驳船 发表于 2025-3-28 14:52:19

Yixuan He,Shuchang Tao,Jun Xu,Jiafeng Guo,YanYan Lan,Xueqi Chengrk (South East Asian Network of Civil Society Organisations working against violent extremism), which is a network that brings together key regional civil society organisations working on P/CVE-related initiatives. The findings represent a window into the current workings of CSOs engaged in P/CVE wo

delusion 发表于 2025-3-28 22:17:32

orist attacks from the decades-old Jemaah Islamiyah (JI) network, new networks have emerged linked to the Islamic State (IS) movement. The declaration of the IS caliphate on 29 June 2014 saw a surge in popular support for the movement and its utopian campaign in Syria and Iraq (El Rahman, V. .

NOMAD 发表于 2025-3-29 00:44:51

http://reply.papertrans.cn/47/4652/465191/465191_43.png

星星 发表于 2025-3-29 05:30:03

http://reply.papertrans.cn/47/4652/465191/465191_44.png

拱墙 发表于 2025-3-29 11:09:50

http://reply.papertrans.cn/47/4652/465191/465191_45.png

JIBE 发表于 2025-3-29 13:20:39

Ruqing Zhang,Jiafeng Guo,Yanyan Lan,Jun Xu,Xueqi Cheng. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped t

盖他为秘密 发表于 2025-3-29 16:08:32

http://reply.papertrans.cn/47/4652/465191/465191_47.png

propose 发表于 2025-3-29 20:10:17

http://reply.papertrans.cn/47/4652/465191/465191_48.png

极大痛苦 发表于 2025-3-30 03:00:45

rmation Awareness and Edward Snowden‘s NSA leaks.Examines U..From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA‘s $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompass

出价 发表于 2025-3-30 06:42:29

Guoyong Cai,Hongyu Lirmation Awareness and Edward Snowden‘s NSA leaks.Examines U..From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA‘s $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompass
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Retrieval; 24th China Conferenc Shichao Zhang,Tie-Yan Liu,Chenliang Li Conference proceedings 2018 Springer Nature Switzerland