Suggested Topics within your search.
Suggested Topics within your search.
International relations
9
Warfare & defence
8
Military history
7
Defence strategy, planning & research
5
Espionage & secret services
5
Terrorism, armed struggle
5
Cyber security
4
Cybersecurity
2
Diplomacy
2
International institutions
2
Malaysia
2
Political control & freedoms
2
Politics & government
2
Public international law
2
Abstracting
1
Academic literature
1
BP Islam. Bahaism. Theosophy, etc
1
Bitcoin
1
Cloud computing
1
Complexity theory
1
Computer crime
1
Computer fraud
1
Computer related crimes
1
Computing & information technology
1
Control systems
1
Control theory
1
Coping strategies
1
Court of law
1
Criminalisation
1
Cryptocurrencies
1
-
81
-
82“...) argue that the existing international law sufficiently addresses the relationships in the area...”
Get full text
Article -
83
-
84
-
85by Sissing, Shandre KimSubjects: “...Cyber stalking...”
Published 2014
Get full text
Get full text
Others -
86
-
87by Hossein Mohammad Kourepaz, Seyyed Mahmood Mirkhalili, Abdoulali Tavajohi, Hamid BahremandSubjects: “...Criminal profile; Criminal profiling; Cyber criminals; Criminal identification; Social...”
Published 2015-01-01
Get full text
Article -
88
-
89by Li, Qiao“...Cyber-physical systems (CPS) refer to a promising class of systems featuring intimate coupling...”
Published 2012
Get full text
Get full text
Others -
90
-
91by Homem, Irvin“.... It is no different within the society interconnected by the Internet (The Internet Society). Law enforcement in every...”
Published 2013
Get full text
Others -
92
-
93by Reindl-Krauskopf, SusanneSubjects: “...Cyber Crime...”
Published 2017-12-01
Get full text
Article -
94
-
95by Dian Alan Setiawan“...Cyber technology gives birth to criminal activities carried out inside the cyberspace which...”
Published 2020-12-01
Get full text
Article -
96by Antonyan Elena Aleksandrovna, Grishko Natalya Aleksandrovna, Milovanova Marina Mikhailovna“... of human life support where its application is an opportunity to repel cyber threats the forms...”
Published 2021-01-01
Get full text
Article -
97by Cisneros, Maribel“... to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability...”
Published 2015
Get full text
-
98by George B. LiluashviliSubjects: “...cyber risk mitigation...”
Published 2021-04-01
Get full text
Article -
99by الاء محمد رحيم“..., which requires us a quick review of all laws that seek to curb cyber crime, whether at the international...”
Published 2019-01-01
Get full text
Article -
100