Showing 121 - 140 results of 227 for search '"Espionage"', query time: 0.08s Refine Results
  1. 121

    Enhancement of cryptographic algorithms used in electronic communication systems by Ee, Kiam Keong

    Published 2010
    “…Communications security was until recently, of interest mainly to bodies concerned with national security, such as the military, diplomatic and espionage services. However, with the increasing use of electronic communications in industrial and commercial activities, the subject of communication security has achieved wider importance in recent years. …”
    Get full text
    Thesis
  2. 122

    Repurposing <i>α</i>-Adrenoreceptor Blockers as Promising Anti-Virulence Agents in Gram-Negative Bacteria by Ahmad J. Almalki, Tarek S. Ibrahim, Sameh S. Elhady, Khaled M. Darwish, Wael A. H. Hegazy

    Published 2022-01-01
    “…In conclusion, <i>α</i>-adrenergic blockers are proposed as promising anti-virulence agents as they hinder QS receptors and inhibit bacterial espionage.…”
    Get full text
    Article
  3. 123

    Lessons Learned in Intelligence Analysis by CASIS Vancouver

    Published 2018-11-01
    “…The subsequent roundtable discussion focused on examining the notion of whether Canada has been excessively lenient towards individuals who have been convicted of espionage, with particular regards to the selling of classified information. …”
    Get full text
    Article
  4. 124

    Prizrenski proces 1956. i njegova revizija 1968. godine by Igor Vukadinović

    Published 2022-08-01
    “…The aim of the paper is to shed light on the ambiguities from the trial in Prizren against nine persons suspected of espionage, as well as the final annulment of this process twelve years later. …”
    Get full text
    Article
  5. 125

    The cyber threat from Pyongyang by Nah, Liang Tuang

    Published 2023
    “…Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly destructive malware deliverable online to networked computers, or to standalone systems autonomous of the internet. …”
    Get full text
    Commentary
  6. 126

    Meaningless data by Federico Biggio

    Published 2022-12-01
    “…Subsequently, using two semiotic squares, the whistleblowers’ information-delivering practice will be compared with those that define acts of espionage, trolling and fear-mongering: these positional roles of information delivery will be described on the basis of the law/crime and saying/doing semantic oppositions.    …”
    Get full text
    Article
  7. 127

    Cyberspace in Canadian Security Policy by Miron Lakomy

    Published 2013-06-01
    “…The phenomenon of cyber terrorism, cyber espionage, or even the first examples of using cyberspace to conduct military operations has convinced decision-makers that new solutions to security challenges need to be implemented. …”
    Get full text
    Article
  8. 128

    Approaches to cyber weapons classification problem by V. V. Kabernik

    Published 2013-04-01
    “…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
    Get full text
    Article
  9. 129

    US-China cyber talks : internet security in the global economy by C. Raja Mohan

    Published 2013
    “…Focused on the economic implications of cyber espionage, the incipient Sino-US dialogue could define the terms of the global debate on developing cyber norms.…”
    Get full text
    Get full text
    Commentary
  10. 130

    Decomposing value gains – the case of the best leveraged buy-out ever by Austin, N, Phalippou, L

    Published 2022
    “…This story involves a high stakes leveraged buyout, layoffs, allegations of corporate espionage, the revival of an iconic brand, a $14 billion capital gain, the largest ever in private equity, and the emergence of the largest private market firm. …”
    Journal article
  11. 131

    Corporate intelligence: modern view and development trends by I. P. Akimova, O. A. Dmitrieva, A. V. Vlasov

    Published 2020-07-01
    “…And even managed to acquire stereotypes: some consider corporate intelligence analogous to industrial espionage, others imagine it as a game of office workers in « James Bond», and the rest do not understand why it is needed in the enterprise.Corporate intelligence specialists analyze available information and check all market sources in order to make an assessment of all possible threats and risks to the business.…”
    Get full text
    Article
  12. 132

