Works matching DE "INFORMATION warfare"
Results: 740
INFORMATION WARFARE: THE GRAMMAR OF TALKING WAR.
- Published in:
- Social Alternatives, 2005, v. 24, n. 1, p. 5
- By:
- Publication type:
- Article
Editor's Introduction.
- Published in:
- Conflict Resolution Quarterly, 2022, v. 39, n. 3, p. 193, doi. 10.1002/crq.21338
- Publication type:
- Article
Information wars as a threat to the information security of Ukraine.
- Published in:
- Conflict Resolution Quarterly, 2022, v. 39, n. 3, p. 333, doi. 10.1002/crq.21331
- By:
- Publication type:
- Article
SECURITY PROBLEMS CAUSED TO THE REPUBLIC OF LITHUANIA BY THE UKRAINIAN WAR AND BELORUSSIAN HYBRID ATTACKS.
- Published in:
- Security Spectrum: Journal of Advanced Security Research, 2023, p. 133, doi. 10.15158/mg8r-0h12
- By:
- Publication type:
- Article
The decline of humanist poetics. Faces of information warfare in hybrid conflict on the example of Russia’s 2022 war with Ukraine.
- Published in:
- Wschodnioznawstwo, 2024, v. 18, p. 391, doi. 10.4467/20827695WSC.24.022.20637
- By:
- Publication type:
- Article
CONFERENCES AND MEETINGS: Current conferences and meetings of interest to Defense Acquisition readers. Links provided to registration and additional information.
- Published in:
- Defense Acquisition, 2023, v. 52, n. 1, p. A1
- Publication type:
- Article
Information Warfare across the Taiwan Strait.
- Published in:
- Journal of Contemporary China, 2004, v. 13, n. 38, p. 129, doi. 10.1080/1067056032000151373
- By:
- Publication type:
- Article
Da utopia da sociedade em rede à realidade da sociedade de risco.
- Published in:
- Analise Social, 2013, v. 48, n. 207, p. 260
- By:
- Publication type:
- Article
Control Systems Cybersecurity: Lessons Learned From Virginia Assessments.
- Published in:
- Journal: American Water Works Association, 2015, v. 107, n. 12, p. 60, doi. 10.5942/jawwa.2015.107.0174
- By:
- Publication type:
- Article
Non-Kinetic Warfare and Technological Advancements: An Overview.
- Published in:
- Tamkang Journal of International Affairs, 2024, v. 27, n. 2, p. 203, doi. 10.6185/TJIA.V.202401_27(2).0004
- By:
- Publication type:
- Article
China Cyber Warfare and Cyber Force.
- Published in:
- Tamkang Journal of International Affairs, 2019, v. 22, n. 3, p. 119, doi. 10.6185/TJIA.V.201901_22(3).0003
- By:
- Publication type:
- Article
СПЕЦИФІЧНІ ФОРМИ СТРАТЕГІЇ РОЗВИТКУ СУЧАСНИХ ЗБРОЙНО-ПОЛІТИЧНИХ КОНФЛІКТІВ
- Published in:
- Hileya: Scientific Bulletin / Gileya, 2020, n. 153, p. 486
- By:
- Publication type:
- Article
ПРІОРИТЕТИ СПІВРОБІТНИЦТВО ЯПОНІЇ ЗІ США У СФЕРІ КІБЕРБЕЗПЕКИ
- Published in:
- Hileya: Scientific Bulletin / Gileya, 2019, n. 150, Part 3, p. 72
- By:
- Publication type:
- Article
Artificial intelligence and information warfare in major power states: how the US, China, and Russia are using artificial intelligence in their information warfare and influence operations.
- Published in:
- Defense & Security Analysis, 2024, v. 40, n. 2, p. 235, doi. 10.1080/14751798.2024.2321736
- By:
- Publication type:
- Article
Information warfare: methods to counter disinformation.
- Published in:
- Defense & Security Analysis, 2022, v. 38, n. 4, p. 453, doi. 10.1080/14751798.2022.2117285
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Defense & Security Analysis, 2015, v. 31, n. 3, p. 169, doi. 10.1080/14751798.2015.1058522
- By:
- Publication type:
- Article
Conjectures for framing cyberwarfare.
