نتایج جستجو برای: espionage

تعداد نتایج: 371  

Journal: :International Journal of Game Theory 2021

Recent advances in information and communication technologies have increased the incentives for firms to acquire about rivals. These may major implications market entry because they make it easier potential entrants gather valuable about, example, an incumbent’s cost structure. However, little theoretical research has actually analyzed this question. This paper literature by extending a one-sid...

2012
Deepa Harihar Kulkarni

Quantum cryptography is an approach to securing communications by applying the phenomena of quantum physics. Quantum cryptography provides secure communication whose security depends only on the validity of quantum theory. Interesting characteristics of quantum mechanics includes the existence of indivisible quanta and of entangled systems, both of which lie at the root of the quantum cryptogra...

2014
James Carney Rafael Wlodarski Robin Dunbar

Do narratives shape how humans process other minds or do they presuppose an existing theory of mind? This study experimentally investigated this problem by assessing subject responses to systematic alterations in the genre, levels of intentionality, and linguistic complexity of narratives. It showed that the interaction of genre and intentionality level are crucial in determining how narratives...

1995
Joseph G. Haubrich

Should the Federal Reserve or any other government agency make precise statements about its policy objectives? Determining the proper amount of secrecy in government generates controversy whether the agency involved undertakes espionage, banking, or monetary policy. Between the broad areas of agreement (classifying military strategies, publishing legislation) lie equally broad areas of contenti...

2012
Nicholas J. Kohut Paul M. Birkmeyer Kevin C. Peterson Ronald S. Fearing

Palm sized legged robots show promise for military and civilian applications, including exploration of hazardous or difficult to reach places, search and rescue, espionage, and battlefield reconnaissance. However, they also face many technical obstacles, includingbut not limited toactuator performance, weight constraints, processing power, and power density. This paper presents an overview of s...

2005
Stephen E. Fienberg Paul C. Stern

In the wake of controversy over allegations of espionage by Wen Ho Lee, a nuclear scientist at the Department of Energy’s Los Alamos National Laboratory, the department ordered that polygraph tests be given to scientists working in similar positions. Soon thereafter, at the request of Congress, the department asked the National Research Council (NRC) to conduct a thorough study of polygraph tes...

Journal: :CoRR 2017
Mordechai Guri Yosef A. Solewicz Andrey Daidakulov Yuval Elovici

It's possible to manipulate the headphones, earphones, and simple earbuds connected to a computer, silently turning them into a pair of eavesdropping microphones. This paper focuses on the cyber security threat this behavior poses. We introduce 'SPEAKE(a)R,' a new type of espionage malware that can covertly turn the headphones, earphones, or simple earbuds connected to a PC into microphones whe...

2000
Ian Brown B. Laurie

Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be turned over by either party in civil and criminal cases. Government agencies are explicitly tasked with protecting “national economic security.” And organised crime will target information just like any other valuable ass...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید