Search

Your search keyword '"Cyber"' showing total 1,409 results

Search Constraints

Start Over You searched for: Descriptor "Cyber" Remove constraint Descriptor: "Cyber"
1,409 results on '"Cyber"'

Search Results

1. Ceci n’est pas une nuke? The impact of emerging militarised technologies on strategic stability.

2. A Distributed RF Threat Sensing Architecture.

3. Beyond control? The political economy of private interception, intrusion, and surveillance markets.

4. New technology, old strategy: Cyberspace and the international politics of African agency.

5. Unpacking cyberbullying: The influence of age, gender, and social media addiction.

6. Cyberwashing: The disconnect between cyber security claims and real practices.

7. Online Sexual Harassment in Adolescence: A Scoping Review.

8. In Search of Suitable Methods for Cost-Benefit Analysis of Cyber Risk Mitigation in Offshore Wind: A Survey

9. Norm diffusion in cyber governance: China as an emerging norm entrepreneur?

10. The evolution of EU–US cybersecurity law and policy: on drivers of convergence.

11. Perlindungan Hukum Terhadap Hak Privasi Subjek Data Pribadi dalam Insiden Serangan Siber Pusat Data Nasional Sementara.

12. Impact of Covid-19 Pandemic Circumstances on Cyber Hygiene of University Students.

13. Design and Implementation of Internet of Things (IoT) Framework for Governing Modern Cyber Attacks in Computer Network.

14. The self-reported impacts of the COVID-19 pandemic on psychological health of U.S. Air Force cyber personnel.

15. Performance estimation of honeynet system for network security enhancement via copula linguistic.

16. Adopting AI: how familiarity breeds both trust and contempt.

17. Cyber Evaluation and Management Toolkit (CEMT): Face Validity of Model-Based Cybersecurity Decision Making.

18. 'Cyber-rattling: can 'pre-positioning' in cyberspace amount to a threat of the use of force under Article 2(4) of the United Nations Charter?

19. Von der Defensive zur Cyberoffensive? Aktive Cyberabwehr, Hackbacks und der Diskurs der Akteure in der deutschen Cybersicherheitspolitik.

20. Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study.

23. Novel Security Mechanism for AI Enabled Wastewater Treatment Systems

27. Typology of State Actors' Behavior in Cyber Space.

28. Past and Present Russian Information Operations in Ukraine: Competition into Conflict.

30. Determinant Factors of Cyber Security Disclosure: A Systematic Literature Review.

31. Pencegahan Kejahatan Siber Terkait Distribusi Perjudian Online di Indonesia dalam Rangka Mewujudkan Keamanan dan Ketertiban Masyarakat.

32. BİLGİ SAVAŞIMINDA YENİ MEDYA BAĞLAMINDA SAYISAL OLMAYAN HAREKÂT.

33. الخطاب الدعوي في مكافحة الإرهاب الإلكتروني: وثيقة مكة المكرمة نموذجا.

34. RISK IN CYBER ENVIRONMENT.

35. The bitskrieg that was and wasn't: the military and intelligence implications of cyber operations during Russia's war on Ukraine.

36. Securitatea cibernetică din perspectiva respectării drepturilor și libertăților individuale.

37. RĂZBOIUL GEOPOLITIC AL LUMII CONTRA LUMII - posibile configuraţii cogno-ciber-hibridoomnispaţiale -.

38. The Geopolitics of Disinformation in a Continued Cold War: A Study of Russia's Cyber Information Operations Strategy (2022-2023).

39. الحرب السيبرانية وتأثيرها على الأمن القومي العراق انموذجا).

40. A Study on the Levels of Adoption of Cyberculture and Global Citizenship among Social Studies Teacher Candidates.

41. پدافند غیرعامل

42. Pembelajaran Dasar Keamanan Pengguna Sosial Media Pada Tim PKK Petugas Kelurahan Duri Kepa Kebon Jeruk Jakarta Barat

43. Advancing Understanding: Exploring Cyberbullying Awareness Among Individual.

44. Unveiling Israel’s Cyber Legal Landscape: A Comprehensive Analysis of Cybersecurity Regulations and Policies

46. DDOS ATTACK DETECTION USING HYBRID (CCN AND LSTM) ML MODEL

47. The need for an integrated model of smart warfare

48. Personality and internet trolling: a validation study of a Representative Sample.

49. Spies and scholars in the cyber age: researching intelligence in Australian policy and regional security.

50. Going nuclear: The development of American strategic conceptions about cyber conflict.

Catalog

Books, media, physical & digital resources