Showing 201 - 220 results of 227 for search '"Espionage"', query time: 0.09s Refine Results
  1. 201
  2. 202

    FPGA implementation of naive bayes classifier for network security by Mohamad Zuki, Ahmad Zulzhafri

    Published 2018
    “…In the vast usage of internet nowadays, the rate of cybercrime such as fraud, hacking, identity theft, network intrusion, software piracy and espionage are becoming more critical. Malware code writers used this chance to create malware that able to breach the security and gain access to the information. …”
    Get full text
    Thesis
  3. 203

    Detecting and preventing unauthorised computer access on a physical network system by Mohd. Shariff, Muhammad Reza

    Published 2008
    “…These internal threats may come from disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. …”
    Get full text
    Thesis
  4. 204

    Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing by Sandesh Achar, Nuruzzaman Faruqui, Md Whaiduzzaman, Albara Awajan, Moutaz Alazab

    Published 2023-04-01
    “…Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. …”
    Get full text
    Article
  5. 205

    Foreign Consulates in Odesa (1920s – 1930s) by Liudmyla Vovchuk

    Published 2023-04-01
    “…But, despite the constantly emphasized friendship in relations between the USSR and the countries listed above, their consulates and employees found themselves under the Soviet special services close supervision, which considered any consulates representatives’ actions as espionage. In order to be fully effective, the special services recruited representatives from both consulate employees and persons who were in contact with the consul. …”
    Get full text
    Article
  6. 206

    THE DESIGN ENGINEER’S M.I. KOSHKIN MEMORANDUM ON THE PROGRESS OFWORK OF NEWARTILLERY SYSTEMS CREATION IN THE KIROV’S PLANT DESIGN BUREAU (From the Funds of the Central State Archiv... by Andrei M. Riabkov, Alexander L. Kleitman

    Published 2022-02-01
    “…By the end of the 30s of the twentieth century, he acquired the necessary knowledge and experience, several tools of his development were put into a series, but the arrest and imprisonment of Makhanov and some of his subordinates in the ITL on charges of “conscious sabotage and espionage” ultimately put an end to these developments. …”
    Get full text
    Article
  7. 207

    Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses by Zia Muhammad, Zahid Anwar, Abdul Rehman Javed, Bilal Saleem, Sidra Abbas, Thippa Reddy Gadekallu

    Published 2023-06-01
    “…These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users. …”
    Get full text
    Article
  8. 208

    Methodological principles of economic crime prevention within trade enterprises’ internal audit system by A.O. Semenets

    Published 2019-06-01
    “…The economic crimes that arise in the activity of trading enterprises are systematized by the following groups: financial (illegal appropriation of property, tax evasion, insider trading); mixed (falsification of documents, bribery and corruption, kickbacks); official (intellectual property rights violation, corporate espionage, unethical corporate behavior). It is proved that necessary condition of owners’ rights protection is appropriate accumulation of reliable information concerning the use of property in economic activity of a commercial enterprise, which could be achieved within accounting system. …”
    Get full text
    Article
  9. 209

    The Concept of Sustainable Development in the Projection of Modern Transformational Trends: A New Reality and New Opportunities for Business by E. A. Kuklina

    Published 2022-08-01
    “…When developing and implementing corporate strategies, it is necessary to take into account ESG risks, as well as possible threats to economic security (resource substitution, growth of intellectual property, cyberattacks, industrial espionage).   Findings. The updated concept of sustainable development makes it possible to ensure economic growth when it is balanced with the needs of society to improve the quality of life, prevent degradation of the natural environment, but subject to ensuring safety and security.…”
    Get full text
    Article
  10. 210
  11. 211

    A perception assessment on security awareness in Malaysian government agencies by Rasch model / Mohd Ismail Ahmad, Azrilah Abdul Aziz and Mohd Saidfudin Masodi by Ahmad, Mohd Ismail, Abdul Aziz, Azrilah, Masodi, Mohd Saidfudin

