Works matching DE "INTELLIGENCE sharing"
Results: 143
World War I and the Foundations of American Intelligence.
- Published in:
- International Social Science Review, 2024, v. 100, n. 3, p. 64
- By:
- Publication type:
- Article
THE WARSAW PACT MILITARY INTELLIGENCE LIAISON FROM THE CZECHOSLOVAK PERSPECTIVE.
- Published in:
- TRAMES: A Journal of the Humanities & Social Sciences, 2025, v. 29, n. 1, p. 23, doi. 10.3176/tr.2025.1.02
- By:
- Publication type:
- Article
Five Eyes: Unblinking, Unmoving, and Out of Control.
- Published in:
- North Carolina Journal of International Law, 2020, v. 45, n. 4, p. 25
- By:
- Publication type:
- Article
Virtuality and Solidarity: Exploring the New Frontiers of Social Love in the Sign of Collective Wellbeing.
- Published in:
- Social Sciences (2076-0760), 2024, v. 13, n. 9, p. 485, doi. 10.3390/socsci13090485
- By:
- Publication type:
- Article
Sharing Knowledge, Practicing Democracy.
- Published in:
- Kalfou, 2014, v. 1, n. 2, p. 174, doi. 10.15367/kf.v1i2.39
- By:
- Publication type:
- Article
The influence of competitive intelligence on sustainable competitive advantage in Jordanian telecommunications companies: Mediating Role information sharing.
- Published in:
- Journal of Intelligence Studies in Business, 2024, v. 14, n. 1, p. 42, doi. 10.37380/jisib.v14.i1.2488
- By:
- Publication type:
- Article
Recadrer la réponse de l'Afrique de l'Ouest côtière à l'extrémisme violent.
- Published in:
- Bulletin de la Sécurité Africaine, 2024, n. 43, p. 1
- By:
- Publication type:
- Article
Economic incentives in security information sharing: the effects of market structures.
- Published in:
- Information Technology & Management, 2016, v. 17, n. 4, p. 361, doi. 10.1007/s10799-015-0253-1
- By:
- Publication type:
- Article
Enriching Socio-Technical Sustainability Intelligence through Sharing Autonomy.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 3, p. 2590, doi. 10.3390/su15032590
- By:
- Publication type:
- Article
An exploratory study into cell approaches for intelligence collection from detainees within an English Police Custody Suite.
- Published in:
- Policing: A Journal of Policy & Practice, 2024, v. 18, p. 1, doi. 10.1093/police/paad103
- By:
- Publication type:
- Article
Proposing a Theoretical Framework for the Criminal Investigation of Human Trafficking Crimes.
- Published in:
- Policing: A Journal of Policy & Practice, 2020, v. 14, n. 2, p. 493, doi. 10.1093/police/pay031
- By:
- Publication type:
- Article
Towards an Intelligence-Led Approach to Address Wildlife Crime in Uganda.
- Published in:
- Policing: A Journal of Policy & Practice, 2018, v. 12, n. 3, p. 344, doi. 10.1093/police/pax064
- Publication type:
- Article
Informadores y confidentes de los embajadores de Felipe III en Roma.
- Published in:
- Tiempos Modernos, 2017, v. 8, n. 35, p. 189
- By:
- Publication type:
- Article
Informadores y confidentes de los embajadores de Felipe III en Roma.
- Published in:
- Tiempos Modernos, 2017, v. 8, n. 35, p. 189
- By:
- Publication type:
- Article
Déjà Vu in South Korea? Lessons from the 1992 Philippines Withdrawal.
- Published in:
- Washington Quarterly, 2019, v. 42, n. 4, p. 107, doi. 10.1080/0163660X.2019.1694292
- By:
- Publication type:
- Article
Benefits and principles of the Biological Survey of Canada: a model for scientific cooperation.
- Published in:
- Canadian Entomologist, 2017, v. 149, n. 6, p. 693, doi. 10.4039/tce.2017.24
- By:
- Publication type:
- Article
Atypical Endometriosis: A Comprehensive Systematic Review of Pathological Patterns and Diagnostic Challenges.
