repel cyber threats the forms...”
Published 2021-01-01
Get full text
Article -
99by Cisneros, Maribel“... to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability...”
Published 2015
Get full text
-
100by George B. LiluashviliSubjects: “...cyber risk mitigation...”
Published 2021-04-01
Get full text
Article