共 50 条
- [1] The Case for Cyber Counterintelligence [J]. 2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,
- [2] Putting Counterintelligence in Cyber Counterintelligence: Back to the Future [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 70 - 79
- [3] Towards a Cyber Counterintelligence Maturity Model [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 432 - 440
- [4] A Cyber Counterintelligence Matrix for Outsmarting Your Adversaries [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 187 - 193
- [6] Conceptualising Cyber Arms Races [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.): PROCEEDINGS : 7-8 NOVEMBER 2017, WASHINGTON, DC, USA, 2016, : 141 - 158
- [7] Developing a Cyber Counterintelligence Maturity Model for Developing Countries [J]. 2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
- [8] The building of south China: Collision of Yangzi and Cathaysia blocks, problems and tentative answers [J]. JOURNAL OF SOUTHEAST ASIAN EARTH SCIENCES, 1996, 13 (3-5): : 223 - 235
- [10] A Tentative Study on Cyber language [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON MODERN EDUCATION AND SOCIAL SCIENCE (MESS 2017), 2017, 135 : 724 - 726