Suggested Topics within your search.
Suggested Topics within your search.
International relations
16
Military history
12
Terrorism, armed struggle
9
Warfare & defence
9
Warfare and defence
6
Defence strategy, planning & research
5
Espionage & secret services
5
Cyber security
4
Espionage and secret services
4
History of engineering and technology
4
Military and defence strategy
4
Diplomacy
3
International humanitarian law
3
International institutions
3
Politics & government
3
Public international law
3
Computer security
2
Cybersecurity
2
Gender studies, gender groups
2
Malaysia
2
Media studies
2
Political control & freedoms
2
Technology: general issues
2
Abstracting
1
Academic literature
1
Armed conflict
1
Artificial intelligence
1
BP Islam. Bahaism. Theosophy, etc
1
Biography: general
1
Biography: science, technology and medicine
1
-
1
-
2by Sri Ayu AstutiSubjects: “...cyber law enforcement...”
Published 2015-12-01
Get full text
Article -
3
-
4“.... And then, this paper will analyze whether “Cyber-Bullying” will against the criminal law in Taiwan or not. “Cyber...”
Get full text
Others -
5
-
6by Masood, Ummi Hani Binti“... of the international law in dealing with cyber-attacks. This study focuses on several approaches to draw out analysis...”
Published 2017
Get full text
-
7by S. Yu. Garkusha-BozhkoSubjects: “...cyber espionage...”
Published 2021-03-01
Get full text
Article -
8
-
9
-
10“... in the digital era. In Taiwan, the most important law regarding computer crimes is in the Penal Code, Chapter 36...”
Get full text
Others -
11
-
12by Maat, Sandra MarianaSubjects: “...Cyber inspectors...”
Published 2009
Get full text
Get full text
Others -
13Published 2022Subjects: “...International humanitarian law bicssc...”
Open Access: DOAB, download the publication
Open Access: DOAB: description of the publication
eBook -
14by Wibowo Antonius PS“...The phenomenon of cyber bullying may be a lot happening among students but the law is less...”
Published 2018-01-01
Get full text
Article -
15
-
16“...Cyber-physical networking systems (CPNSs) are made up of various physical systems...”
Get full text
Article -
17by Faga Hemen PhilipSubjects: “...transnational cyber threats...”
Published 2017-06-01
Get full text
Article -
18“...-defence ", To recognize the exceptions to the exercise of force. In the 21st century, cyber attacks have...”
Get full text
Others -
19by David L. Bibighaus“... encountered in cyber warfare (Power-Law randomness) is fundamentally different from the uncertainty...”
Published 2015-12-01
Get full text
Article -
20