Academic literature on the topic 'Spying'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spying.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Spying"
Western, Ken. "Ethical Spying." Business Ethics: The Magazine of Corporate Responsibility 9, no. 5 (1995): 22–23. http://dx.doi.org/10.5840/bemag19959594.
Full textGoldman, Jan. "Spying Properly." International Journal of Intelligence and CounterIntelligence 32, no. 1 (2019): 208–13. http://dx.doi.org/10.1080/08850607.2018.1524251.
Full textZorpette, Glenn. "Spying Saucer." Scientific American 276, no. 6 (1997): 40. http://dx.doi.org/10.1038/scientificamerican0697-40b.
Full textBraithwaite, Rodric. "Proper Spying." Survival 62, no. 5 (2020): 193–202. http://dx.doi.org/10.1080/00396338.2020.1819655.
Full textPrakasa, Satria Unggul Wicaksana. "PILPRES RI 2019 DAN ANCAMAN SPYING ELECTION DALAM PERSPEKTIF HUKUM INTERNASIONAL." Legal Standing : Jurnal Ilmu Hukum 2, no. 2 (2018): 143. http://dx.doi.org/10.24269/ls.v2i2.1244.
Full textKrepon, Michael. "Spying from Space." Foreign Policy, no. 75 (1989): 92. http://dx.doi.org/10.2307/1148866.
Full textEasley, Leif-Eric. "Spying on Allies." Survival 56, no. 4 (2014): 141–56. http://dx.doi.org/10.1080/00396338.2014.941545.
Full textWatson, Matthew. "Spying on volcanoes." Physics World 30, no. 7 (2017): 40–43. http://dx.doi.org/10.1088/2058-7058/30/7/45.
Full textLand, Thomas. "Spying for Food." Worldview 28, no. 1 (1985): 14. http://dx.doi.org/10.1017/s0084255900046441.
Full textWeiss, Aaron. "Spying on ourselves." netWorker 8, no. 2 (2004): 18–24. http://dx.doi.org/10.1145/997922.997923.
Full textDissertations / Theses on the topic "Spying"
Kwapich, Sally J. "Smartphone Spying: Uncovering Hidden Dangers." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1363858931.
Full textLubbers, Eveline. "Activist intelligence and covert corporate strategy : an analysis of corporate spying on critical activists." Thesis, University of Strathclyde, 2009. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=11906.
Full textMaddrell, John Paul. "Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union." Thesis, University of Cambridge, 1999. https://www.repository.cam.ac.uk/handle/1810/226719.
Full textHussey, Phillip Ryan. "The Evolution of Electronic Surveillance: Balancing National Security and Civil Liberties." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-06152007-110824/.
Full textKronlund, Julia Signe, and Veronica Claeson. "Spying or Surviving? : Do companies on the Shanghai market use Competitive Intelligence today in order to stay competitive?" Thesis, Stockholm University, School of Business, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-5942.
Full textThorburn, Mark Allen. "The Times, Trial, and Execution of David McLane: The Story of an American Spying in Canada for the French in 1796-1797." PDXScholar, 1993. https://pdxscholar.library.pdx.edu/open_access_etds/4649.
Full textVik, Kjell Inge Langeland. "Tyrolerinntak - Spyling av sedimenter." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for bygg, anlegg og transport, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23838.
Full textMoulin, Thibault. "Le cyber-espionnage en Droit international." Thesis, Université Grenoble Alpes (ComUE), 2018. https://thares.univ-grenoble-alpes.fr/2018GREAD010.pdf.
Full textReyhan, Dilnur. "Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAG003.
Full textEvert, Benjamin J. "Applications of polyhydroxy butyrate bead technology." Thesis, Griffith University, 2022. http://hdl.handle.net/10072/411889.
Full textBooks on the topic "Spying"
More sourcesBook chapters on the topic "Spying"
Dey, Sayar Kumar, Prerna Choudhary, and Günter Fahrnberger. "Spying Mobrob." In Distributed Computing and Internet Technology. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-50472-8_18.