- Published in:
- Defense & Security Analysis, 2015, v. 31, n. 3, p. 172, doi. 10.1080/14751798.2015.1056935
- By:
- Publication type:
- Article
Advancing “Defence-in-depth”: intelligence and systems dynamics.
- Published in:
- Defense & Security Analysis, 2015, v. 31, n. 1, p. 58, doi. 10.1080/14751798.2014.995337
- By:
- Publication type:
- Article
Information Warfare as Future Weapon of Mass-disruption, Africa 2030s Scenarios.
- Published in:
- Journal of Futures Studies, 2018, v. 23, n. 1, p. 77, doi. 10.6531/JFS.201809_23(1).0006
- By:
- Publication type:
- Article
共享信号模式的探测干扰一体化系统设计.
- Published in:
- Telecommunication Engineering, 2024, v. 64, n. 11, p. 1788, doi. 10.20079/j.issn.1001-893x.231014002
- By:
- Publication type:
- Article
5G 技术军事运用及作战影响分析.
- Published in:
- Telecommunication Engineering, 2021, v. 61, n. 1, p. 15, doi. 10.3969/j.issn.1001-893x.2021.01.003
- By:
- Publication type:
- Article
ІНФОРМАЦІЙНО-ПСИХОЛОГІЧНІ ВПЛИВИ ТА ІНФОРМАЦІЙНО-ПСИХОЛОГІЧНА ВІЙНА ЯК СКЛАДОВІ ЧАСТИНИ ІНФОРМАЦІЙНОЇ БОРОТЬБИ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2022, v. 28, n. 1, p. 26, doi. 10.18372/2225-5036.28.16910
- By:
- Publication type:
- Article
МЕТОД ДОДАВАННЯ СЕМАНТИЧНОГО ШУМУ ЗА ІНДИВІДУАЛЬНОЮ СЕМАНТИЧНОЮ ЛІНІЄЮ ПРОПАГАНДИСТА.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2021, v. 27, n. 2, p. 100, doi. 10.18372/2225-5036.27.16002
- By:
- Publication type:
- Article
ІНФОРМАЦІЙНА ВІЙНА. ЗАХИСТ ВІД ДЕСТРУКТИВНИХ ІНФОРМАЦІЙНО-ПСИХОЛОГІЧНИХ ВПЛИВІВ. ЧАСТИНА 2
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 1, p. 18, doi. 10.18372/2225-5036.25.13666
- By:
- Publication type:
- Article
Imperialism's Handmaidens: Cultural Hegemony and Information Warfare.
- Published in:
- International Critical Thought, 2022, v. 12, n. 3, p. 399, doi. 10.1080/21598282.2022.2098510
- By:
- Publication type:
- Article
THE ROOTS AND INSTRUMENTS OF RUSSIA'S PROPAGANDA CAMPAIGN.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2024, n. 31, p. 143
- By:
- Publication type:
- Article
ROMANIA PART OF THE EUROPEAN RISK ECOSYSTEM.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2021, n. 26, p. 230
- By:
- Publication type:
- Article
WHEN TECHNOLOGY AND SOCIAL MEDIA MEET COVID-19. RELATIVIZATION OF THE TRUTH AND THE FATE OF SOCIAL MEDIA.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2021, n. 25, p. 101
- By:
- Publication type:
- Article
THE FOURTH GENERATION OF INFORMATION WARFARE.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2019, n. 22, p. 67
- By:
- Publication type:
- Article
CURRENT TRENDS OF CYBER TERRORISM IN THE MIDDLE EAST AND NORTH AFRICA.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2019, n. 21, p. 179
- By:
- Publication type:
- Article
WEAPONIZING COMMUNICATION. WORDS VS. BULLETS IN THE RUSSIAN-UKRAINIAN WAR.
- Published in:
- Strategic Impact, 2023, v. 88, n. 3, p. 9, doi. 10.53477/1842-9904-23-13
- By:
- Publication type:
- Article
INFORMATION OPERATIONS CONDUCTED BY ARMED FORCES - CONCEPTS, METHODS AND POTENTIAL DEVELOPMENTS.
