Cyber spying

Known as: Cyber spy, Cyber-espionage, Cyberespionage 
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without the permission of the holder of the information (personal… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
The economics of an internet crime has newly developed into a field of controlling black money. This economic approach not only… (More)
  • figure 1
  • figure 2
Is this relevant?
2014
2014
  • Bogdan-Alexandru BRATOSIN
  • 2014
The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world… (More)
  • figure 1
Is this relevant?
2013
2013
We present new attacks and robust countermeasures for security-sensitive components, such as single sign-on APIs and client-side… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2013
2013
Cyber warfare figures prominently on the agenda of policymakers and military leaders around the world. New units to ensure cyber… (More)
Is this relevant?
2013
2013
  • Anthony Masys
  • IEEE/ACM International Conference on Advances in…
  • 2013
Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and… (More)
  • figure 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Stuxnet was the first targeted malware that received worldwide attention for causing physical damage in an industrial… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2012
2012
The current study was designed to extend the interpersonal deviance literature into the online domain by examining the incidence… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
SCADA systems are widely used in critical infrastructure sectors, including electricity generation and distribution, oil and gas… (More)
Is this relevant?
2004
2004
Observables of malicious behavior in the cyber realm are derived from intuition or analysis of previous (a-posteriori) events… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
lobalization is certainly a source of anxiety in the U.S. academic world. And the sources of this anxiety are many: Social… (More)
Is this relevant?