- Published in:
- Biomedicines, 2024, v. 12, n. 6, p. 1209, doi. 10.3390/biomedicines12061209
- By:
- Publication type:
- Article
Niger, Mali, and Burkina Faso Have Broken Up with ECOWAS.
- Published in:
- International Policy Digest, 2024, p. 1
- By:
- Publication type:
- Article
U.S., Japan, and the Philippines Draw Closer Together.
- Published in:
- 2024
- By:
- Publication type:
- Proceeding
LEGALIZING INTELLIGENCE SHARING: A CONSENSUS APPROACH.
- Published in:
- National Security Law Brief, 2019, v. 9, n. 1, p. 1
- By:
- Publication type:
- Article
Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism.
- Published in:
- Expert Systems, 2023, v. 40, n. 4, p. 1, doi. 10.1111/exsy.13113
- By:
- Publication type:
- Article
Research on the mechanism of knowledge and intelligence sharing in enterprises under big data: From the perspective of status‐striving motivation and opinion dynamics.
- Published in:
- Expert Systems, 2019, v. 36, n. 5, p. N.PAG, doi. 10.1111/exsy.12313
- By:
- Publication type:
- Article
Before and After 9/11: Indo-U.S. Counterterrorism Cooperation.
- Published in:
- Journal of International & Global Studies, 2018, v. 9, n. 2, p. 127
- By:
- Publication type:
- Article
THE THIN RED LINE: NEUTRALITY AND BELLIGERENCY IN MODERN CONFLICTS.
- Published in:
- Cardozo International & Comparative Law Review, 2024, v. 7, n. 3, p. 901
- By:
- Publication type:
- Article
Haçlı Seferlerinin Kırılma Noktalarından Nehru’l-Kelb Savaşı: 1100.
- Published in:
- Kafkas University, Faculty of Divinity Review, 2023, v. 10, n. 20, p. 368, doi. 10.17050/kafkasilahiyat.1247033
- By:
- Publication type:
- Article
Modified Social Forces Algorithm: from Pedestrian Dynamic to Metaheuristic Optimization.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2022, v. 15, n. 3, p. 294, doi. 10.22266/ijies2022.0630.25
- By:
- Publication type:
- Article
The real special relationship: the true story of how the British and US secret services work together: Foreword by Michael Smith Michael Hayden, New York, Simon & Schuster, 2022, 576 pp., $47.00 (Hardback), ISBN 9781471186790.
- Published in:
- Intelligence & National Security, 2023, v. 38, n. 5, p. 835, doi. 10.1080/02684527.2022.2164604
- By:
- Publication type:
- Article
Getting it right: Canadian intelligence assessments on Iraq, 2002-2003.
- Published in:
- Intelligence & National Security, 2020, v. 35, n. 7, p. 925, doi. 10.1080/02684527.2020.1771934
- By:
- Publication type:
- Article
The third eye: Canada's development of autonomous signals intelligence to contribute to Five Eyes intelligence sharing.
- Published in:
- Intelligence & National Security, 2020, v. 35, n. 7, p. 954, doi. 10.1080/02684527.2020.1768477
- By:
- Publication type:
- Article
The occasional maverick of analytic tradecraft.
- Published in:
- Intelligence & National Security, 2020, v. 35, n. 3, p. 438, doi. 10.1080/02684527.2020.1723830
- By:
- Publication type:
- Article
The road to CANUSA: how Canadian signals intelligence won its independence and helped create the Five Eyes.
- Published in:
- Intelligence & National Security, 2020, v. 35, n. 1, p. 20, doi. 10.1080/02684527.2019.1685285
- By:
- Publication type:
- Article
Canada’s integration into global intelligence-sharing networks: from Gouzenko to the Montreal Olympics.
- Published in:
- Intelligence & National Security, 2018, v. 33, n. 7, p. 1053, doi. 10.1080/02684527.2018.1518290
- By:
- Publication type:
- Article
Is it ‘Fake News’? Intelligence Community expertise and news dissemination as measurements for media reliability.