Full textBearce, Stephanie. "3D Spying." In Top Secret Files. Routledge, 2021. http://dx.doi.org/10.4324/9781003239222-34.
Full textMaloba, W. O. "Spying on Political Activism." In Kenyatta and Britain. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50895-5_3.
Full textWakeman, Frederic. "Spying." In SpymasterDai Li and the Chinese Secret Service. University of California Press, 2003. http://dx.doi.org/10.1525/california/9780520234079.003.0022.
Full text"Acknowledgments." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-001.
Full text"Contents." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-toc.
Full text"6 The FBI’s Human Capital Issues." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-007.
Full text"About the Book." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-017.
Full text"Frontmatter." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-fm.
Full text"Index." In Spying. Lynne Rienner Publishers, 2019. http://dx.doi.org/10.1515/9781626378018-016.
Full textConference papers on the topic "Spying"
Sun, Ke, Chen Chen, and Xinyu Zhang. ""Alexa, stop spying on me!"." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. ACM, 2020. http://dx.doi.org/10.1145/3384419.3430727.
Full textXiong, Wenjie, Nikolaos Athanasios Anagnostopoulos, Andre Schaller, Stefan Katzenbeisser, and Jakub Szefer. "Spying on Temperature using DRAM." In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2019. http://dx.doi.org/10.23919/date.2019.8714882.
Full textVarshney, Gaurav, Manoj Misra, and Pradeep K. Atrey. "Detecting Spying and Fraud Browser Extensions." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3137616.3137619.
Full textSami, Sriram, Yimin Dai, Sean Rui Xiang Tan, Nirupam Roy, and Jun Han. "Spying with your robot vacuum cleaner." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. ACM, 2020. http://dx.doi.org/10.1145/3384419.3430781.
Full textAarthi, V., R. Visali, and K. K. Nagarajan. "Smart Spying Robot with IR Thermal Vision." In 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2021. http://dx.doi.org/10.1109/icaccs51430.2021.9441821.
Full textBasak, Suryoday, and Mahanth Gowda. "mmSpy: Spying Phone Calls using mmWave Radars." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833568.
Full textTerkki, Eeva, Ashwin Rao, and Sasu Tarkoma. "Spying on Android users through targeted ads." In 2017 9th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2017. http://dx.doi.org/10.1109/comsnets.2017.7945362.
Full textHilgefort, Jan Malte, Daniel Arp, and Konrad Rieck. "Spying through Virtual Backgrounds of Video Calls." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2021. http://dx.doi.org/10.1145/3474369.3486870.
Full textAntonik, Piotr, Marvyn Gulina, Jael Pauwels, Damien Rontani, Marc Haelterman, and Serge Massar. "Spying on chaos-based cryptosystems with reservoir computing." In 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, 2018. http://dx.doi.org/10.1109/ijcnn.2018.8489102.
Full textSharma, Divya, and Usha Chauhan. "War Spying Robot with Wireless Night Vision Camera." In 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 2020. http://dx.doi.org/10.1109/icacccn51052.2020.9362981.
Full textReports on the topic "Spying"
Ölbei, Tamás. Tinker, Tailor, Soldier, Spy: Reconnaissance, Spying on Mercenaries and Crusaders. Edicions de la Universitat de Lleida, 2020. http://dx.doi.org/10.21001/itma.2020.14.11.
Full textHin, Saskia C. Interdisciplinary research collaboration as the future of ancient history? Insights from spying on demographers. Max Planck Institute for Demographic Research, 2013. http://dx.doi.org/10.4054/mpidr-wp-2013-002.
Full textThorburn, Mark. The Times, Trial, and Execution of David McLane: The Story of an American Spying in Canada for the French in 1796-1797. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.6533.
Full textSteinman, Dave, Mike Celiceo, and Joe Head. Stopping Insider Abuse and Spying. Detecting the Hard Stuff: Stolen Passwords Unauthorized Records Browsing, Employee Espionage, Infiltration, and Insertion of Unwelcome Code, via Automatic Behavior Profiling. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385478.
Full text