Works matching DE "INTELLIGENCE sharing"
1
- Washington Quarterly, 2019, v. 42, n. 4, p. 107, doi. 10.1080/0163660X.2019.1694292
- Lee, Jung-Hoon;
- Phillips, Joe
- Article
2
- Government Technology, 2022, v. 35, n. 4, p. 10
- Article
3
- African Journal of Development Studies, 2021, v. 11, p. 267, doi. 10.31920/2634-3649/2021/SIv1a14
- Ani, Kelechi Johnmary;
- Uwizeyimana, Dominique Emmanuel
- Article
4
- Defence Studies, 2022, v. 22, n. 3, p. 541, doi. 10.1080/14702436.2022.2082952
- Loertscher, Seth;
- Ingleson, Connor;
- Fonseca, Andrew;
- Norlen, Tova;
- Renard, Thomas;
- Gallo, Alex;
- Stephenson, Rob
- Article
5
- International Social Science Review, 2024, v. 100, n. 3, p. 64
- Article
6
- Journal of Suleyman Demirel University Institute of Social Sciences, 2023, n. 45, p. 391
- ÜNAL, Eda;
- KANAT, Selim;
- GÜRKAYNAK, Muharrem
- Article
7
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3303122
- Chatziamanetoglou, Dimitrios;
- Rantos, Konstantinos
- Article
8
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7760509
- Zhang, Xiaohui;
- Miao, Xianghua;
- Xue, Mingying
- Article
9
- Information & Security, 2022, v. 53, n. 1, p. 7, doi. 10.11610/isij.5300
- Sharkov, George;
- Mees, Wim
- Article
10
- Information (2078-2489), 2024, v. 15, n. 9, p. 550, doi. 10.3390/info15090550
- Li, Qiong;
- Zhou, Wanlei;
- Zheng, Xi
- Article
11
- European View, 2016, v. 15, n. 1, p. 57, doi. 10.1007/s12290-016-0393-7
- Article
12
- PLoS ONE, 2018, v. 13, n. 7, p. 1, doi. 10.1371/journal.pone.0200562
- Borghi, John A.;
- Van Gulick, Ana E.
- Article
13
- ComputerWorld Hong Kong, 2016, p. 70
- Article
14
- Canadian Journal of Information & Library Sciences, 2016, v. 40, n. 2, p. 152
- Boutin, Eric;
- Ravatua-Smith, Samuel
- Article
15
- Cardozo International & Comparative Law Review, 2024, v. 7, n. 3, p. 901
- Article
16
- International Journal of Wireless & Ad Hoc Communication, 2023, v. 7, n. 2, p. 25, doi. 10.54216/IJWAC.070202
- Pise, Anil Audumbar;
- Singh, Saurabh;
- Hemachandran K.;
- Gadilkar, Shraddhesh;
- Esther, Zakka Benisemeni;
- Pise, Ganesh Shivaji;
- Imuede, Jude
- Article
17
- Journal of Eastern European Criminal Law, 2023, n. 2, p. 84
- Article
18
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-05296-7
- Alrefaei, Abdulmajeed F.;
- Hawsawi, Yousef M.;
- Almaleki, Deyab;
- Alafif, Tarik;
- Alzahrani, Faisal A.;
- Bakhrebah, Muhammed A.
