Journal articles on the topic 'National Security Agency (NSA)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'National Security Agency (NSA).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jean, Guilhem. "NSA. National Security Agency / Claude Delesse, Paris, Tallandier, 2016, 512 p." Revue internationale et stratégique N° 102, no. 2 (2016): V. http://dx.doi.org/10.3917/ris.102.0163e.
Full textLong, Austin. "The Quiet Americans? CIA, NSA, and Counterinsurgency." Journal of Cold War Studies 13, no. 3 (2011): 149–84. http://dx.doi.org/10.1162/jcws_r_00146.
Full text문지현. "On the Documents of Record Group 457 U.S. National Archives:U.S. National Security Agency(NSA)/Central Security Serivce(CSS)." EWHA SAHAK YEONGU ll, no. 49 (2014): 297–330. http://dx.doi.org/10.37091/ewhist.2014..49.010.
Full textROADY, PETER. "The Ford Administration, the National Security Agency, and the “Year of Intelligence”: Constructing a New Legal Framework for Intelligence." Journal of Policy History 32, no. 3 (2020): 325–59. http://dx.doi.org/10.1017/s089803062000010x.
Full textMurakami Wood, David, and Steve Wright. "Before and After Snowden." Surveillance & Society 13, no. 2 (2015): 132–38. http://dx.doi.org/10.24908/ss.v13i2.5710.
Full textMunkholm, Johan Lau. "The Pursuit of Full Spectrum Dominance: The Archives of the NSA." Surveillance & Society 18, no. 2 (2020): 244–56. http://dx.doi.org/10.24908/ss.v18i2.13266.
Full textSugiyama, Tara, and Marisa Perry. "The NSA Domestic Surveillance Program: An Analysis of Congressional Oversight During an Era of One-Party Rule." University of Michigan Journal of Law Reform, no. 40.1 (2006): 149. http://dx.doi.org/10.36646/mjlr.40.1.nsa.
Full textKhan, Zmarak. "The National Security Agency (NSA) eavesdropping on Americans A programme that is neither legal nor necessary." Utrecht Law Review 2, no. 2 (2006): 61. http://dx.doi.org/10.18352/ulr.26.
Full textDawson, Maurice, Robert Bacius, Luis Borges Gouveia, and Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors." Land Forces Academy Review 26, no. 1 (2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.
Full textWang, Ping, Maurice Dawson, and Kenneth L. Williams. "Improving Cyber Defense Education through National Standard Alignment." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (2018): 12–28. http://dx.doi.org/10.4018/ijhiot.2018010102.
Full textCarroll, Jami. "The U.S. National Cybersecurity Strategy: A Vehicle with an International Journey." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 107–15. http://dx.doi.org/10.34190/eccws.23.1.2300.
Full textRenita J, Edna Elizabeth N, and Suganya Annadurai. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.a1437.05010525.
Full textLucas, George R. "NSA Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden." Ethics & International Affairs 28, no. 1 (2014): 29–38. http://dx.doi.org/10.1017/s0892679413000488.
Full textLamin Saidy, Abraham Ayodeji Abayomi, Abel Chukwuemeke Uzoka, and Bolaji Iyanu Adekunle. "The API Integrity and Access Control Framework (AIACF): A Zero-Trust Security Model for U.S.-Connected Consumer Platforms." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 897–904. https://doi.org/10.32628/cseit24102140.
Full textRenita, J. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security (IJCNS) 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.A1437.05010525.
Full textKeiber, Jason. "Surveillance Hegemony." Surveillance & Society 13, no. 2 (2015): 168–81. http://dx.doi.org/10.24908/ss.v13i2.5299.
Full textClement, Andrew, and Jonathan A. Obar. "Keeping Internet Users in the Know or in the Dark: An Analysis of the Data Privacy Transparency of Canadian Internet Carriers." Journal of Information Policy 6, no. 1 (2016): 294–331. http://dx.doi.org/10.5325/jinfopoli.6.2016.294.
Full textAltheide, David L. "The Triumph of Fear." International Journal of Cyber Warfare and Terrorism 4, no. 1 (2014): 1–7. http://dx.doi.org/10.4018/ijcwt.2014010101.
Full textRosso, Mark, ABM Nasir, and Mohsen Farhadloo. "Chilling effects and the stock market response to the Snowden revelations." New Media & Society 22, no. 11 (2020): 1976–95. http://dx.doi.org/10.1177/1461444820924619.
Full textGibson, Elizabeth. "Digital Rights Ireland Ltd. v. Minister for Communications & Google Spain SL v. Agencia Española De Protección De Datos (C.J.E.U.)." International Legal Materials 53, no. 5 (2014): 889–926. http://dx.doi.org/10.5305/intelegamate.53.5.0889.
