نتایج جستجو برای: espionage

تعداد نتایج: 371  

Journal: :Hungarian journal of English and American studies / 2022

Robert A. Vogeler, an American businessman, served seventeen months in a Hungarian prison after being found guilty of espionage and economic sabotage. During his detainment imprisonment, the US government used diplomatic pressure to try secure release. Lucille socialite, personal diplomacy, media, contacts with underworld figures Austria governments release her husband. After their return 1951,...

2016
Guanhua Yan Yunus Kucuk Max Slocum David C. Last

Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...

2005
Martin Dart

Information superiority is a condition that many businesses attempt to attain without truly understanding what it is, or how to get there. This paper presents an overview to help businesspeople recognize the road to information superiority, and some of the essential strategies to implement along the way. Information operations is a concept described to enable information superiority, when used ...

2016
Emmanuel C. Ogu Nikos Vrakas

Denial of Service and Distributed Denial of Service Attacks have significantly shackled the development of computer networks and the internet, and masked their innumerable benefits behind many hours of service unavailability. These attacks are fostered, especially in their distributed variant, by networks of compromised machines (known as botnets, that is, a network of bots) that are taken over...

2017
Guanhua Yan Yunus Kucuk Max Slocum David C. Last

Computer hackers or their malware surrogates constantly look for software vulnerabilities in the cyberspace to perform various online crimes, such as identity theft, cyber espionage, and denial of service attacks. It is thus crucial to assess accurately the likelihood that a software can be exploited before it is put into practical use. In this work, we propose a cognitive framework that uses B...

2016
Lynne Dunbrack

Healthcare organizations are under siege by cybercriminals with the intent to do harm and extort money from their victims. The profile of cybercriminals has evolved from "script kiddies" and rogue individuals who wanted to see how far they can infiltrate a company's IT infrastructure to a more sophisticated, well-funded, and organized effort backed by syndicated crime rings and nation-states mo...

Journal: :Journal of Korean Medical Science 2001
K. Kim H. Hwu L. D. Zhang M. K. Lu K. K. Park T. J. Hwang D. Kim Y. C. Park

In this transcultural study of schizophrenic delusions among patients in Seoul, Shanghai and Taipei, we discovered that both the frequency and content of delusions differed among the three groups; and that these differences could perhaps be explained by varying sociocultural and political situations. Delusional themes that are sensitive to sociocultural or political situations include guilt, lo...

Journal: :Water 2021

Critical infrastructure systems are evolving from isolated bespoke to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence. Although this move improves sensing control capacity gives better integration with business requirements, it also increases the scope for attack malicious entities intend conduct industrial espionage sab...

Journal: :Art History 2023

In 1952, the director of East Berlin's Märkisches Museum discovered three drawings by Matthias Grünewald pasted into a Luther Bible. This remarkable find set off fascinating tale art-historical espionage, but also served as generative moment for construction well-worn cliché revolutionary and peasant sympathizer. I examine artist's transformation an embodiment GDR's socialist ideals interrogati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید