Works matching DE "SECURITY classification (Government documents)"
Results: 345
Coups, Corporations, and Classified Information*.
- Published in:
- Quarterly Journal of Economics, 2011, v. 126, n. 3, p. 1375, doi. 10.1093/qje/qjr030
- By:
- Publication type:
- Article
Editors' Comments.
- Published in:
- 2006
- Publication type:
- Editorial
NATIONAL SECURITY EXEMPTIONS TO OPEN CONTRACT COMPETITION.
- Published in:
- Defense Acquisition, 2021, v. 50, n. 1, p. 36
- By:
- Publication type:
- Article
ШТА НАВОДИ МИЛЕНИЈАЛЦЕ НА УЗБУЊИВАЊЕ? ОД КУЛТУРОЛОШКЕ ДО СОЦИО-ПСИХОЛОШКЕ ПЕРСПЕКТИВЕ УЗБУЊИВАЊА
- Published in:
- Socioloski Pregled, 2021, v. 55, n. 4, p. 1674, doi. 10.5937/socpreg55-34725
- By:
- Publication type:
- Article
National Security Whistleblowing vs. Dodd-Frank Whistleblowing.
- Published in:
- Brooklyn Law Review, 2015, v. 80, n. 3, p. 1191
- By:
- Publication type:
- Article
Opening up: U.S. agencies release documents on human radiation experiments.
- Published in:
- Journal of Law, Medicine & Ethics, 1994, v. 22, n. 3, p. 288
- By:
- Publication type:
- Article
The Less Secret State.
- Published in:
- History Today, 2012, v. 62, n. 10, p. 72
- By:
- Publication type:
- Article
"I Want My File!".
- Published in:
- History Today, 2009, v. 59, n. 10, p. 34
- By:
- Publication type:
- Article
Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions.
- Published in:
- Computers (2073-431X), 2021, v. 10, n. 12, p. 160, doi. 10.3390/computers10120160
- By:
- Publication type:
- Article
Impacts Of Cyber Security In Iot-Based Cloud Computing.
- Published in:
- Journal of Namibian Studies, 2023, v. 33, p. 2851
- By:
- Publication type:
- Article
СТАНОВЛЕННЯ УКРАЇНСЬКОЇ СИСТЕМИ ОХОРОНИ ДЕРЖАВНОЇ ТАЄМНИЦІ. 1991–1994.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2021, v. 27, n. 2, p. 79, doi. 10.18372/2225-5036.27.16004
- By:
- Publication type:
- Article
МОДЕЛЬ БАГАТОРІВНЕВОЇ СИСТЕМИ ДОСТУПУ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2017, v. 23, n. 2, p. 122, doi. 10.18372/2225-5036.23.11817
- By:
- Publication type:
- Article
Functioning of the state secrets security system in Ukraine: organizational and legal structure, principles and objectives.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 176, doi. 10.18372/2225-5036.20.7305
- By:
- Publication type:
- Article
Prediction of lameness using automatically recorded activity, behavior and production data in post-parturient Irish dairy cows.
- Published in:
- Veterinary Ireland Journal, 2022, v. 12, n. 4, p. 1, doi. 10.1186/s13620-021-00182-6
- By:
- Publication type:
- Article
Understanding the moral myopia and ambiguity of post-employment conflicts of interest: comparing police to other public and private organizations.
- Published in:
- Public Management Review, 2023, v. 25, n. 9, p. 1685, doi. 10.1080/14719037.2023.2222729
- By:
- Publication type:
- Article
Blockchain-Assisted Homomorphic Encryption Approach for Skin Lesion Diagnosis using Optimal Deep Learning Model.
- Published in:
- Engineering, Technology & Applied Science Research, 2023, v. 13, n. 3, p. 10978, doi. 10.48084/etasr.5594
- By:
- Publication type:
- Article
A comprehensive study on security bug characteristics.