- Article
19
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2020, n. 24, p. 6
- Article
20
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2017, n. 17/18, p. 15
- Article
21
- Janus.Net: e-Journal of International Relations, 2020, v. 11, n. 2, p. 90, doi. 10.26619/1647-7251.11.2.6
- Article
22
- Janus.Net: e-Journal of International Relations, 2020, v. 11, n. 2, p. 90, doi. 10.26619/1647-7251.11.2.6
- Article
23
- Journal of Intelligence Studies in Business, 2024, v. 14, n. 1, p. 42, doi. 10.37380/jisib.v14.i1.2488
- Alkhawaldeh, Bashar;
- Jaran, Farah Zuhier;
- Al-Shakri, Kadri S.;
- Almahameed, Hazem;
- Taha, Ismail A. Bany
- Article
24
- Expert Systems, 2023, v. 40, n. 4, p. 1, doi. 10.1111/exsy.13113
- Article
25
- Expert Systems, 2019, v. 36, n. 5, p. N.PAG, doi. 10.1111/exsy.12313
- Zhu, Guiyan;
- Ma, Xiaomeng;
- Liu, Benfa
- Article
26
- University of British Columbia Law Review, 2017, v. 50, n. 1, p. 197
- Article
27
- Journal of Illicit Economies & Development, 2024, v. 6, n. 2, p. 19, doi. 10.31389/jied.238
- Article
28
- Security & Defence Quarterly, 2024, v. 47, n. 3, p. 38, doi. 10.35467/sdq/186332
- Article
29
- Intelligence & National Security, 2025, v. 40, n. 2, p. 277, doi. 10.1080/02684527.2025.2477395
- Article
30
- Intelligence & National Security, 2023, v. 38, n. 5, p. 835, doi. 10.1080/02684527.2022.2164604
- Article
31
- Intelligence & National Security, 2020, v. 35, n. 7, p. 925, doi. 10.1080/02684527.2020.1771934
- Article
32
- Intelligence & National Security, 2020, v. 35, n. 7, p. 954, doi. 10.1080/02684527.2020.1768477
- Article
33
- Intelligence & National Security, 2020, v. 35, n. 3, p. 438, doi. 10.1080/02684527.2020.1723830
- Article
34
- Intelligence & National Security, 2020, v. 35, n. 1, p. 20, doi. 10.1080/02684527.2019.1685285
- Article
35
- Intelligence & National Security, 2018, v. 33, n. 7, p. 1053, doi. 10.1080/02684527.2018.1518290
- Article
36
- Intelligence & National Security, 2018, v. 33, n. 7, p. 1040, doi. 10.1080/02684527.2018.1507381
- Rendon, Hector;
- Wilson, Alyson;
- Stegall, Jared
- Article
37
- Intelligence & National Security, 2018, v. 33, n. 6, p. 785, doi. 10.1080/02684527.2018.1454029
- Article
38
- Intelligence & National Security, 2017, v. 32, n. 1, p. 68, doi. 10.1080/02684527.2016.1208379
- Brown, Jonathan N.;
- Farrington, Alex
- Article
39
- Infosfera: Journal of Security Studies & Defense Intelligence, 2018, v. 10, n. 2, p. 89
- Article
40
- Infosfera: Journal of Security Studies & Defense Intelligence, 2018, v. 10, n. 3, p. 23
- Article
42
- Counter Terrorist Trends & Analysis, 2018, v. 10, n. 11, p. 1
- Article
43
- Defence Against Terrorism Review, 2014, v. 6, n. 1, p. 47
- Article
44
- Defence Against Terrorism Review, 2014, v. 6, n. 1, p. 5
- Article
45
- Bulletin de la Sécurité Africaine, 2024, n. 43, p. 1
- EIZENGA, DANIEL;
- GNANGUÊNON, AMANDINE
- Article
46
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5586335
- Zhang, Huixia;
- Shen, Guowei;
- Guo, Chun;
- Cui, Yunhe;
- Jiang, Chaohui
- Article
47
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 235, doi. 10.32604/cmc.2023.029135
- Binhui Tang;
- Junfeng Wang;
- Huanran Qiu;
- Jian Yu;
- Zhongkun Yu;
- Shijia Liu
- Article
48
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 235, doi. 10.32604/cmc.2023.029135
- Binhui Tang;
- Junfeng Wang;
- Huanran Qiu;
- Jian Yu;
- Zhongkun Yu;
- Shijia Liu
- Article
49
- Computers, Materials & Continua, 2021, v. 67, n. 1, p. 917, doi. 10.32604/cmc.2021.014848
- Article
50
- North Korean Review, 2023, v. 19, n. 1, p. 91, doi. 10.2307/NKR/19.1./NKR.19.1.91
- Article