Showing 221 - 227 results of 227 for search '"Espionage"', query time: 0.09s Refine Results
  1. 221

    Danmarks retningslinjer for internationalt forskningssamarbejde: En balancegang mellem politisk pragmatik og risikostyring by Maj Grasten, Stine Haakonsson

    Published 2024-04-01
    “…This article tracks how Danish research collaboration with China has changed from peaceable, to China being perceived as a threat that implied Danish research institutions were both targets of espionage and key players in Danish foreign and security policy, to that threat being one that must be weighed against the benefits of economic relations. …”
    Get full text
    Article
  2. 222

    Detecting ulterior motives from verbal cues in group deliberations by Norah E. Dunbar, Judee K. Burgoon, Xunyu Chen, Xinran Wang, Saiying Ge, Qing Huang, Jay Nunamaker

    Published 2023-05-01
    “…Because these real-world interviews often lack experimental control and ground truth, this investigation explored whether results of non-forensic interviews generalize to forensic ones.MethodsOrganizational espionage was simulated to determine (1) what verbal signals distinguish truth from deception, (2) whether deception in groups aligns with deception in dyads, and (3) whether non-forensic venues can be generalized to forensic ones. …”
    Get full text
    Article
  3. 223

    Current problems of international information security by Serhii Lubenets, Igor Harchenko, Yevhen Pavlenko

    Published 2023-06-01
    “…The trend is also a further increase in the number and scope of cyber-attacks for any political purpose, be it espionage, subversion or destruction. At the same time, it is expected that more countries will join the list of those participating in offensive cyber operations, and that these operations will become more daring, persistent and disruptive, with more serious consequences. …”
    Get full text
    Article
  4. 224

    Cyber conflicts in international relations: Framework and case studies by Gamero-Garrido, Alexander

    Published 2022
    “…Cuckoo's Egg, Morris Worm, Solar Sunrise, Electronic Disturbance Theater, ILOVEYOU, Chinese Espionage, Estonia, Russo-Georgian war, Conficker, NSA-Snowden, WikiLeaks and Stuxnet are some of the major cases included.…”
    Get full text
    Working Paper
  5. 225
  6. 226

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…These cyberattacks against industrial entities, for common attacks examples, Trojan Horses, replay and man-in-the-middle, can lead to security compromises including espionage, sabotage, and ransomware. Solutions for these cyber security problems and threats are still not satisfactory. …”
    Get full text
    Thesis
  7. 227

    Sociological Analysis of the Story Khishkhaneh Herat from Tarikh Beyhaqi Based on the Theory of Symbolic Interaction by Mohammad Khosravishakib

    Published 2023-03-01
    “…A collective culture that is based more than anything on false shows, control, idealization, concealment, lies, espionage, team collusion, investigation, and interference in people's private lifestyles.…”
    Get full text
    Article