Academic literature on the topic 'Cyber border'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber border.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber border"
Yongming, Zhou. "Living on the Cyber Border." Current Anthropology 46, no. 5 (2005): 779–803. http://dx.doi.org/10.1086/432453.
Full textOKA, Nobuto, and Shuichi IWATA. "Cyber Connection for Cross-border Collaboration." Joho Chishiki Gakkaishi 17, no. 1 (2007): 32–40. http://dx.doi.org/10.2964/jsik.17.32.
Full textDRAGOMIR, Andreea. "Cyber Diplomacy." International Journal of Information Security and Cybercrime 10, no. 2 (2021): 37–50. http://dx.doi.org/10.19107/ijisc.2021.02.05.
Full textChatzis, Petros, and Eliana Stavrou. "Cyber-threat landscape of border control infrastructures." International Journal of Critical Infrastructure Protection 36 (March 2022): 100503. http://dx.doi.org/10.1016/j.ijcip.2021.100503.
Full textSiva Krishna Jampani. "Cross-border cybersecurity collaboration-building a global framework for threat." World Journal of Advanced Engineering Technology and Sciences 14, no. 2 (2025): 001–10. https://doi.org/10.30574/wjaets.2025.14.2.0034.
Full textRizwan Iqbal, Nadia Mustaqim Ansari, Muhammad Ismail, Maqsood ur Rehman Awan, Hassam Gul, and Muhammad Mateen. "<b>Global Cyber Security in the Age of Cross-Border Threat Intelligence: Addressing Barriers, Leveraging AI, and Defining the Next Generation of Cyber Defense</b>." Annual Methodological Archive Research Review 3, no. 4 (2025): 369–90. https://doi.org/10.63075/wnvgq911.
Full textLi, Linqi, and Yanzhu Wang. "Cross-Border Data Flow Regulatory System under the Holistic View of National Security." International Journal of Education and Humanities 19, no. 1 (2025): 72–76. https://doi.org/10.54097/se3fsr09.
Full textCOMAN, Iulian Marius. "Cross-Border Cyber-Attacks and Critical Infrastructure Protection." International Journal of Information Security and Cybercrime 6, no. 2 (2017): 47–52. http://dx.doi.org/10.19107/ijisc.2017.02.07.
Full textPandey, Arpit. "Cyber Security: Cyber Fraud on Carding: A Review." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2525–29. http://dx.doi.org/10.22214/ijraset.2021.36882.
Full text-, Salmiati. "China's Foreign Policy Toward India's Internet Censorship In The Galwan Valley Conflict." Jurnal Ilmu Hubungan Internasional LINO 4, no. 2 (2025): 123–46. https://doi.org/10.31605/lino.v4i2.3582.
Full textDissertations / Theses on the topic "Cyber border"
Carlberg, Kristin. "Suing a State for Cross-border Cyber Torts? : Overcoming the Immunity of the Hacking State." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-61292.
Full textBooks on the topic "Cyber border"
Woltag, Johann-Christoph. Cyber warfare: Military cross-border computer network operations under international law. Intersentia, 2014.
Find full textKawamoto, Kevin. On the borders of change: Digital communications in North America and the emergence of transnational "cyber-polities". Canadian Studies Center, The Henry M. Jackson School of International Studies, University of Washington, 1998.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. U.S. G.P.O., 2001.
Find full textMorganstein, Stanley. Double Edge Sword: Border Patrol, Navy Seals, and Cyber-terrorists. CreateSpace Independent Publishing Platform, 2015.
Find full text(Editor), Anne Martinez-Saiz, and Nuit de Chine (Illustrator), eds. Handbook for Bloggers and Cyber-Dissidents. Reporters Without Borders, 2006.
Find full textEmerson, Michael, and Denis Cenușa, eds. Deepening EU-Moldovan Relations. 3rd ed. Lexington Books, 2021. https://doi.org/10.5040/9798881810474.
Full textChinese Industry 4.0: Designing High-Tech Solutions under the Cybersecurity Regime of the People’s Republic of China. SinopeerPress, 2021.
Find full textDominik, Brodowski. Part III Other Relevant International Regimes and Issues, 16 Transnational Organised Crime and Cybercrime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0016.
Full textPierre, Thielbörger. Part IV Transnational Organised Crime as Matter of Certain Branches of International Law, 17 The International Law of the Use of Force and Transnational Organised Crime. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198733737.003.0017.
Full textBook chapters on the topic "Cyber border"
Bhatele, Kirti Raj, Devanshu Tiwari, and Anand Singh Bisen. "Border surveillance." In Artificial Intelligence for Cyber Security and Industry 4.0. CRC Press, 2025. https://doi.org/10.1201/9781032657264-6.
