Artículos de revistas sobre el tema "United states - espionage"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "United states - espionage".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Arindiya, Ghina, and Dewi Triwahyuni. "CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 7, no. 1 (2024): 1108–19. http://dx.doi.org/10.34010/icobest.v7i.624.
Texto completoClarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (1998): 20–35. http://dx.doi.org/10.2307/2538128.
Texto completoClarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (1998): 20–35. http://dx.doi.org/10.1525/jps.1998.27.4.00p00037.
Texto completoKlehr, Harvey. "REFLECTIONS ON ESPIONAGE." Social Philosophy and Policy 21, no. 1 (2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.
Texto completoSmith, Michael M. "The Mexican Secret Service in the United States, 1910-1920." Americas 59, no. 1 (2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.
Texto completoRoissyam, Anja Yanuar, and Bambang Wahyu Nugroho. "Restrictive Policies on Huawei During the Donald Trump Administration: An Analysis of U.S. National Security and Geopolitical Interests." Proceedings University of Muhammadiyah Yogyakarta Undergraduate Conference 3, no. 1 (2023): 62–70. https://doi.org/10.18196/umygrace.v3i1.533.
Texto completoSmith, Lieutenant Commander Ursula, and Colonel Daniel J. Lecce. "Litigating National Security Cases under The United States Uniform Code of Military Justice." Journal of International Peacekeeping 20, no. 3-4 (2016): 250–74. http://dx.doi.org/10.1163/18754112-02003007.
Texto completoTerry, Patrick C. R. "“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law." German Law Journal 19, no. 3 (2018): 613–26. http://dx.doi.org/10.1017/s207183220002280x.
Texto completoHeletei, Andrii. "LEGISLATIVE TOOLS AGAINST AIDING AN AGGRESSOR STATE: ANALYSIS OF THE EXPERIENCE OF THE USA, THE UK, AND THE BALTIC STATES." Baltic Journal of Legal and Social Sciences, no. 2 (June 11, 2025): 40–47. https://doi.org/10.30525/2592-8813-2025-2-5.
Texto completoAmusan, Lere, and Siphiwe Mchunu. "Adventure into Peacetime Intra-Alliance Espionage: Assessment of the America-Germany Saga." Lithuanian Foreign Policy Review 33, no. 1 (2015): 64–82. http://dx.doi.org/10.1515/lfpr-2016-0010.
Texto completoTriwahyuni, D., M. Azhar, D. Cahya, and R. Andika. "Cyber Espionage of F-15 Fighter Jet Data Impact To U.S. – China Relations." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 6, no. 1 (2023): 762–74. http://dx.doi.org/10.34010/icobest.v4i.446.
Texto completoWRÓBLEWSKA, Angelika. "SELECTED ADVANCED CYBER ESPIONAGE OPERATIONS." Cybersecurity & Cybercrime 1, no. 1 (2021): 149–64. http://dx.doi.org/10.5604/01.3001.0053.8016.
Texto completoTerry, Patrick C. R. "“ABSOLUTE FRIENDS”: UNITED STATES ESPIONAGE AGAINST GERMANY AND PUBLIC INTERNATIONAL LAW." Revue québécoise de droit international 28, no. 2 (2015): 173. http://dx.doi.org/10.7202/1067720ar.
Texto completoWilhelm, Londoño Díaz. "Archaeologists, Bananas, and Spies: The Development of Archaeology in Northern Colombia." Arqueologia Iberoamericana 45 (March 18, 2020): 11–21. https://doi.org/10.5281/zenodo.3733813.
Texto completoFedoniuk, Serhii, and Serhii Maghdysiuk. "US-China Confrontation in Cyber Security." Історико-політичні проблеми сучасного світу, no. 45 (June 27, 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Texto completoAvery, Donald. "Secrets Between Different Kinds of Friends: Canada’s Wartime Exchange of Scientific Military Information with the United States and the USSR, 1940‑1945." Historical Papers 21, no. 1 (2006): 225–53. http://dx.doi.org/10.7202/030955ar.
Texto completoSetzekorn, Eric. "The Contemporary Utility of 1930s Counterintelligence Prosecution Under the United States Espionage Act." International Journal of Intelligence and CounterIntelligence 29, no. 3 (2016): 545–63. http://dx.doi.org/10.1080/08850607.2016.1121050.
