Suggested Topics within your search.
Suggested Topics within your search.
International relations
16
Military history
12
Terrorism, armed struggle
9
Warfare & defence
9
Warfare and defence
6
Defence strategy, planning & research
5
Espionage & secret services
5
Cyber security
4
Espionage and secret services
4
History of engineering and technology
4
Military and defence strategy
4
Diplomacy
3
International humanitarian law
3
International institutions
3
Politics & government
3
Public international law
3
Computer security
2
Cybersecurity
2
Gender studies, gender groups
2
Malaysia
2
Media studies
2
Political control & freedoms
2
Technology: general issues
2
Abstracting
1
Academic literature
1
Armed conflict
1
Artificial intelligence
1
BP Islam. Bahaism. Theosophy, etc
1
Biography: general
1
Biography: science, technology and medicine
1
-
101by الاء محمد رحيم“..., which requires us a quick review of all laws that seek to curb cyber crime, whether at the international...”
Published 2019-01-01
Get full text
Article -
102
-
103
-
104Published 2022Subjects: “...African Union, Constitutionalisation, Cyber Stability, Cyberspace, Digital Ecosystem...”
Open Access: DOAB, download the publication
Open Access: DOAB: description of the publication
eBook -
105by Il-Yeol Song, Ki Jung Lee, Xiaohua Hu, John D. Maguire, Namyoun Choi, Peter Chen“...Journal of Digital Forensics, Security and Law...”
Published 2006-09-01
Get full text
Article -
106
-
107by Matijašević-Obradović JelenaSubjects: “...cyber crime...”
Published 2014-01-01
Get full text
Article -
108by Ezeji, Chiji Longinus.“... Africa. The law/Legislation used in prosecution of cyber related crime in South Africa is too lenient...”
Published 2014
Get full text
Others -
109by Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard SmithSubjects: “...cyber attacks...”
Published 2016-04-01
Get full text
Article -
110by Monica Hidajat, Angry Ronald Adam, Muhammad Danaparamita, Suhendrik Suhendrik“... Journal focus on condition and cyber bullying state by interview respondents in law terms. Second journal...”
Published 2015-03-01
Get full text
Article -
111
-
112“... not only can prevent the beginners breaking the law but also can learn from Cyber Kill Chain of Advanced...”
Get full text
Others -
113by Karine e Silva“...The article proposes a deeper insight into the variety of concepts used to describe the term cyber...”
Published 2013-10-01
Get full text
Article -
114by Bartłomiej Balawejder, Robert Dankiewicz, Anna Ostrowska-Dankiewicz, Tomasz TomczykSubjects: “...cyber security...”
Published 2019-12-01
Get full text
Article -
115Subjects: “...information security, cyber security, hospital Dashboard, indicators...”
Get full text
Article -
116by CHENG CHU YI, 鄭居益“...碩士 === 國立臺北大學 === 犯罪學研究所 === 98 === ABSTRACT Social learning and children’s cyber-bully behavior...”
Get full text
Others -
117by Elder, James R.“...Cyber security threat detection is the process of identifying anomalous and frequent patterns...”
Published 2017
Get full text
-
118
-
119by Sushereba, Christen Elizabeth LopezSubjects: “...Cyber network defense...”
Published 2018
Get full text
-
120