Full textXie, Zhengjun. "Logistics Distribution Optimization System of Cross-Border e-Commerce Platform Based on Bayes-BP Algorithm." In Cyber Security Intelligence and Analytics. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_4.
Full textYu, Jiang. "AHP-Based Small Cross-Border e-Commerce Export Trade Logistics Model Selection and Application Analysis." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_72.
Full textHuang, Jingxian. "Training Mode of Cross-Border E-commerce Japanese Translators Based on Neural Network." In Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1468-5_227.
Full textJin, Kayi. "Impact Model of the Brand Cross-Border Cooperation from the Perspective of the Big Data." In Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1468-5_191.
Full textLin, Rui. "Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance." In 2021 International Conference on Applications and Techniques in Cyber Intelligence. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79200-8_10.
Full textGiunta, Gabriele, Carmen Stira, Jolanda Modic, et al. "Improved Resilience of Critical Infrastructures Against Large-Scale Transnational and Systemic Risks." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_14.
Full textJaparidze, Tinatin. "Cyber Sovereignty: Should Cyber Borders Replicate Territorial Borders?" In The Implications of Emerging Technologies in the Euro-Atlantic Space. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-24673-9_13.
Full textHuang, Dan, and Jian Zhou. "Dilemma and Breakthrough of School-Enterprise Integration in Cultivating Applied Cross-Border E-commerce Talents Under the Background of Internet." In 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7469-3_90.
Full textLayton, Peter, and John Blaxland. "Australia." In The Military and Society. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-86741-5_5.
Full textConference papers on the topic "Cyber border"
Li, Xudong, Yang Chen, and Hongpeng Wang. "Design of Border Patrol Robot System Based on ROS." In 2024 IEEE 14th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2024. http://dx.doi.org/10.1109/cyber63482.2024.10748993.
Full textZururi, Achmad, Fitra Putri Oganda, Sondang Visiana Sihotang, Untung Rahardja, and Po Abas Sunarya. "Opportunities and Challenges of Distributed Ledger Technology in Cross-Border Financial Transactions." In 2024 12th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2024. https://doi.org/10.1109/citsm64103.2024.10775896.
Full textLiu, Chuande, Shu Fang, Jiao Li, and Bingtuan Gao. "An Adaptive Dual-Docking Force Control of Ship-Borne Manipulators for UAV-Assisted Perching." In 2024 IEEE 14th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2024. http://dx.doi.org/10.1109/cyber63482.2024.10749252.
Full textMalone, Matt. "Weaponizing Cross-Border Data Flows: An Opportunity for NATO?" In 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon). IEEE, 2023. http://dx.doi.org/10.23919/cycon58705.2023.10181730.
Full textSchufrin, Marija, Hendrik Lucke-Tieke, and Jorn Kohlhammer. "Visual Firewall Log Analysis - At the Border Between Analytical and Appealing." In 2022 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, 2022. http://dx.doi.org/10.1109/vizsec56996.2022.9941462.
Full textBĂDIȚĂ, Aurelian-Gabriel. "Security of Romanian Electronic Passports: The Protection of Personal Data in the Digital Age." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.14.
Full textDouzet, Frederick, Louis Petiniaud, Loqman Salamatian, Kevin Limonier, Kave Salamatian, and Thibaut Alchus. "Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis." In 2020 12th International Conference on Cyber Conflict (CyCon). IEEE, 2020. http://dx.doi.org/10.23919/cycon49761.2020.9131726.
Full textRajamäki, Jyri, and Juha Knuuttila. "Cyber Security and Trust - Tools for Multi-agency Cooperation between Public Authorities." In Special Session on Information Sharing Environments to Foster Cross-Sectorial and Cross-Border Collaboration between Public Authorities. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005628803970404.
Full textQin, Zhiai, Jia Zhao, and Peng Ge. "An Empirical Model Analysis of the Typical Cross-border Scenarios of Automotive Data." In CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy. ACM, 2024. http://dx.doi.org/10.1145/3672919.3673020.
Full textYang, Yingyu, Bingze Li, Jiamei Wang, et al. "Analysis and Countermeasure Research about Sensitive Information of Complex Cyber Psychology of Cross-border Multi-ethnic Language." In 2016 International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/iccia-16.2016.33.
Full textReports on the topic "Cyber border"
Jamilov, Rustam, Hélène Rey, and Ahmed Tahoun. The Anatomy of Cyber Risk. Institute for New Economic Thinking Working Paper Series, 2023. http://dx.doi.org/10.36687/inetwp206.
Full textMalone, Matt. Will Canada’s Bill C-8 Impact the Future of EU-Canada Cross-border Data Flows? Balsillie School of International Affairs, 2025. https://doi.org/10.51644/bap74.
Full textSoramäki, Kimmo. Financial Cartography. FNA, 2019. http://dx.doi.org/10.69701/ertx8007.
Full text