-
161
A Systematic Review of the State of Cyber-Security in Water Systems
Published 2021-01-01“…Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial espionage and sabotage against these systems. In this paper, we review the state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure. …”
Get full text
Article -
162
Im Sog interner Ermittlungen: „Geliebte von Banditen“ und die fehlende Wachsamkeit eines Offiziers des Sicherheitsamtes im stalinistischen Polen
Published 2023-12-01“…Since both women had previous ties to the anti-communist resistance, it was insinuated that they had used their acquaintance with Tataj for espionage purposes, and thus the Security Office accused Tataj of a lack of vigilance toward these women. …”
Get full text
Article -
163
Shakespeare in the Box: Gregory Doran’s Hamlet (2009)
Published 2021-12-01“…A telling example is Gregory Doran’s 2009 filmed theatrical performance, which places Elsinore in a modern-day British society under constant surveillance, probably with a view to transposing the old Elizabethan habits of espionage and control of the population in a manner both accessible and relatable to the contemporary viewer. …”
Get full text
Article -
164
The Impact of Cyberwarfare on the National Security
Published 2023-08-01“…Additionally, cyber espionage undermines national security by facilitating the theft of sensitive data. …”
Get full text
Article -
165
The Armenians Politics of Russia Before the World War I
Published 2020-07-01“…The living of some part of Armenians undertook insurrection, rebellion and espionage activifies belong to foreign states from the ending of the 19th century. …”
Get full text
Article -
166
Passive and Active Vaccination Strategies to Prevent Ricin Poisoning
Published 2011-09-01“…RT must be considered during any “white powder” incident and there have been documented cases of its use in espionage [2,3]. The clinical syndrome resulting from ricin intoxication is dependent upon the route of exposure. …”
Get full text
Article -
167
Official Secrets Act: a commentary / Mohd Ramli Othman
Published 1987“…The English Act, an anti espionage legacy of pre World War 1, was enacted in the wake of hysteria leading up to the outbreak of the war. …”
Get full text
Student Project -
168
Enhancement of physical security control for data centre and perimeter in banking: a case study of central bank of Sudan (CBOS)
Published 2018“…Through the transaction, it stores important data that needs to be protected from any kind of security breach such as data theft, espionage, sabotage, information leakage and so on. …”
Article -
169
Detection and Classification of Multirotor Drones in Radar Sensor Networks: A Review
Published 2020-07-01“…Small UAVs, often called drones, are enabling unprecedented applications but, at the same time, new threats are arising linked to their possible misuse (e.g., drug smuggling, terrorist attacks, espionage). In this paper, the main challenges related to the problem of drone identification are discussed, which include detection, possible verification, and classification. …”
Get full text
Article -
170
Designing a Governance System for Cybersecurity of Foreign Investment in Europe
Published 2023-07-01“…In the last years, the most frequent (documented) cyber-threats have been: malware; phishing attacks; spam; denial of service; ransomware; insider threat; data breaches; information leakage; cryptojacking and cyber espionage. In the context of investment protection, cyberattacks may have different targets: data on foreign investments and/or foreign investors that are available in digital forms (including trade secrets) and data related to investment arbitration. …”
Get full text
Article -
171
Eric Ambler and the Trick of Boundaries
Published 2018-02-01“…At the same time, though, Ambler uses his characters and plots to force the formula conventions of espionage literature, presenting anti-heroes no longer driven by patriotic values and acting against their will; moreover, he introduces business as a new enemy with no frontiers, and moral dilemmas that defy easy good/bad distinctions. …”
Get full text
Article -
172
Cyber Threat in Interstate Relations: Case of US-Russia Cyber Tensions
Published 2018-01-01“…Cyber threats range from non-kinetic such as cybercrime, espionage, hacking and information propaganda to kinetic, viz. cyber warfare. …”
Get full text
Article -
173
Information security of business networks
Published 2022-08-01“…The aim of the work is to improve the information security of businesstype networks, as the most susceptible to external threats for the purpose of commercial espionage.Method. The study is based on the use of an original mathematical algorithm that allows clustering networks of arbitrary topology and constructing a partial order matrix. …”
Get full text
Article -
174
Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
Published 2022“…Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1] This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. …”
Get full text
Get full text
Article -
175
Analysis of known and unknown malware bypassing techniques
Published 2013“…Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. …”
Get full text
Article -
176
The presentation of an effective pattern for proper application of UAV in empowering Future operation of defense organizations (case study I.R.I.Airforce Flight operation)
Published 2017-05-01“…UAVs or unmanned aerial vehicle, besides being used in its main missions, can be used in different categories such as reconnaissance, intelligence, espionage, guidance of smart weapons toward target and direct attack against targets. …”
Get full text
Article -
177
SAN: an Integrated Unmanned Air Vehicles Interdictor System Concept
Published 2017-12-01“…UAVs can be used for espionage, contraband, and the trafficking or transport of arms and hazardous materials. …”
Get full text
Article -
178
0271 Francisco de Holanda's Drawings and Words: Fortification, Architecture and Urban Design
Published 2022-05-01“…Educated in royal circles, at a time when imperial overseas ambitions depended strongly on military expertise, Holanda lent his skills as a painter to the task of espionage through his drawings of foreign fortifications, while making a significant contribution to the development of architectural language and thus to the emergence of the architect's profile. …”
Get full text
Article -
179
The Language of Deception: Applying Findings on Opinion Spam to Legal and Forensic Discourses
Published 2023-12-01“…Digital forensic investigations are becoming increasingly crucial in criminal investigations and civil litigations, especially in cases of corporate espionage and intellectual property theft as more communication occurs online via e-mail and social media. …”
Get full text
Article -
180
Measurement of the Cybersecurity Strategy Effectiveness with a Scorecard Based On Risk Analysis
Published 2023-12-01“…Attacks, thefts and espionage using technology increase exponentially every year compared to the previous. …”
Get full text
Article