-
201
Explorations in international relations: Final program report
Published 2022Get full text
Technical Report -
202
FPGA implementation of naive bayes classifier for network security
Published 2018“…In the vast usage of internet nowadays, the rate of cybercrime such as fraud, hacking, identity theft, network intrusion, software piracy and espionage are becoming more critical. Malware code writers used this chance to create malware that able to breach the security and gain access to the information. …”
Get full text
Thesis -
203
Detecting and preventing unauthorised computer access on a physical network system
Published 2008“…These internal threats may come from disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. …”
Get full text
Thesis -
204
Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing
Published 2023-04-01“…Individuals, corporations, and society can all suffer considerable digital asset losses due to cyber attacks, including data loss, theft, financial loss, reputation harm, company interruption, infrastructure damage, ransomware attacks, and espionage. A cyber-physical attack harms both digital and physical assets. …”
Get full text
Article -
205
Foreign Consulates in Odesa (1920s – 1930s)
Published 2023-04-01“…But, despite the constantly emphasized friendship in relations between the USSR and the countries listed above, their consulates and employees found themselves under the Soviet special services close supervision, which considered any consulates representatives’ actions as espionage. In order to be fully effective, the special services recruited representatives from both consulate employees and persons who were in contact with the consul. …”
Get full text
Article -
206
THE DESIGN ENGINEER’S M.I. KOSHKIN MEMORANDUM ON THE PROGRESS OFWORK OF NEWARTILLERY SYSTEMS CREATION IN THE KIROV’S PLANT DESIGN BUREAU (From the Funds of the Central State Archiv...
Published 2022-02-01“…By the end of the 30s of the twentieth century, he acquired the necessary knowledge and experience, several tools of his development were put into a series, but the arrest and imprisonment of Makhanov and some of his subordinates in the ITL on charges of “conscious sabotage and espionage” ultimately put an end to these developments. …”
Get full text
Article -
207
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
Published 2023-06-01“…These smartphones are an attractive target for cybercriminals and are one of the leading causes of cyber espionage and sabotage. A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users. …”
Get full text
Article -
208
Methodological principles of economic crime prevention within trade enterprises’ internal audit system
Published 2019-06-01“…The economic crimes that arise in the activity of trading enterprises are systematized by the following groups: financial (illegal appropriation of property, tax evasion, insider trading); mixed (falsification of documents, bribery and corruption, kickbacks); official (intellectual property rights violation, corporate espionage, unethical corporate behavior). It is proved that necessary condition of owners’ rights protection is appropriate accumulation of reliable information concerning the use of property in economic activity of a commercial enterprise, which could be achieved within accounting system. …”
Get full text
Article -
209
The Concept of Sustainable Development in the Projection of Modern Transformational Trends: A New Reality and New Opportunities for Business
Published 2022-08-01“…When developing and implementing corporate strategies, it is necessary to take into account ESG risks, as well as possible threats to economic security (resource substitution, growth of intellectual property, cyberattacks, industrial espionage). Findings. The updated concept of sustainable development makes it possible to ensure economic growth when it is balanced with the needs of society to improve the quality of life, prevent degradation of the natural environment, but subject to ensuring safety and security.…”
Get full text
Article -
210
-
211
A perception assessment on security awareness in Malaysian government agencies by Rasch model / Mohd Ismail Ahmad, Azrilah Abdul Aziz and Mohd Saidfudin Masodi
Published 2008“…It is aimed as preventive measures to frustrate sabotage, espionage, prevent damage to the country from subversion and other covert activity; frustrate proliferation of detrimental information, watch out for new or re-emerging types of threat; protect the Government's sensitive information and assets. …”
Get full text
Article -
212
Deterrence by norms to stop interstate cyber attacks
Published 2017“…State-run cyber attacks have been launched for espionage and sabotage purposes since 2003. Well-known examples include Titan Rain (2003), the Russian attack against Estonia (2006) and Georgia (2008), Red October targeting mostly Russia and Eastern European Countries (2007), Stuxnet and Operation Olympic Game against Iran (2006–2012). …”
Journal article -
213
Controlling of Bacterial Virulence: Evaluation of Anti-Virulence Activities of Prazosin against <i>Salmonella enterica</i>
Published 2022-11-01“…To sum up, prazosin showed significant inhibitory activities against QS, T3SS, and bacterial espionage, which documents its considered anti-virulence activities.…”
Get full text
Article -
214
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform
Published 2022-09-01“…This methodology can also be applied to combat intellectual property theft and industrial espionage.…”
Get full text
Article -
215
Global Co-Evolution of Informational and Combat Weapons in the Context of the Systemic Genesis of Humankind: an Informatics-Cybernetic View
Published 2022-07-01“…Starting from the third stage, subversive activities in the form of intelligence/espionage/deception of the enemy and the collapse of the economic, administrative and educational structures of its communities/societies act as an information weapon. …”
Get full text
Article -
216
Sustainable integration of digitalisation in nursing education—an international scoping review
Published 2024-04-01“…However, this change also harbours risks, such as the use of immature digital applications in the care sector, data theft and industrial espionage. In order to be able to exploit the potential of digitalisation despite these risks, it is necessary to integrate relevant aspects such as digital skills into nursing training. …”
Get full text
Article -
217
The economics of industrial cyberespionage
Published 2022“…We demonstrate that industrial espionage has an ambiguous influence on the overall investments exerted in the race and companies' expected payoffs and might even be beneficial for the quality of innovative end-products under certain circumstances.…”
Thesis -
218
STRATEGIC ORIENTARIES OF LEGALIZATION OF THE ECONOMY OF UKRAINE: ECONOMIC AND LEGAL ASPECTS
Published 2019-06-01“…The basic structural components of legal sector of economy are certain in the article, namely: legal trading in legal commodities; legal migration of labour force; legal motion of raw material and informative resources, capital assets, and also illegal sector of economy : contraband goods; illegal migration and trading in people; contraband goods of sources of raw materials; international "white-washing"; economic espionage and trade. On the basis of компаративного analysis the legal analysis of criminal legislation, the results of that allow to assert that in Ukraine responsibility increases for corruption abuses and set limitations for persons, that accomplished them, is conducted, and also in relation to their amnesty. …”
Get full text
Article -
219
Loyalty, secrecy and revolutionary work: female underground operatives and narratives about Chinese female spies before and after 1949
Published 2021“…As such, this thesis contributes to the study of female espionage in China by examining those who were attached to the peripheries of CCP intelligence operations. …”
Thesis -
220
Religiosos viajeros: el Padre Giovacchino Geroni (o.f.m.) en Chile (1920-1922)
Published 2006-01-01“…It arises as a hypothesis, if among the implicit intentions of the journey, was not that of espionage, which he had already made for Italy in China towards 1900. …”
Get full text
Article