Texto completoAdzanas, Adrian, and Bambang Ipto. "EDWARD SNOWDEN"S COMMUNICATION STRATEGY AGAINST INFORMATION DOMINATION GOVERNMENT OF THE UNITED STATES." dia 20, no. 01 (2022): 121–35. http://dx.doi.org/10.30996/dia.v20i01.6295.
Texto completoSIBLEY, KATHERINE A. S. "Soviet Military-Industrial Espionage in the United States and the Emergence of an Espionage Paradigm in US-Soviet Relations, 1941-45." American Communist History 2, no. 1 (2003): 21–51. http://dx.doi.org/10.1080/1474389032000112582.
Texto completoHaynes, John Earl. "The Cold War Debate Continues: A Traditionalist View of Historical Writing on Domestic Communism and Anti-Communism." Journal of Cold War Studies 2, no. 1 (2000): 76–115. http://dx.doi.org/10.1162/15203970051032381.
Texto completoDonald, L. Buresh. "In Light of The American Departure From Afghanistan, Does Network-Centric Warfare Adequately Prepare The United States to Address Future Cyber Activities by The Taliban?" International Journal of Social Science and Human Research 05, no. 03 (2022): 1050–73. https://doi.org/10.5281/zenodo.6386031.
Texto completoJonghaeng Yoon. "Recent Trends of Court's Decisions and Legislation on Economic Espionage in the United States." kangwon Law Review 44, no. ll (2015): 477–501. http://dx.doi.org/10.18215/kwlr.2015.44..477.
Texto completoHouse, Jonathan M. "American Spies: Espionage against the United States from the Cold War to the Present." History: Reviews of New Books 42, no. 4 (2014): 129. http://dx.doi.org/10.1080/03612759.2014.903784.
Texto completoSegal, Adam. "The code not taken: China, the United States, and the future of cyber espionage." Bulletin of the Atomic Scientists 69, no. 5 (2013): 38–45. http://dx.doi.org/10.1177/0096340213501344.
Texto completoHaidery, Baqir Hassan. "The US-China Cyber Conflict and Its Impact on the UK's Cybersecurity Policies." Journal of Regional Studies Review 4, no. 1 (2025): 503–15. https://doi.org/10.62843/jrsr/2025.4a096.
Texto completoArredondo, Ricardo. "DIPLOMACIA, ESPIONAJE Y ORDEN MUNDIAL: EL CIERRE DE CONSULADOS DE CHINA Y ESTADOS UNIDOS." Revista española de derecho internacional 73, no. 1 (2021): 35–56. http://dx.doi.org/10.17103/redi.73.1.2021.1.01.
Texto completoHaynes, John Earl, and Harvey Klehr. "Alexander Vassiliev's Notebooks and the Documentation of Soviet Intelligence Activities in the United States during the Stalin Era." Journal of Cold War Studies 11, no. 3 (2009): 6–25. http://dx.doi.org/10.1162/jcws.2009.11.3.6.
Texto completoYang, Yezi, and Chrisy Du. "Dr. Xiaoxing Xi on false science espionage accusations, advocacy, and Oppenheimer." MIT Science Policy Review 5 (August 27, 2024): 170–76. http://dx.doi.org/10.38105/spr.49egkoc8f6.
Texto completoKlehr, Harvey, and John Earl Haynes. "The First U.S.-Based Soviet Nuclear Spy: The Saga of Clarence Hiskey and Arthur Adams." Journal of Cold War Studies 25, no. 4 (2023): 53–69. http://dx.doi.org/10.1162/jcws_a_01170.
Texto completoDodson, Julian F. "Deception and Danger: Women and Cross-border Espionage in Mexico, 1923–1929." Latin Americanist 68, no. 4 (2024): 454–77. https://doi.org/10.1353/tla.2024.a947799.
Texto completoHerken, Gregg. "Target Enormoz: Soviet Nuclear Espionage on the West Coast of the United States, 1942–1950." Journal of Cold War Studies 11, no. 3 (2009): 68–90. http://dx.doi.org/10.1162/jcws.2009.11.3.68.
Texto completoBubshait, Fawaz. "Cybersecurity in Digital Diplomacy: A Comparative Analysis of the United States and Kingdom of Bahrain." International Journal of Educational Sciences and Arts 4, no. 4 (2025): 60–78. https://doi.org/10.59992/ijesa.2025.v4n4p3.
