Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Cyber Espionage). Showing records 1 – 8 of 8 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Moulin, Thibault. Le cyber-espionnage en Droit international : Cyber-espionage in International Law.

Degree: Docteur es, Droit international, 2018, Université Grenoble Alpes (ComUE); University of Manchester

Les Etats s’espionnent depuis des siècles, soulevant des tensions. Toutefois, une régulation expresse ne peut être trouvée que dans le droit des conflits armés. Alors… (more)

Subjects/Keywords: Espionnage; Cyber-Espionnage; Cyber; Droit international; Espionnage économique; Relations Internationales; Spying; Cyber-Espionage; Cyber; International Law; Economic espionage; International relations; 340

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moulin, T. (2018). Le cyber-espionnage en Droit international : Cyber-espionage in International Law. (Doctoral Dissertation). Université Grenoble Alpes (ComUE); University of Manchester. Retrieved from http://www.theses.fr/2018GREAD010

Chicago Manual of Style (16th Edition):

Moulin, Thibault. “Le cyber-espionnage en Droit international : Cyber-espionage in International Law.” 2018. Doctoral Dissertation, Université Grenoble Alpes (ComUE); University of Manchester. Accessed April 13, 2021. http://www.theses.fr/2018GREAD010.

MLA Handbook (7th Edition):

Moulin, Thibault. “Le cyber-espionnage en Droit international : Cyber-espionage in International Law.” 2018. Web. 13 Apr 2021.

Vancouver:

Moulin T. Le cyber-espionnage en Droit international : Cyber-espionage in International Law. [Internet] [Doctoral dissertation]. Université Grenoble Alpes (ComUE); University of Manchester; 2018. [cited 2021 Apr 13]. Available from: http://www.theses.fr/2018GREAD010.

Council of Science Editors:

Moulin T. Le cyber-espionnage en Droit international : Cyber-espionage in International Law. [Doctoral Dissertation]. Université Grenoble Alpes (ComUE); University of Manchester; 2018. Available from: http://www.theses.fr/2018GREAD010


Delft University of Technology

2. De Vries, J.A. (author). Towards a roadmap for development of intelligent data analysis based cyber attack detection systems.

Degree: 2012, Delft University of Technology

Cyber-attacks against companies and governments are seeing an increase in complexity and persistence. These more complex attacks are aimed at penetrating corporate and government networks… (more)

Subjects/Keywords: Cyber espionage; intrusion detection; machine learning; intelligent data analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

De Vries, J. A. (. (2012). Towards a roadmap for development of intelligent data analysis based cyber attack detection systems. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:090446d3-7562-41ce-94d3-ab7153cd05d5

Chicago Manual of Style (16th Edition):

De Vries, J A (author). “Towards a roadmap for development of intelligent data analysis based cyber attack detection systems.” 2012. Masters Thesis, Delft University of Technology. Accessed April 13, 2021. http://resolver.tudelft.nl/uuid:090446d3-7562-41ce-94d3-ab7153cd05d5.

MLA Handbook (7th Edition):

De Vries, J A (author). “Towards a roadmap for development of intelligent data analysis based cyber attack detection systems.” 2012. Web. 13 Apr 2021.

Vancouver:

De Vries JA(. Towards a roadmap for development of intelligent data analysis based cyber attack detection systems. [Internet] [Masters thesis]. Delft University of Technology; 2012. [cited 2021 Apr 13]. Available from: http://resolver.tudelft.nl/uuid:090446d3-7562-41ce-94d3-ab7153cd05d5.

Council of Science Editors:

De Vries JA(. Towards a roadmap for development of intelligent data analysis based cyber attack detection systems. [Masters Thesis]. Delft University of Technology; 2012. Available from: http://resolver.tudelft.nl/uuid:090446d3-7562-41ce-94d3-ab7153cd05d5

3. Patton, Cliffard A. The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic .

Degree: 2017, George Mason University

 This thesis describes an international impact of cyber espionage with an emphasis on the United States of America and its National Security Agency's clandestine tactics… (more)

Subjects/Keywords: espionage; electronic surveillance; international law; spying; cyber espionage; Conflict resolution

cyber espionage has crossed the threshold of acceptance in the world of espionage. Espionage… …actions and sentiment globally. The digital age and cyber espionage have become the new standard… …stated the U.S. has conducted cyber espionage on allies such as France and Germany. Both… …2013. The broad degree of cyber espionage was reported to have monitored terror suspects… …partnership. With a continued barrage of news reports that the US had conducted cyber espionage from… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patton, C. A. (2017). The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/10518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Patton, Cliffard A. “The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic .” 2017. Thesis, George Mason University. Accessed April 13, 2021. http://hdl.handle.net/1920/10518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Patton, Cliffard A. “The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic .” 2017. Web. 13 Apr 2021.

Vancouver:

Patton CA. The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic . [Internet] [Thesis]. George Mason University; 2017. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/1920/10518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Patton CA. The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic . [Thesis]. George Mason University; 2017. Available from: http://hdl.handle.net/1920/10518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Pretoria

4. [No author]. Open-source environmental scanning and risk assessment in the statutory counterespionage milieu .

Degree: 2011, University of Pretoria

 The research focuses on the utilisation of open-source information in augmentation of the all-source counterespionage endeavour. The study has the principal objective of designing, contextualising… (more)

Subjects/Keywords: UCTD; Business Intelligence; Cyber espionage; Competitor Intelligence; Competitive Intelligence; CounterEspionage; Environmental Scanning; Knowledge Management; National Security; Open-Source intelligence (OSInt)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2011). Open-source environmental scanning and risk assessment in the statutory counterespionage milieu . (Doctoral Dissertation). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-05232011-105415/

Chicago Manual of Style (16th Edition):

author], [No. “Open-source environmental scanning and risk assessment in the statutory counterespionage milieu .” 2011. Doctoral Dissertation, University of Pretoria. Accessed April 13, 2021. http://upetd.up.ac.za/thesis/available/etd-05232011-105415/.

MLA Handbook (7th Edition):

author], [No. “Open-source environmental scanning and risk assessment in the statutory counterespionage milieu .” 2011. Web. 13 Apr 2021.

Vancouver:

author] [. Open-source environmental scanning and risk assessment in the statutory counterespionage milieu . [Internet] [Doctoral dissertation]. University of Pretoria; 2011. [cited 2021 Apr 13]. Available from: http://upetd.up.ac.za/thesis/available/etd-05232011-105415/.

Council of Science Editors:

author] [. Open-source environmental scanning and risk assessment in the statutory counterespionage milieu . [Doctoral Dissertation]. University of Pretoria; 2011. Available from: http://upetd.up.ac.za/thesis/available/etd-05232011-105415/


University of Pretoria

5. Duvenage, Petrus Carolus. Open-source environmental scanning and risk assessment in the statutory counterespionage milieu.

Degree: Political Sciences, 2011, University of Pretoria

 The research focuses on the utilisation of open-source information in augmentation of the all-source counterespionage endeavour. The study has the principal objective of designing, contextualising… (more)

Subjects/Keywords: UCTD; Business Intelligence; Cyber espionage; Competitor Intelligence; Competitive Intelligence; CounterEspionage; Environmental Scanning; Knowledge Management; National Security; Open-Source intelligence (OSInt)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Duvenage, P. (2011). Open-source environmental scanning and risk assessment in the statutory counterespionage milieu. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/30840

Chicago Manual of Style (16th Edition):

Duvenage, Petrus. “Open-source environmental scanning and risk assessment in the statutory counterespionage milieu.” 2011. Doctoral Dissertation, University of Pretoria. Accessed April 13, 2021. http://hdl.handle.net/2263/30840.

MLA Handbook (7th Edition):

Duvenage, Petrus. “Open-source environmental scanning and risk assessment in the statutory counterespionage milieu.” 2011. Web. 13 Apr 2021.

Vancouver:

Duvenage P. Open-source environmental scanning and risk assessment in the statutory counterespionage milieu. [Internet] [Doctoral dissertation]. University of Pretoria; 2011. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/2263/30840.

Council of Science Editors:

Duvenage P. Open-source environmental scanning and risk assessment in the statutory counterespionage milieu. [Doctoral Dissertation]. University of Pretoria; 2011. Available from: http://hdl.handle.net/2263/30840

6. van Rossum, Jeremiah. An Assessment of North Korean Threats and Vulnerabilities in Cyberspace.