- Published in:
- Journal of Software: Evolution & Process, 2021, v. 33, n. 10, p. 1, doi. 10.1002/smr.2376
- By:
- Publication type:
- Article
UNDERSTANDING THE IMPORTANCE OF EXPERT AND INDEPENDENT INTELLIGENCE OVERSIGHT IN LIGHT OF RECENT TECHNOLOGICAL ADVANCES IN DATA COLLECTION: A CASE STUDY OF THE UNITED KINGDOM.
- Published in:
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2022, n. 27, p. 6
- By:
- Publication type:
- Article
The establishment of banking supervision in Italy: an assessment (1926–1936).
- Published in:
- Business History, 2024, v. 66, n. 6, p. 1442, doi. 10.1080/00076791.2022.2134347
- By:
- Publication type:
- Article
DAM: A Theoretical Framework for Sensor Security in IoT Applications.
- Published in:
- International Journal of Next-Generation Computing, 2021, v. 12, n. 3, p. 309, doi. 10.47164/ijngc.v12i3.830
- By:
- Publication type:
- Article
A Survey on Various Cryptanalytic Attacks on the AES Algorithm.
- Published in:
- International Journal of Next-Generation Computing, 2021, v. 12, n. 2, p. 115
- By:
- Publication type:
- Article
Caught by Surprise: Christoph O. Meyer, Eva Michaels, Nikki Ikani, Aviva Guttmann, and Michael S. Goodman (eds.):Estimative Intelligence in European Foreign Policymaking: Learning Lessons from an Era of Surprise Edinburgh University Press, Edinburgh, Scotland, 2022, 351 p., £85.00 (hardback)
- Published in:
- 2024
- By:
- Publication type:
- Book Review
Sempill, Japan, and Pearl Harbor: Traitor or Spy-Myth?
- Published in:
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 3, p. 932, doi. 10.1080/08850607.2022.2081048
- By:
- Publication type:
- Article
Moles Ahoy: Robert Baer: The Fourth Man: The Hunt for a KGB Spy at the Top of the CIA and the Rise of Putin's Russia Hachette Books, London, 2022, 295 p., $30.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2023, v. 36, n. 2, p. 347, doi. 10.1080/08850607.2022.2102333
- By:
- Publication type:
- Article
Espionage, the First Amendment, and the Case Against Julian Assange.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2020, v. 33, n. 4, p. 747, doi. 10.1080/08850607.2020.1716431
- By:
- Publication type:
- Article
A Psycho-Social Motivational Theory of Mass Leaking.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2018, v. 31, n. 1, p. 116, doi. 10.1080/08850607.2017.1374800
- By:
- Publication type:
- Article
Scolding Intelligence: The PFIAB Report on the Soviet War Scare.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2018, v. 31, n. 1, p. 102, doi. 10.1080/08850607.2017.1374797
- By:
- Publication type:
- Article
New Details on a FOIA Request.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2017, v. 30, n. 3, p. 643, doi. 10.1080/08850607.2017.1297130
- By:
- Publication type:
- Article
IC Data Mining in the Post-Snowden Era.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2016, v. 29, n. 4, p. 700, doi. 10.1080/08850607.2016.1148488
- By:
- Publication type:
- Article
The Essence of Non-Decision: CIA's Deferral of Declassifying JFK-Era Documents.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2016, v. 29, n. 4, p. 724, doi. 10.1080/08850607.2016.1148485
- By:
- Publication type:
- Article
Slovenia's Intelligence Oversight and Audit Experience.
