Suggested Topics within your search.
Suggested Topics within your search.
International relations
9
Warfare & defence
8
Military history
7
Defence strategy, planning & research
5
Espionage & secret services
5
Terrorism, armed struggle
5
Cyber security
4
Cybersecurity
2
Diplomacy
2
International institutions
2
Malaysia
2
Political control & freedoms
2
Politics & government
2
Public international law
2
Abstracting
1
Academic literature
1
BP Islam. Bahaism. Theosophy, etc
1
Bitcoin
1
Cloud computing
1
Complexity theory
1
Computer crime
1
Computer fraud
1
Computer related crimes
1
Computing & information technology
1
Control systems
1
Control theory
1
Coping strategies
1
Court of law
1
Criminalisation
1
Cryptocurrencies
1
-
121Attribution, delayed attribution and covert cyber-attack. Under what conditions should the United...by McDade, Wylie“... state to publically acknowledge its role in the conduct of a cyber-operation. The central result...”
Published 2014
Get full text
-
122Subjects: “...it law, cyber crimes, sociological problems, personal rights, north cyprus....”
Get full text
Article -
123“... Cyber University has become an example of E-learning applications. Because our national law has...”
Get full text
Others -
124
-
125
-
126
-
127“... than the one exercised by the law. Notably, we stress that internet intermediaries privately enforce...”
Get full text
Article -
128by Garcia, Colleen Elizabeth.“... to answer two questions: (1) Are existing international laws governing cyber attacks conducted by nation...”
Published 2012
Get full text
-
129“... of violations in this area. In this study, cybercrimes within the scope information technology law...”
Get full text
Article -
130
-
131
-
132
-
133by Angélica Flórez, Lenin Serrano, Urbano Gómez, Luis Suárez, Alejandro Villarraga, Hugo RodríguezSubjects: “...Cyber security...”
Published 2016-07-01
Get full text
Article -
134by Ntsaluba, Nandi“... comprehensive draft Bill on CyberSecurity and CyberCrime as a response to the SADC model law on Computer Crime...”
Published 2018
Get full text
Get full text
-
135
-
136“...碩士 === 元智大學 === 資訊管理學系 === 105 === Seeing the netizen misbehavior is on the increase, lead Cyber...”
Get full text
Others -
137“... cyber crimes. Being different from the evidence collected for investigating traditional crimes...”
Get full text
Others -
138by Dinh, Tran Thai Son“.... The first and foremost task is to gather as much information about cyber threats as possible so that cyber...”
Published 2014
Get full text
Get full text
Others -
139
-
140