Degree: MSin Defense and Strategic Studies, Defense and Strategic Studies, 2017, Missouri State University

  This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are… (more)

Subjects/Keywords: North Korea; South Korea; cyberspace; cyber conflict; offensive cyberspace operation; cyberattack; cyber espionage; DarkSeoul Gang; Lazarus Group; advanced persistent threat; Defense and Security Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

van Rossum, J. (2017). An Assessment of North Korean Threats and Vulnerabilities in Cyberspace. (Masters Thesis). Missouri State University. Retrieved from https://bearworks.missouristate.edu/theses/3212

Chicago Manual of Style (16th Edition):

van Rossum, Jeremiah. “An Assessment of North Korean Threats and Vulnerabilities in Cyberspace.” 2017. Masters Thesis, Missouri State University. Accessed April 13, 2021. https://bearworks.missouristate.edu/theses/3212.

MLA Handbook (7th Edition):

van Rossum, Jeremiah. “An Assessment of North Korean Threats and Vulnerabilities in Cyberspace.” 2017. Web. 13 Apr 2021.

Vancouver:

van Rossum J. An Assessment of North Korean Threats and Vulnerabilities in Cyberspace. [Internet] [Masters thesis]. Missouri State University; 2017. [cited 2021 Apr 13]. Available from: https://bearworks.missouristate.edu/theses/3212.

Council of Science Editors:

van Rossum J. An Assessment of North Korean Threats and Vulnerabilities in Cyberspace. [Masters Thesis]. Missouri State University; 2017. Available from: https://bearworks.missouristate.edu/theses/3212

7. Mauslein, Jacob A. Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange.

Degree: PhD, Security Studies, 2014, Kansas State University

 As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasingly important to understand how state and sub-state… (more)

Subjects/Keywords: Cyber attack; Cyber terrorism; Cyber espionage; Targeting; Interstate rivalry; Crisis bargaining; Political Science (0615)

cyber attacks, cyber terrorism, and cyber espionage. 10 The Internet and the “World Wide… …x28;e.g., cyber attacks, cyber terrorism, and cyber espionage). Each category maintains… …87 Table 3.2 ZINB Dichotomous Estimates of Cyber Attack Event Counts… …90 Table 3.3 ZINB Count Estimates of Cyber Attacks… …164 Table B.1 Fixed Effects Estimates of Cyber Attack Event Counts (Binary)… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mauslein, J. A. (2014). Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange. (Doctoral Dissertation). Kansas State University. Retrieved from http://hdl.handle.net/2097/18147

Chicago Manual of Style (16th Edition):

Mauslein, Jacob A. “Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange.” 2014. Doctoral Dissertation, Kansas State University. Accessed April 13, 2021. http://hdl.handle.net/2097/18147.

MLA Handbook (7th Edition):

Mauslein, Jacob A. “Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange.” 2014. Web. 13 Apr 2021.

Vancouver:

Mauslein JA. Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange. [Internet] [Doctoral dissertation]. Kansas State University; 2014. [cited 2021 Apr 13]. Available from: http://hdl.handle.net/2097/18147.

Council of Science Editors:

Mauslein JA. Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchange. [Doctoral Dissertation]. Kansas State University; 2014. Available from: http://hdl.handle.net/2097/18147

8. Nsambu, Emmanuel. The Defense Against the latest Cyber Espionage both insider and outsider attacks.

Degree: Information Technology and Media, 2012, Mid Sweden University

  This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and… (more)

Subjects/Keywords: Cyber attacks; Cyber Esionage; Hackers; SQL injection; DDoS attack; DoS attack; defence against cyber Espionage and defence against cyber attacks.; Engineering and Technology; Teknik och teknologier

…Defense Against the latest Cyber Espionage both insider and outsider attacks Emmanuel… …Chapter 6 discusses the results 2 Defense Against the latest Cyber Espionage both insider and… …meant by Cyber Espionage? Cyber espionage refers to the art of accessing confidential or… …the following: personal, political, economical, etc. [4] Cyber espionage can be… …typical a step by step cyber espionage operation [5] Step 1: The attacker uses the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nsambu, E. (2012). The Defense Against the latest Cyber Espionage both insider and outsider attacks. (Thesis). Mid Sweden University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nsambu, Emmanuel. “The Defense Against the latest Cyber Espionage both insider and outsider attacks.” 2012. Thesis, Mid Sweden University. Accessed April 13, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nsambu, Emmanuel. “The Defense Against the latest Cyber Espionage both insider and outsider attacks.” 2012. Web. 13 Apr 2021.

Vancouver:

Nsambu E. The Defense Against the latest Cyber Espionage both insider and outsider attacks. [Internet] [Thesis]. Mid Sweden University; 2012. [cited 2021 Apr 13]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nsambu E. The Defense Against the latest Cyber Espionage both insider and outsider attacks. [Thesis]. Mid Sweden University; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.