资讯
Related Content chevron_right Ukrainian Analytical Digest (UAD): All Issues chevron_left Ukrainian Analytical Digest (UAD) ...
D-ARCH Architecture D-BAUG Civil, Environmental and Geomatic Engineering D-BIOL Biology D-BSSE Biosystems Science and Engineering D-CHAB Chemistry and Applied Biosciences D-EAPS Earth and Planetary ...
Foreign and Security Policies as a Legal Problem between Center and Regions Author(s): Mikhail Rykhtik, Alexander Sergounin Series: Project Regionalization of Russian Foreign and Security Policy ...
Verwandter Inhalt chevron_right Newsletter Service UAD chevron_left Ukrainian Analytical Digest (UAD) Footer Suche ...
Technological competition between the US and China is one of the defining features of contemporary geopolitics. Nowhere is this more evident than in the global semiconductor industry, a sector whose ...
Recent uncertainties regarding US intelligence sharing with Ukraine have highlighted Ukraine’s extensive reliance on US satellites. Europe, with its growing space capabilities, sees a chance to step ...
2024 was a year in which an already profound geopolitical shift became more marked – with serious implications for global security. We are seeing a trend toward power politics at the expense of ...
Author(s): Farzaneh Badiei, Marie Baezner, Matteo E. Bonfanti, Aaron F. Brantly, Sean Cordey, Myriam Dunn Cavelty, Jacqueline Eggenschwiler, Johan Eriksson, Giampiero ...
The growing complexity of border-transcending security issues confronts the international community with a plethora of challenges. Within the topic of “Global Security”, we examine how geopolitical ...
Edward Jackson is a Senior Program Officer in the Mediation Support Team at the Center for Security Studies (CSS), ETH Zurich. He works on the Ceasefire Project - a joint initiative with the Centre ...
Cyber, space, and artificial intelligence (AI) are pivotal research fields in contemporary security studies and on the modern battlefield. Cyber has taken on heightened significance as offensive cyber ...
Digital extortion, with ransomware as its most prominent form, has become one of the most disruptive cyber threats in recent years. Ransomware locks access to systems or data until a ransom is paid, ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果