Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cyber spying

Known as: Cyber spy, Cyber-espionage, Cyberespionage 
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without the permission of the holder of the information (personal… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Healthcare data are grabbing the interest of cyber attackers in recent years. Annihilating consequences of healthcare data could… Expand
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future security interactions is founded… Expand
  • table I
  • table II
  • table III
  • table IV
  • table V
Is this relevant?
2013
2013
Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2013
2013
Attackers of computing resources increasingly aim to keep security compromises hidden from defenders in order to extract more… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
also means that this mismatch may eventually lead to an ‘expectations-capability gap’, reproducing an idea that can be found in… Expand
Is this relevant?
2011
2011
The Internet has been romanticized as a zone of freedom. The alluring combination of sophisticated technology with low barriers… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The rapid expansion of computer connectivity has provided opportunities for criminals to exploit security vulnerabilities in the… Expand
Is this relevant?
2004
2004
In order to better understand how people work in the Web-enabled workplace, we examined the phenomenon of personal Web usage (PWU… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current… Expand
Is this relevant?