Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,869,391 papers from all fields of science
Search
Sign In
Create Free Account
Cyber spying
Known as:
Cyber spy
, Cyber-espionage
, Cyberespionage
Expand
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without the permission of the holder of the information (personal…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Computer and network surveillance
Cyber-collection
Cyber-security regulation
Cyberspace
Expand
Broader (5)
Computer security
Cybercrime
Information sensitivity
Security engineering
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Methodical and Applied Aspects of Creation and Application of Cyber Ranges
Y. Danyk
Theoretical and Applied Cybersecurity
2019
Corpus ID: 199018598
The methodical and applied aspects of the creation and application of cyber ranges are proposed in the article. The new solutions…
Expand
2018
2018
Victimization Analysis Based On Routine Activitiy Theory for Cyber-Love Scam in Malaysia
M. E. Saad
,
Siti Norul Huda Sheikh Abdullah
International Conference on Cybernetics, Robotics…
2018
Corpus ID: 59525530
Nowadays, cyber-love scam cases in Malaysia are increasing along with cutting-edge technological advances. Therefore, this paper…
Expand
2016
2016
Coalitional Security Games
Qingyu Guo
,
Bo An
,
Yevgeniy Vorobeychik
,
Long Tran-Thanh
,
Jiarui Gan
,
C. Miao
Adaptive Agents and Multi-Agent Systems
2016
Corpus ID: 16957197
Game theoretic models of security, and associated computational methods, have emerged as critical components of security posture…
Expand
2015
2015
Internet in Modern Russia: History of Development, Place and Role
A. Galushkin
2015
Corpus ID: 142965567
In the present article author analyzes theoretical and practical questions of the role and place of Internet in modern Russia…
Expand
2015
2015
Here Come the Trade Secret Trolls
David S. Levine
,
Sharon K. Sandeen
2015
Corpus ID: 166576087
Within the past few years, the U.S. federal government has been forced to confront the massive but hard-to-quantify problem of…
Expand
2015
2015
Seizing the Diplomatic Initiative to Control Cyber Conflict
Paul Meyer
2015
Corpus ID: 153868481
Conflict has always been a feature of the international system, and states have devised means of dealing with it along the…
Expand
2014
2014
Learning to Detect Phishing Webpages
Ram B. Basnet
,
A. Sung
Journal of Internet Services and Information…
2014
Corpus ID: 9313720
Phishing has become a lucrative business for cyber criminals whose victims range from end users to large corporations and…
Expand
2012
2012
Deconstructing Flame: the limitations of traditional defences
K. Munro
2012
Corpus ID: 62537168
2012
2012
Recasting ‘Nuclear-Free Korean Peninsula’ as a Sino-American Language for Co-ordination
Taku Tamaki
Japanese Journal of Political Science
2012
Corpus ID: 154979061
Abstract A series of Six-Party Talks involving the United States, China, Japan, South and North Korea, and Russia resulted in the…
Expand
2004
2004
Constructive and Dysfunctional Personal Web Usage in the Workplace: Mapping Employee Attitudes
M. Anandarajan
,
Claire A. Simmers
2004
Corpus ID: 156697296
In order to better understand how people work in the Web-enabled workplace, we examined the phenomenon of personal Web usage (PWU…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE