已选(0)清除
条数/页: 排序方式:
|
| WAR AND DEFENSE IN VIRTUAL SPACE 期刊论文 Annals: Series on Military Sciences, 2018, 卷号: Vol.10 No.1, 页码: 50-62 作者: GheorgheBOARU 收藏  |  浏览/下载:7/0  |  提交时间:2019/12/24
|
| Investigation Procedures in Terrorist Electronic Crimes and it’s Challenges: A study in the Saudi legal system 期刊论文 Arab Journal of Forensic Sciences & Forensic Medicine, 2015, 卷号: Vol.1 No.1 作者: NehadFaroukAbbasMohamed 收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
|
| IMPORTANCE AND SIGNIFICANCE OF INFORMATION SHARING IN TERRORISM FIELD. 期刊论文 Science International, 2014, 卷号: Vol.26 No.5, 页码: 1719-1725 作者: Shibghatullah,AbdulSamad; Yusof,Robiah; Alaameri,Alaa; Abaas,Thamer 收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
|
| An Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and Discussion 期刊论文 Information Systems Education Journal, 2010, 卷号: Vol.8 No.52 作者: Peslak,AlanR. 收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
|
| Terrorism. 期刊论文 College and Research Libraries News, 2008, 卷号: Vol.69 No.6, 页码: 325-328 作者: Collins,Kay 收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
|
| Revealed -- untried technology and huge cost of web surveillance plans. 期刊论文 Computer Weekly, 2008, 页码: 10 作者: Jennings,Cath 收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
|
| Cyber warfare and cyber terrorism [electronic resource] 专著 :Information Science Reference, 2008 作者: [editedby]LechJ.Janczewski,AndrewM.Colarik 收藏  |  浏览/下载:2/0  |  提交时间:2020/01/13 |
| Real time big data analytics for predicting terrorist incidents 会议论文 Waltham, MA, USA 【关键词】, 2016 作者: IbrahimToure; AryyaGangopadhyay 收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
|
| Interactive data analysis with nSpace2® 会议论文 2011 作者: Sheffield,David; Canfield,CaseyM. 收藏  |  浏览/下载:1/0  |  提交时间:2020/01/04
|