    A rota dos estudos sobre a cochonilha em Portugal e no Brasil no século XIX: caminhos desencontrados The route of the studies of cochineal in Portugal and Brazil in the nineteenth... by Márcia Helena Mendes Ferraz

    Published 2007-08-01
    “…This period witnessed, accordingly, several initiatives aimed at producing the precious dye: publication of specialized texts, cultivation of the cactus and the insect from which the dye is extracted, and, also, attempts to obtain the secrets of production through espionage. The present paper analyses certain aspects of the measures adopted by the Portuguese government towards Brazil in this field. …”
    Get full text
    Article
  13. 133

    Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security by Abdul Molok , Nurul Nuha

    Published 2013
    “…The western literature often report incidents of OSN causing malware attacks on corporate networks, leakage of confidential information, identity theft, cyber espionage and sabotage. Thus, this study investigates the use of OSN sites among employees of Malaysia organization including academic and non-academic staff of IIUM…”
    Get full text
    Monograph
  14. 134

    Canadian Immigration Policy and the Russo-Ukraine War by Robert Falconer

    Published 2022-08-01
    “…As well, refugees tend to be targets of espionage themselves and can be a valuable source of intelligence. …”
    Get full text
    Article
  15. 135

    The morality of unconventional force by Simpson, T

    Published 2016
    “…I then apply this view to espionage and other forms of unconventional force, outlining the tricky policy implications of my thesis.…”
    Book section
  16. 136

    Lessons Learned from Chinese Intelligence Officer Arrest by CASIS-Vancouver

    Published 2018-11-01
    “…The following events are: 1) A press release (Oct 10, 2018) announcing Chinese Ministry of State Security (MSS) operative, Yanjun Xu, aka Qu Hui, aka Zhang Hui, has been arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple U.S. aviation and aerospace companies (Department of Justice, 2018). 2) A press release (Sept 25, 2018) announcing that the FBI arrested a Chinese national named Ji Chaoqun in Chicago working as an unregistered agent of China’s civilian intelligence agency targeting American defence contractors.  …”
    Get full text
    Article
  17. 137

    Seen in Its True Light: Desertion as a Pure Political Crime by Amar Khoday

    Published 2014-11-01
    “…Furthermore, the article posits and discusses why desertion should constitute a pure political crime much like treason, sedition, or espionage. Lastly, the article argues, pursuant to United Nations policies, that such deserters should be able to obtain refugee status only where their desertion constitutes a refusal to be associated with military actions that are internationally condemned as contrary to the basic rules of human conduct.…”
    Get full text
    Article
  18. 138

    La metropoli dell’agente ich=Spaik: Libidissi di Georg Klein by Moira Paleari

    Published 2014-05-01
    “…Combining the analysis of the role of the German spy ich=Spaik, the main figure of Klein’s novel, with a mapping of the geographies of the city Libidissi, I will point out to what extent the author poses a challenge to the tradition of the spy-story and in what way he considers Ich=Spaik’s activities, intending them not only as an operation of espionage, but especially as a persistent questioning of a problematic identity, of a figure, who is continuously confronting the image of his native country, his original belonging with the Other. …”
    Get full text
    Article
  19. 139

    Relations between the Russian Federation and the European Union as Reflected by the Spanish Press in 2021 by A. E. Tsymbalova

    Published 2022-06-01
    “…The articles focus on the following topics: expulsion of diplomats, mutual accusations in espionage and disinformation, Nord Stream II, Satellite V, A. …”
    Get full text
    Article
  20. 140

    Hybrid nature of modern threats for cybersecurity and information security by Oleksandr TSARUK, Maria KORNIIETS

    Published 2020-03-01
    “…The examination of hybrids threats - the cyber leverages to diplomacy, the practice of cyber retaliation, cyber sabotage and espionage, cyber weapons and the cyber arms race - was given. …”
    Get full text
    Article