Showing 161 - 180 results of 227 for search '"Espionage"', query time: 0.07s Refine Results
  1. 161

    A Systematic Review of the State of Cyber-Security in Water Systems by Nilufer Tuptuk, Peter Hazell, Jeremy Watson, Stephen Hailes

    Published 2021-01-01
    “…Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial espionage and sabotage against these systems. In this paper, we review the state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure. …”
    Get full text
    Article
  2. 162

    Im Sog interner Ermittlungen: „Geliebte von Banditen“ und die fehlende Wachsamkeit eines Offiziers des Sicherheitsamtes im stalinistischen Polen by Martin Gumiela

    Published 2023-12-01
    “…Since both women had previous ties to the anti-communist resistance, it was insinuated that they had used their acquaintance with Tataj for espionage purposes, and thus the Security Office accused Tataj of a lack of vigilance toward these women. …”
    Get full text
    Article
  3. 163

    Shakespeare in the Box: Gregory Doran’s Hamlet (2009) by Ana-Maria IFTIMIE

    Published 2021-12-01
    “…A telling example is Gregory Doran’s 2009 filmed theatrical performance, which places Elsinore in a modern-day British society under constant surveillance, probably with a view to transposing the old Elizabethan habits of espionage and control of the population in a manner both accessible and relatable to the contemporary viewer. …”
    Get full text
    Article
  4. 164

    The Impact of Cyberwarfare on the National Security by Temur Digmelashvili

    Published 2023-08-01
    “…Additionally, cyber espionage undermines national security by facilitating the theft of sensitive data. …”
    Get full text
    Article
  5. 165

    The Armenians Politics of Russia Before the World War I by Ahmet TOKSOY

    Published 2020-07-01
    “…The living of some part of Armenians undertook insurrection, rebellion and espionage activifies belong to foreign states from the ending of the 19th century. …”
    Get full text
    Article
  6. 166

    Passive and Active Vaccination Strategies to Prevent Ricin Poisoning by Jody Berry, Ellen S. Vitetta, Kejing Song, Seth H. Pincus, Joan E. Smallshaw

    Published 2011-09-01
    “…RT must be considered during any “white powder” incident and there have been documented cases of its use in espionage [2,3]. The clinical syndrome resulting from ricin intoxication is dependent upon the route of exposure. …”
    Get full text
    Article
  7. 167

    Official Secrets Act: a commentary / Mohd Ramli Othman by Othman, Mohd Ramli

    Published 1987
    “…The English Act, an anti espionage legacy of pre World War 1, was enacted in the wake of hysteria leading up to the outbreak of the war. …”
    Get full text
    Student Project
  8. 168

    Enhancement of physical security control for data centre and perimeter in banking: a case study of central bank of Sudan (CBOS) by Abas, Hafiza, Azizan, Azizul, Mohd. Daud, Salwani, Salih Yagoub, Fathi Ibrahim

    Published 2018
    “…Through the transaction, it stores important data that needs to be protected from any kind of security breach such as data theft, espionage, sabotage, information leakage and so on. …”
    Article
  9. 169

    Detection and Classification of Multirotor Drones in Radar Sensor Networks: A Review by Angelo Coluccia, Gianluca Parisi, Alessio Fascista

    Published 2020-07-01
    “…Small UAVs, often called drones, are enabling unprecedented applications but, at the same time, new threats are arising linked to their possible misuse (e.g., drug smuggling, terrorist attacks, espionage). In this paper, the main challenges related to the problem of drone identification are discussed, which include detection, possible verification, and classification. …”
    Get full text
    Article
  10. 170

    Designing a Governance System for Cybersecurity of Foreign Investment in Europe by Federica Cristani

    Published 2023-07-01
    “…In the last years, the most frequent (documented) cyber-threats have been: malware; phishing attacks; spam; denial of service; ransomware; insider threat; data breaches; information leakage; cryptojacking and cyber espionage. In the context of investment protection, cyberattacks may have different targets: data on foreign investments and/or foreign investors that are available in digital forms (including trade secrets) and data related to investment arbitration. …”
    Get full text
    Article
  11. 171

    Eric Ambler and the Trick of Boundaries by Nadia Priotti

    Published 2018-02-01
    “…At the same time, though, Ambler uses his characters and plots to force the formula conventions of espionage literature, presenting anti-heroes no longer driven by patriotic values and acting against their will; moreover, he introduces business as a new enemy with no frontiers, and moral dilemmas that defy easy good/bad distinctions. …”
    Get full text
    Article
  12. 172

    Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions by Dr. Muhammad Riaz Shad

    Published 2018-01-01
    “…Cyber threats range from non-kinetic such as cybercrime, espionage, hacking and information propaganda to kinetic, viz. cyber warfare. …”
    Get full text
    Article
  13. 173

    Information security of business networks by A. S. Losev

    Published 2022-08-01
    “…The aim of the work is to improve the information security of businesstype networks, as the most susceptible to external threats for the purpose of commercial espionage.Method. The study is based on the use of an original mathematical algorithm that allows clustering networks of arbitrary topology and constructing a partial order matrix. …”
    Get full text
    Article
  14. 174

    Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure by Choucri, Nazli, Agarwal, Gaurav

    Published 2022
    “…Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1] This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. …”
    Get full text
    Get full text
    Article
  15. 175

    Analysis of known and unknown malware bypassing techniques by Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin, Norouzizadeh, Farhood

    Published 2013
    “…Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. …”
    Get full text
    Article
  16. 176

    The presentation of an effective pattern for proper application of UAV in empowering Future operation of defense organizations (case study I.R.I.Airforce Flight operation) by nikbakhsh habibi

    Published 2017-05-01
    “…UAVs or unmanned aerial vehicle, besides being used in its main missions, can be used in different categories such as reconnaissance, intelligence, espionage, guidance of smart weapons toward target and direct attack against targets. …”
    Get full text
    Article
  17. 177

    SAN: an Integrated Unmanned Air Vehicles Interdictor System Concept by Marcin KRÓL, Wojciech KOPERSKI, Jan BŁASZCZYK, Ryszard WOŹNIAK, Paweł M. BŁASZCZYK

    Published 2017-12-01
    “…UAVs can be used for espionage, contraband, and the trafficking or transport of arms and hazardous materials. …”
    Get full text
    Article
  18. 178

    0271 Francisco de Holanda's Drawings and Words: Fortification, Architecture and Urban Design by Margarida Tavares da Conceição

    Published 2022-05-01
    “…Educated in royal circles, at a time when imperial overseas ambitions depended strongly on military expertise, Holanda lent his skills as a painter to the task of espionage through his drawings of foreign fortifications, while making a significant contribution to the development of architectural language and thus to the emergence of the architect's profile. …”
    Get full text
    Article
  19. 179

    The Language of Deception: Applying Findings on Opinion Spam to Legal and Forensic Discourses by Alibek Jakupov, Julien Longhi, Besma Zeddini

    Published 2023-12-01
    “…Digital forensic investigations are becoming increasingly crucial in criminal investigations and civil litigations, especially in cases of corporate espionage and intellectual property theft as more communication occurs online via e-mail and social media. …”
    Get full text
    Article
  20. 180

    Measurement of the Cybersecurity Strategy Effectiveness with a Scorecard Based On Risk Analysis by Özlem GÖRKAN EVRE, Bünyamin CİYLAN

    Published 2023-12-01
    “…Attacks, thefts and espionage using technology increase exponentially every year compared to the previous. …”
    Get full text
    Article