Full textAdzanas, Adrian, and Bambang Ipto. "EDWARD SNOWDEN"S COMMUNICATION STRATEGY AGAINST INFORMATION DOMINATION GOVERNMENT OF THE UNITED STATES." dia 20, no. 01 (2022): 121–35. http://dx.doi.org/10.30996/dia.v20i01.6295.
Full textDamayanti, Oseani Umi, and Ahmad Toni. "ANALISIS SEMIOTIKA FILM DOKUMENTER CITIZENFOUR KARYA LAURA POITRAS." Jurnal Ilmiah LISKI (Lingkar Studi Komunikasi) 4, no. 2 (2018): 145. http://dx.doi.org/10.25124/liski.v4i2.1508.
Full textJoseph, Mabin, Gautham Sekar, and R. Balasubramanian. "Side channel analysis of SPECK." Journal of Computer Security 28, no. 6 (2020): 655–76. http://dx.doi.org/10.3233/jcs-200021.
Full textAiken, Juliet R., and Paul J. Hanges. "Teach an I-O To Fish: Integrating Data Science Into I-O Graduate Education." Industrial and Organizational Psychology 8, no. 4 (2015): 539–44. http://dx.doi.org/10.1017/iop.2015.80.
Full textIngiriis, Mohamed Haji. "Predatory politics and personalization of power: The abuses and misuses of the National Intelligence and Security Agency (NISA) in Somalia." African Affairs 119, no. 475 (2020): 251–74. http://dx.doi.org/10.1093/afraf/adz027.
Full textAhmad, Mahvish, and Rabia Mehmood. "Surveillance, Authoritarianism and ‘Imperial Effects’ in Pakistan." Surveillance & Society 15, no. 3/4 (2017): 506–13. http://dx.doi.org/10.24908/ss.v15i3/4.6721.
Full textCihan, Ulas Serhat Sahin Emir Memisoglu Ulas Asık Canturk Karadeniz Bilal Kılıc Ugur Sarac. "AUTOMATIC TEMPEST TEST AND ANALYSIS SYSTEM DESIGN." International Journal on Cryptography and Information Security ( IJCIS) 4, no. 3 (2014): 1–12. https://doi.org/10.5281/zenodo.7256302.
Full textCihan, Ulas Serhat Sahin Emir Memisoglu Ulas Asık Canturk Karadeniz Bilal Kılıc Ugur Sarac. "AUTOMATIC TEMPEST TEST AND ANALYSIS SYSTEM DESIGN." International Journal on Cryptography and Information Security (IJCIS) 4, no. 3 (2014): 1–12. https://doi.org/10.5281/zenodo.7276694.
Full textMathur, Raaghav, Ashish Khanna, and Abhijeet Singh. "Early Detection of Ransomware Exploits Using Snort." Innovative Computing and Communication: An International Journal 1, no. 1 (2019): 35–45. https://doi.org/10.5281/zenodo.4743527.
Full textFatma, Yulia, Soni, and Mikdad Amseno. "Perbandingan Algoritma SIMON dan SPECK Dalam Pengamanan Citra Digital." Jurnal CoSciTech (Computer Science and Information Technology) 5, no. 2 (2024): 250–59. http://dx.doi.org/10.37859/coscitech.v5i2.7619.
Full textKlehr, Harvey. "REFLECTIONS ON ESPIONAGE." Social Philosophy and Policy 21, no. 1 (2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.
Full textPoggio Teixeira, Carlos Gustavo, and Mark William Datysgeld. "Os clientes diplomáticos e econômicos da espionagem digital estadunidense: Análise das ações contra o Conselho de Segurança da ONU e a Petrobras." Estudos Internacionais: revista de relações internacionais da PUC Minas 4, no. 1 (2017): 71–87. http://dx.doi.org/10.5752/p.2317-773x.2016v4n1p71.
Full textHasyimi, Valid, Utomo Sarjono Putro, Santi Novani, and Agung Hendriadi. "Promoting value co-creation in food security in Indonesia with the lens of service-dominant logic." Journal of Infrastructure, Policy and Development 8, no. 13 (2024): 6461. http://dx.doi.org/10.24294/jipd6461.
Full textP., Anjaneyulu, and S. Srinivasa Reddy Mr. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 390–93. https://doi.org/10.31142/ijtsrd12995.
Full textKAI Putri, Ni Made, Bambang JS, and Sovian Aritonang. "URANIUM AND THORIUM POTENTIAL FOR INDONESIA'S FUTURE ENERGY SECURITY." International Journal of Education and Social Science Research 05, no. 01 (2022): 235–51. http://dx.doi.org/10.37500/ijessr.2022.5120.