- Published in:
- Intelligence & National Security, 2018, v. 33, n. 7, p. 1040, doi. 10.1080/02684527.2018.1507381
- By:
- Publication type:
- Article
Intelligence and knowledge development: what are the questions intelligence analysts ask?
- Published in:
- Intelligence & National Security, 2018, v. 33, n. 6, p. 785, doi. 10.1080/02684527.2018.1454029
- By:
- Publication type:
- Article
Democracy and the depth of intelligence sharing: why regime type hardly matters.
- Published in:
- Intelligence & National Security, 2017, v. 32, n. 1, p. 68, doi. 10.1080/02684527.2016.1208379
- By:
- Publication type:
- Article
Through a Glass, Darkly: US-Italian Intelligence Cooperation, Covert Operations and the Gladio 'Stay-Behind' Programme.
- Published in:
- Diplomacy & Statecraft, 2024, v. 35, n. 1, p. 148, doi. 10.1080/09592296.2024.2303859
- By:
- Publication type:
- Article
'No One Knows – Or Will Say': Revisiting the State Department's Handling of the Belmonte-Wendler Letter.
- Published in:
- Diplomacy & Statecraft, 2022, v. 33, n. 4, p. 656, doi. 10.1080/09592296.2022.2143112
- By:
- Publication type:
- Article
The European space and intelligence networks.
- Published in:
- Journal of Transatlantic Studies, 2020, v. 18, n. 2, p. 209, doi. 10.1057/s42738-020-00045-y
- By:
- Publication type:
- Article
Complicity of States in Partnered Drone Operations.
- Published in:
- Journal of Conflict & Security Law, 2022, v. 27, n. 2, p. 253, doi. 10.1093/jcsl/krac011
- By:
- Publication type:
- Article
State Responsibility for Complicity in the Internationally Wrongful Acts of Non-State Armed Groups.
- Published in:
- Journal of Conflict & Security Law, 2019, v. 24, n. 2, p. 373, doi. 10.1093/jcsl/krz002
- By:
- Publication type:
- Article
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5586335
- By:
- Publication type:
- Article
Distributed Security Framework for Reliable Threat Intelligence Sharing.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8833765
- By:
- Publication type:
- Article
Enhanced Collaboration for Cyber Security and Resilience.
- Published in:
- Information & Security, 2022, v. 53, n. 1, p. 7, doi. 10.11610/isij.5300
- By:
- Publication type:
- Article
Distributed Learning in Intelligent Transportation Systems: A Survey.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 9, p. 550, doi. 10.3390/info15090550
- By:
- Publication type:
- Article
THE ROLE OF CIVILIAN CYBERSECURITY COMPANIES IN MILITARY CYBER OPERATIONS.
- Published in:
- Revista Academiei Fortelor Terestre, 2024, v. 29, n. 1, p. 1, doi. 10.2478/raft-2024-0001
- By:
- Publication type:
- Article
Why do firms collaborate with local universities?
- Published in:
- Regional Studies, 2018, v. 52, n. 11, p. 1525, doi. 10.1080/00343404.2017.1413237
- By:
- Publication type:
- Article
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00106-5
- By:
- Publication type:
- Article
الكشف عن الأطفال الموهوبين في مرحلة الطفولة المبكرة وفقاً لأنواع الذكاءات المتعددة وانعكاساته المجتمعية.
- Published in:
- Journal of Arts & Social Sciences (JASS), 2024, v. 15, n. 2, p. 132, doi. 10.53542/jass.v15i2.6727
- By:
- Publication type:
- Article
Knowledge Sharing, Abusive Supervision, and Support.
- Published in:
- Group & Organization Management, 2015, v. 40, n. 5, p. 599, doi. 10.1177/1059601115577514
- By:
- Publication type:
- Article
Need for Flexible and Adaptive Counter-Terrorism Policies.
- Published in:
- Counter Terrorist Trends & Analysis, 2018, v. 10, n. 11, p. 1
- Publication type:
- Article