- Published in:
- Strategic Impact, 2022, v. 82, n. 1, p. 65, doi. 10.53477/1842-9904-22-6
- By:
- Publication type:
- Article
EXTENSION OF INTERNATIONAL HUMANITARIAN LAW ORDER IN THE INFORMATION AREA THROUGH DIGITAL DIPLOMACY.
- Published in:
- Strategic Impact, 2021, v. 80, n. 3, p. 86, doi. 10.53477/1841-5784-21-18
- By:
- Publication type:
- Article
OFFENSIVE CYBER OPERATIONS, AN ESSENTIAL CAPABILITY OF HYBRID THREATS.
- Published in:
- Strategic Impact, 2020, v. 77, n. 4, p. 137
- By:
- Publication type:
- Article
International Scientific Conference STRATEGIES XXI.
- Published in:
- 2015
- By:
- Publication type:
- Proceeding
NETWORK CENTRIC WARFARE: ADVANTAGES AND DISADVANTAGES.
- Published in:
- Strategic Impact, 2013, v. 48, n. 3, p. 94
- By:
- Publication type:
- Article
CYBERWAR AND UNMANNED AERIAL VEHICLES: USING NEW TECHNOLOGIES, FROM ESPIONAGE TO ACTION.
- Published in:
- Case Western Reserve Journal of International Law, 2012, v. 45, n. 1/2, p. 513
- By:
- Publication type:
- Article
Considering our position: Viewing information warfare as a use of force prohibited by article 2...
- Published in:
- Case Western Reserve Journal of International Law, 1998, v. 30, n. 2/3, p. 567
- By:
- Publication type:
- Article
Russian Full Spectrum Conflicts and information warfare as Complex Adaptive Systems: The 2014 Crimean case study.
- Published in:
- Comparative Strategy, 2023, v. 42, n. 4, p. 528, doi. 10.1080/01495933.2023.2219193
- By:
- Publication type:
- Article
Cyber War and Deterrence Stability: Post-START Nuclear Arms Control.
- Published in:
- Comparative Strategy, 2014, v. 33, n. 3, p. 279, doi. 10.1080/01495933.2014.926727
- By:
- Publication type:
- Article
Web War I: Is Europe's First Information War a New Kind of War?
- Published in:
- Comparative Strategy, 2008, v. 27, n. 3, p. 227, doi. 10.1080/01495930802185312
- By:
- Publication type:
- Article
Russian Front Organizations and Western Academia.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 4, p. 1184, doi. 10.1080/08850607.2022.2147807
- By:
- Publication type:
- Article
Hezbollah and the Internet in the Twenty-First Century.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 3, p. 669, doi. 10.1080/08850607.2022.2111999
- By:
- Publication type:
- Article
Digital Guns for Hire: James J.F. Forest:Digital Influence Mercenaries: Profits and Power Through Information Warfare Naval Institute Press, Annapolis, MD, 2022, 245 p., $39.95 (hardcover).
- Published in:
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 3, p. 1020, doi. 10.1080/08850607.2022.2081051
- By:
- Publication type:
- Article
Information Dominance between War and Peace: China as the “Informationized” State.
- Published in:
- 2018
- By:
- Publication type:
- Book Review
Muzzling the Russian Media Again.
- Published in:
- 2016
- By:
- Publication type:
- Book Review
Irish Republican Army Counterintelligence.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2010, v. 23, n. 1, p. 1, doi. 10.1080/08850600903347152
- By:
- Publication type:
- Article
Information Warfare: China's Response to U.S. Technological Advantages.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2005, v. 18, n. 4, p. 682, doi. 10.1080/08850600500177135
- By:
- Publication type:
- Article
Looking for Insurgency in Cyberspace.
- Published in:
- Central European Journal of International & Security Studies, 2014, v. 8, n. 4, p. 56
- By:
- Publication type:
- Article
TYPES OF INFORMATION WARFARE AND EXAMPLES OF MALICIOUS PROGRAMS OF INFORMATION WARFARE.
- Published in:
- Military Technical Courier / Vojnotehnicki Glasnik, 2017, v. 65, n. 4, p. 1044, doi. 10.5937/vojtehg65-13590
- By:
- Publication type:
- Article