共 39 条
[2]
Bentotahewa V, 2022, SN Computer Science, V3, DOI [10.1007/s42979-022-01079-z, 10.1007/s42979-022-01079-z, DOI 10.1007/S42979-022-01079-Z]
[3]
Chen H, 2012, INTEGR SER INFORM SY, V30, P1, DOI 10.1007/978-1-4614-1557-2
[4]
Choras M, 2016, STUD SYST DECIS CONT, V90, P139, DOI 10.1007/978-3-319-51043-9_7
[6]
Denker K., 2019, Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace, P107, DOI DOI 10.1007/978-3-658-25652-46
[8]
Hamilton R., 2024, Financial crime and the law. Ius Gentium: Comparative perspectives on law and justice, V115, DOI [10.1007/978-3-031-59543-12, DOI 10.1007/978-3-031-59543-12]
[9]
Henschke A., 2021, Advanced Sciences and Technologies for Security Applications, P71, DOI [https://doi.org/10.1007/978-3-030-90221-65, DOI 10.1007/978-3-030-90221-65]
[10]
Humphreys D, 2024, AI and Ethics, V4, P791, DOI [10.1007/s43681-024-00443-4, 10.1007/s43681-024-00443-4, DOI 10.1007/S43681-024-00443-4]