- Published in:
- 2013
- By:
- Publication type:
- Case Study
Intelligence Secrets and Unauthorized Disclosures: Confronting Some Fundamental Issues.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 4, p. 639, doi. 10.1080/08850607.2012.705184
- By:
- Publication type:
- Article
A Curator Approach to Intelligence Analysis.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 4, p. 786, doi. 10.1080/08850607.2012.678698
- By:
- Publication type:
- Article
The Revolution Begins on Page Five: The Changing Nature of NIEs.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 2, p. 330, doi. 10.1080/08850607.2012.652548
- By:
- Publication type:
- Article
Intelligence Exchange Through InterIntel.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2012, v. 25, n. 1, p. 1, doi. 10.1080/08850607.2011.598782
- By:
- Publication type:
- Article
Technical Intelligence in Retrospect: The 2001 Anthrax Letters Powder.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2007, v. 20, n. 1, p. 79, doi. 10.1080/08850600600889027
- By:
- Publication type:
- Article
America's Increased Vulnerability to Insider Espionage.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2007, v. 20, n. 1, p. 50, doi. 10.1080/08850600600888698
- By:
- Publication type:
- Article
Explainable Security Requirements Classification Through Transformer Models.
- Published in:
- Future Internet, 2025, v. 17, n. 1, p. 15, doi. 10.3390/fi17010015
- By:
- Publication type:
- Article
Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays.
- Published in:
- Future Internet, 2024, v. 16, n. 9, p. 303, doi. 10.3390/fi16090303
- By:
- Publication type:
- Article
Automated Identification of Sensitive Financial Data Based on the Topic Analysis.
- Published in:
- Future Internet, 2024, v. 16, n. 2, p. 55, doi. 10.3390/fi16020055
- By:
- Publication type:
- Article
HEURISTIKA I ZAKONSKA REGULATIVA U OBLASTI ZAŠTITE TAJNIH PODATAKA U FUNKCIJI EDUKACIJE SUBJEKATA SISTEMA ODBRANE.
- Published in:
- Military Technical Courier / Vojnotehnicki Glasnik, 2014, v. 62, n. 2, p. 121, doi. 10.5937/vojtehg62-4696
- By:
- Publication type:
- Article
SENSITIVE AND CLASSIFIED DATA EXCHANGE AND HANDLING IN THE EU: A CASE STUDY.
- Published in:
- 2015
- By:
- Publication type:
- Case Study
DEFINING ELEMENTS OF THE NATIONAL SECURITY CONCEPTS (II).
- Published in:
- Buletin Stiintific, 2013, v. 18, n. 1, p. 75
- By:
- Publication type:
- Article
FOI documents shed light on the ADF detention practices.
- Published in:
- Alternative Law Journal, 2011, v. 36, n. 3, p. 204
- By:
- Publication type:
- Article
Freedom from Disclosure of Information.
- Published in:
- Alternative Law Journal, 2007, v. 32, n. 1, p. 7, doi. 10.1177/1037969X0703200104
- By:
- Publication type:
- Article
TASARRUF MEVDUATI SİGORTA FONU MUHASEBE UYGULAMALARI VE BUNLARIN TÜRKİYE MUHASEBE/FİNANSAL RAPORLAMA STANDARTLARI AÇISINDAN DEĞERLENDİRİLMESİ.
- Published in:
- World of Accounting Science, 2023, v. 25, n. 3, p. 399, doi. 10.31460/mbdd.1231921
- By:
- Publication type:
- Article
ADDRESSING THE BALANCE: RESTRUCTURING CIPA AND FISA TO MEET THE NEEDS OF JUSTICE AND THE CRIMINAL JUSTICE SYSTEM.
- Published in:
- Albany Law Review, 2016, v. 80, n. 3, p. 1131
- By:
- Publication type:
- Article
TRANSPARENCY REPORTS AND THEIR RELATIONSHIP WITH THE ESPIONAGE ACT.
- Published in:
- Rutgers Computer & Technology Law Journal, 2018, v. 44, n. 2, p. 210
- By:
- Publication type:
- Article
Sinking Mike Pompeo: Tucker Carlson, Assange and Trump.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article
Handmaiden to the Establishment: Peter Greste's Register of Journalists.
- Published in:
- CounterPunch, 2024, p. 1
- By:
- Publication type:
- Article