NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 8.122
1.
  • Routledge Handbook of Inter... Routledge Handbook of International Cybersecurity (Edition 1)
    Eneken Tikk; Mika Kerttunen Routledge eBooks, 01/2020
    eBook
    Odprti dostop

    The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. ...
Celotno besedilo
2.
  • Cyber Warfare Cyber Warfare
    Springer, Paul J 2020, 2020-07-31, 2020-07-08
    eBook

    Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents ...
Celotno besedilo
3.
  • The Virtual Weapon and Inte... The Virtual Weapon and International Order
    Kello, Lucas 09/2017
    eBook

    An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international orderThe cyber revolution ...
Celotno besedilo
4.
  • Fuzzy Detection System for ... Fuzzy Detection System for Rumors Through Explainable Adaptive Learning
    Guo, Zhiwei; Yu, Keping; Jolfaei, Alireza ... IEEE transactions on fuzzy systems, 2021-Dec., 2021-12-00, Letnik: 29, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Nowadays, rumor spreading has gradually evolved into a kind of organized behaviors, accompanied with strong uncertainty and fuzziness. However, existing fuzzy detection techniques for rumors focused ...
Celotno besedilo
5.
  • Access Contested Access Contested
    Deibert, Ronald; Palfrey, John; Rohozinski, Rafal ... 09/2011
    eBook
    Odprti dostop

    Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines.
Celotno besedilo
6.
  • Presenting an ontology mode... Presenting an ontology model of Cyberspace sovereignty: In order to provide a comprehensive definition
    hatef rasouli; Mohammad Hasanzadeh; samaneh rahimian Pizhūhishnāmah-i pardāzish va mudiriyyat-i iṭṭilāʻāt (Online), 12/2023, Letnik: 39, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Also, considering the increasing need of people for virtual space, the governance of the site space has become an important part of the governance of the national real space. Therefore, the existence ...
Celotno besedilo
7.
  • Digital Transformations in ... Digital Transformations in Public International Law
    09/2022
    eBook
    Odprti dostop

    Sovereignty, security, rights, participation: these four macro-issues have been deeply affected by the impact of digital technologies on the inner infrastructures of public international law. But ...
Celotno besedilo
8.
  • Cybertheology Cybertheology
    Spadaro, Antonio; Way, Mari; Spadaro, Antonio 2014, 2014-09-19, 20140919
    eBook, Book

    This book, written by Antonio Spadaro, S.J., the Editor of La Civilta Cattolica, has been translated by Maria Way, who specializes in topics relating to media and religion. The author suggests that ...
Celotno besedilo
9.
  • Challenges and Countermeasu... Challenges and Countermeasures of China's Cyberspace Governance in the New Era
    Zhao, Fengyun; Shi, Yaning; Yao, Ke SHS Web of Conferences, 2021, Letnik: 96
    Journal Article, Conference Proceeding
    Recenzirano
    Odprti dostop

    In the context of the new era, countries are constantly competing and cooperating in the field of cyberspace. China is facing an increasingly complex international environment. Meanwhile, the number ...
Celotno besedilo

PDF
10.
Celotno besedilo
1 2 3 4 5
zadetkov: 8.122

Nalaganje filtrov