Full textIngiriis, Mohamed Haji. "Insurgency and international extraversion in Somalia: the National Intelligence and Security Agency (NISA) and Al-Shabaab's Amniyat." African Security Review 29, no. 2 (2020): 125–51. http://dx.doi.org/10.1080/10246029.2020.1740752.
Full textBożek, Martin. "AKTYWNOŚĆ SŁUŻB SPECJALNYCH W SFERZE CYBERBEZPIECZEŃSTWA. ASPEKTY NORMATYWNE." International Journal of New Economics and Social Sciences 23, no. 7 (2023): 319–34. http://dx.doi.org/10.5604/01.3001.0054.8360.
Full textSinkó, Gábor. "Different times, same methods." Journal of Central and Eastern European African Studies 1, no. 1-2 (2024): 112–23. https://doi.org/10.59569/jceeas.2021.1.1-2.6.
Full textPandey, Shikha. "Anti-Terrorism Courts and Procedural (In)Justice: The Case of the National Investigation Agency (NIA) Special Courts in South Chhattisgarh, India." Socio-Legal Review 16, no. 1 (2020): 109–39. https://doi.org/10.55496/cpjy1470.
Full textJäcklein-Kreis, Elisabeth. "Stichwort Prism." merz | medien + erziehung 57, no. 4 (2013): 4. http://dx.doi.org/10.21240/merz/2013.4.4.
Full textEnyia, Jacob Otu, Ayuk A. Achu, Otu Duke, Cleverty Afu Njong, Tiku Oru Takim, and John Thompson Okpa. "Intelligence Gathering Imperative: A Tool for Successful Security Outfits’ Operation." International Journal of Criminology and Sociology 11 (November 30, 2022): 136–43. http://dx.doi.org/10.6000/1929-4409.2022.11.15.
Full textPurba, Darwis Pardamean. "Analisa Dan Perbandingan Algoritma Whirpool Dan Sha-512 Dalam Penyandian Data Gambar." Bulletin of Artificial Intelligence 1, no. 1 (2022): 8–12. http://dx.doi.org/10.62866/buai.v1i1.2.
Full textLawand, Arthur Miguel Ferreira. "O aparente conflito normativo sobre a avaliação da exposição ao hidrocarboneto benzeno nas atividades no meio ambiente do trabalho: aplicação do método quantitativo ou qualitativo?" Revista Brasileira de Direito Constitucional 24, no. 2 (2025): 61–68. https://doi.org/10.62530/rbdcv24n02p61.
Full textFagbemi, Adebimpe Saheed, Abiodun Ghali Issa, and Christiana Ayah Fagbemi. "Intelligence Gathering and Policy Formulation for Addressing Security Threats in Nigeria." African Journal of Humanities and Contemporary Education Research 16, no. 1 (2024): 139–49. http://dx.doi.org/10.62154/ajhcer.2024.016.010423.
Full textChen, Chin-Ling, Cheng-Chen Fang, Ming Zhou, et al. "A Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System." Symmetry 14, no. 9 (2022): 1827. http://dx.doi.org/10.3390/sym14091827.
Full textRamadianto, Anang Riyan. "Sebuah Perbandingan Perlindungan Hukum Terhadap Korban Tindak Pidana Terorisme di Indonesia dan India." Diktum: Jurnal Ilmu Hukum 10, no. 1 (2022): 118–31. http://dx.doi.org/10.24905/diktum.v10i1.193.
Full textTherrien, Cristiano, and Pierre Trudel. "The Brazilian Civil Rights Framework for the Internet (or the Virtual Times of a Postmodern Law). Doi: 10.5020/2317-2150.2015.v20n3p746." Pensar - Revista de Ciências Jurídicas 20, no. 3 (2016): 746–66. http://dx.doi.org/10.5020/23172150.2012.746-766.
Full textHa, Chung-Sik. "The Introduction of the “Dispatch Slide” to Secure the Golden Time." Fire Science and Engineering 36, no. 4 (2022): 74–78. http://dx.doi.org/10.7731/kifse.2ff52f3e.
Full textJasthin, R., E. K. S. Harini, and R. F. Primasatya. "Hazard mapping in Sembalun-Senaru hiking trail, Mount Rinjani National Park." IOP Conference Series: Earth and Environmental Science 1366, no. 1 (2024): 012014. http://dx.doi.org/10.1088/1755-1315/1366/1/012014.
Full textIdrus. "Halal Haram Cryptocurrency." Al-Tasyree: Jurnal Bisnis, Keuangan dan Ekonomi Syariah 13, no. 02 (2021): 113–23. http://dx.doi.org/10.59833/altasyree.v13i02.300.
Full text