Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East (original ) (raw )Enter the Cyber Dragon Understanding Chinese intelligence agencies' cyber capabilities
Toby Feakin
View PDFchevron_right
Critical Issues in Foreign Intelligence Threat/Cyber Espionage
Mansur Ya'u , Mansur Ya'u
View PDFchevron_right
Cyber Warfare: An Era of Nation-State Actors and Global Corporate Espionage
Joab Kose
2021
View PDFchevron_right
Breaching Protocol: The Threat of Cyberespionage
Tim Stevens
View PDFchevron_right
The Coming Cyber Storm: Examining the Russia-US-China Hacking Nexus, Ed. by Matthew Crosston, A Modern Diplomacy Geopolitical Handbook, No. 2
Dr. Matthew Crosston
View PDFchevron_right
China s cyber espionage operations
pradyot mallick
View PDFchevron_right
The U.S.-China Cyber Warfare in the 21 st Century: Implications for International Security
Saira N Abbasi
Research Article, 2023
View PDFchevron_right
Cyber espionage
Timothy Gr
Cyber espionage , 2019
View PDFchevron_right
China's Engagement in Cyberspace
Francis C . Domingo
Journal of Asian Security and International Affairs, 2016
View PDFchevron_right
On the strategic consequences of digital espionage
Tim Stevens
Journal of Cyber Policy, 2021
View PDFchevron_right
Economic Cyber Espionage: The Need for an Amalgamation of WTO Rules and International Law
Elizabeth Lahiff
View PDFchevron_right
Economic Espionage and Economic Security
IOANNIS KONSTANTOPOULOS
View PDFchevron_right
The Use of Cyber Warfare and its Impact on International Security
Mohammed Saaida
Science For All Publications, 2023
View PDFchevron_right
Soft Spying: Leveraging Globalization as Proxy Military Rivalry, International Journal of Intelligence and Counterintelligence, Vol. 28, No. 1, Spring 2015
Dr. Matthew Crosston
View PDFchevron_right
International Cyber Conflict and National Security
Ryan C Maness
View PDFchevron_right
Countering State-Sponsored Cyber Economic Espionage under International Law
Catherine Lotrionte
North Carolina Journal of International Law and Commercial Regulation, 2015
View PDFchevron_right
China's Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities
Emilio Iasiello
View PDFchevron_right
Spying and Fighting in Cyberspace: What is Which
Gary Brown
View PDFchevron_right
Economic Espionage in International Relations
Mehdi Serghini
2018
View PDFchevron_right
COMPARING AND CONTRASTING HOW THE UNITED STATES AND CHINA ADDRESS CYBERSECURITY
Timothy Gr
COMPARING AND CONTRASTING HOW THE UNITED STATES AND CHINA ADDRESS CYBERSECURITY, 2019
View PDFchevron_right
An Assessment of International Law on the Use of Cyber-Espionage as a Substitute for Traditional Spying
Ayobamidele Joshua
European Journal of Law and Political Science
View PDFchevron_right
The “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Regional Security System
Andrzej Kozlowski
The “Cyber Weapons Gap.” The Assessment of the China’s Cyber Warfare Capabilities and Its Consequences for Regional Security System, 2014
View PDFchevron_right
Porteous, Holly_Cybersecurity & Intelligence_The US Approach
Holly Porteous
2011
View PDFchevron_right
Cyber Espionage: What's the Big Deal
Mark Thomas , Mark Thomas
National Intelligence Journal, 2009
View PDFchevron_right
What are the main differences between the economic and military dimensions of the United States and China’s cybersecurity policies?
Rajveer Batra
International Journal of Advance Research, Ideas and Innovations in Technology, 2021
View PDFchevron_right
Review of Chinese Industrial Espionage: Technology Acquisition and Military Modernization by William C. Hannas, James Mulvenon and Anna B. Puglisi
Francis C . Domingo
View PDFchevron_right
China and The Latent Cyber Threat
Jayadeva Ranade
View PDFchevron_right
US-China Cyber Warfare
Saira N Abbasi
View PDFchevron_right
Cyber Threats and International Security
Dr. Ehab Khalifa
View PDFchevron_right
Chinese Technology Platforms Operating in the United States: Assessing the Threat (Originally Published as a Joint Report of the National Security, Technology, and Law Working Group at the Hoover Institution at Stanford University and the Tech, Law & Security Program at American University Washin...
Chris Inglis
2021
View PDFchevron_right
The Need for Cooperation: National Security and the Effort of Indonesia and China to Maintain Cyber Security
Ali Rokhman
Presented at the First High Level Forum on China-Indonesia People-to -People Exchange among Universities, Central China Normal University, Wuhan, Hubei, China, 2018
View PDFchevron_right
Critical Role of Cyber Security in Global Economy
Emile Mbungu kala
Open Journal of Safety Science and Technology, 2022
View PDFchevron_right
COVERT CYBER CAPABILITIES OF THE US
Dr. E. Dilipraj
Air Power Journal, 2015
View PDFchevron_right
Cybersecurity and International Relations
Nekhoroshikh Angelina
Research Paper, 2024
View PDFchevron_right
Why can't we be friends? Challenges to international cyberwarfare cooperation efforts and the way ahead
Gil Baram
Comparative Strategy, 2019
View PDFchevron_right