Texto completoXiaofeng, Wang. "China’s Alternative Roles in Countering International Economic Cyber Espionage." China Quarterly of International Strategic Studies 02, no. 04 (2016): 549–68. http://dx.doi.org/10.1142/s2377740016500251.
Texto completoRovner, Joshua, and Tyler Moore. "Does the Internet Need a Hegemon?" Journal of Global Security Studies 2, no. 3 (2017): 184–203. http://dx.doi.org/10.1093/jogss/ogx008.
Texto completoTuluș, Arthur. "The Condition of National Minorities in Eastern Europe in a Secret Cia Report From 1965." Eminak, no. 2(34) (July 1, 2021): 210–28. http://dx.doi.org/10.33782/eminak2021.2(34).529.
Texto completoSelyanin, Yaroslav. "The US confrontation with China through the prism of cyberspace." Russia and America in the 21st Century, no. 3 (2023): 0. http://dx.doi.org/10.18254/s207054760026344-5.
Texto completoPawlikowicz, Leszek. "Wykorzystanie radzieckich emigrantów doby détente w praktyce działań 1. Zarządu Głównego KGB i współczesne reminiscencje tego zjawiska. Casus Stanów Zjednoczonych Ameryki." Polityka i Społeczeństwo 20, no. 4 (2022): 233–48. http://dx.doi.org/10.15584/polispol.2022.4.16.
Texto completoGul, Noman, Fareed Ullah, and Azmat Ali Shah. "Sino-US Global Competitive Dynamics Post 9/11 and its Impacts on Pakistan's Security." Global Strategic & Securities Studies Review VI, no. II (2021): 162–73. http://dx.doi.org/10.31703/gsssr.2021(vi-ii).16.
Texto completoOlmsted, Kathryn. "British and US Anticommunism Between the World Wars." Journal of Contemporary History 53, no. 1 (2016): 89–108. http://dx.doi.org/10.1177/0022009416653458.
Texto completoUsdin, Steven. "The Face of Soviet Espionage in the United States during the Stalin Era: Vladimir Pravdin, “Man of Truth”." Journal of Cold War Studies 26, no. 2 (2024): 78–122. http://dx.doi.org/10.1162/jcws_a_01211.
Texto completoTrasciatti, Mary Anne. "Kairos, Free Speech, and the Material Conditions of State Power in the United States: The Case of World War I." Journal for the History of Rhetoric 18, no. 2 (2015): 216–26. http://dx.doi.org/10.5325/jhistrhetoric.18.2.0216.
Texto completoActon, James M. "Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War." International Security 43, no. 1 (2018): 56–99. http://dx.doi.org/10.1162/isec_a_00320.
Texto completoEkmekçi, Esra. "Cybersecurity and the Future of International Relations." Next Generation Journal for The Young Researchers 8, no. 1 (2024): 57. http://dx.doi.org/10.62802/85tt3452.
Texto completoLi, Wei. "The Security Service for Chinese Central Leaders." China Quarterly 143 (September 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.
Texto completoGoodman, Michael S. "Who Is Trying to Keep What Secret from Whom and Why? MI5-FBI Relations and the Klaus Fuchs Case." Journal of Cold War Studies 7, no. 3 (2005): 124–46. http://dx.doi.org/10.1162/1520397054377160.
Texto completoDYACHKOV, Ilya Vladimirovich. "UN SANCTIONS AGAINST THE DPRK: AN ASSESSMENT OF EFFICIENCY." Tambov University Review. Series: Humanities, no. 177 (2018): 173–79. http://dx.doi.org/10.20310/1810-0201-2018-23-177-173-179.
Texto completoNeagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.
Texto completoKuntal, Manorama. "Mossad: The Greatest Missions of the Israeli secret Service." Electronic Journal of Social and Strategic Studies 06, no. 01 (2025): 166–70. https://doi.org/10.47362/ejsss.2025.6110.
Texto completoBessonova, Maryna. "Canada and the Beginning of the Cold War: Modern Interpretations." American History & Politics Scientific edition, no. 8 (2019): 47–56. http://dx.doi.org/10.17721/2521-1706.2019.08.05.
Texto completoGilli, Andrea, and Mauro Gilli. "Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage." International Security 43, no. 3 (2019): 141–89. http://dx.doi.org/10.1162/isec_a_00337.
Texto completo