    Published 2008
    “…It is aimed as preventive measures to frustrate sabotage, espionage, prevent damage to the country from subversion and other covert activity; frustrate proliferation of detrimental information, watch out for new or re-emerging types of threat; protect the Government's sensitive information and assets. …”
    Get full text
    Article
  12. 212

    Deterrence by norms to stop interstate cyber attacks by Taddeo, M

    Published 2017
    “…State-run cyber attacks have been launched for espionage and sabotage purposes since 2003. Well-known examples include Titan Rain (2003), the Russian attack against Estonia (2006) and Georgia (2008), Red October targeting mostly Russia and Eastern European Countries (2007), Stuxnet and Operation Olympic Game against Iran (2006–2012). …”
    Journal article
  13. 213

    Controlling of Bacterial Virulence: Evaluation of Anti-Virulence Activities of Prazosin against <i>Salmonella enterica</i> by Mahmoud A. Elfaky, Abrar K. Thabit, Khalid Eljaaly, Ayat Zawawi, Ahmed S. Abdelkhalek, Ahmad J. Almalki, Tarek S. Ibrahim, Wael A. H. Hegazy

    Published 2022-11-01
    “…To sum up, prazosin showed significant inhibitory activities against QS, T3SS, and bacterial espionage, which documents its considered anti-virulence activities.…”
    Get full text
    Article
  14. 214
  15. 215

    Global Co-Evolution of Informational and Combat Weapons in the Context of the Systemic Genesis of Humankind: an Informatics-Cybernetic View by Sergey Grinchenko

    Published 2022-07-01
    “…Starting from the third stage, subversive activities in the form of intelligence/espionage/deception of the enemy and the collapse of the economic, administrative and educational structures of its communities/societies act as an information weapon. …”
    Get full text
    Article
  16. 216

    Sustainable integration of digitalisation in nursing education—an international scoping review by Tim Tischendorf, André Heitmann-Möller, Sven-Nelson Ruppert, Maria Marchwacka, Sandra Schaffrin, Tom Schaal, Martina Hasseler

    Published 2024-04-01
    “…However, this change also harbours risks, such as the use of immature digital applications in the care sector, data theft and industrial espionage. In order to be able to exploit the potential of digitalisation despite these risks, it is necessary to integrate relevant aspects such as digital skills into nursing training. …”
    Get full text
    Article
  17. 217

    The economics of industrial cyberespionage by Stupak, O

    Published 2022
    “…We demonstrate that industrial espionage has an ambiguous influence on the overall investments exerted in the race and companies' expected payoffs and might even be beneficial for the quality of innovative end-products under certain circumstances.…”
    Thesis
  18. 218

    STRATEGIC ORIENTARIES OF LEGALIZATION OF THE ECONOMY OF UKRAINE: ECONOMIC AND LEGAL ASPECTS by M. M. Blikhar, L. А. Savchenko, I. I. Komarnytska, M. V. Vinichuk

    Published 2019-06-01
    “…The basic structural components of legal sector of economy are certain in the article, namely: legal trading in legal commodities; legal migration of labour force; legal motion of raw material and informative resources, capital assets, and also illegal sector of economy : contraband goods; illegal migration and trading in people; contraband goods of sources of raw materials; international "white-washing"; economic espionage and trade. On the basis of компаративного analysis the legal analysis of criminal legislation, the results of that allow to assert that in Ukraine responsibility increases for corruption abuses and set limitations for persons, that accomplished them, is conducted, and also in relation to their amnesty. …”
    Get full text
    Article
  19. 219

    Loyalty, secrecy and revolutionary work: female underground operatives and narratives about Chinese female spies before and after 1949 by Zhang, A

    Published 2021
    “…As such, this thesis contributes to the study of female espionage in China by examining those who were attached to the peripheries of CCP intelligence operations. …”
    Thesis
  20. 220

    Religiosos viajeros: el Padre Giovacchino Geroni (o.f.m.) en Chile (1920-1922) by Luis O Cortese

    Published 2006-01-01
    “…It arises as a hypothesis, if among the implicit intentions of the journey, was not that of espionage, which he had already made for Italy in China towards 1900. …”
    Get full text
    Article