Academic literature on the topic 'Cyberhot'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyberhot.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyberhot"
Curran, Kevin, and Sheila Mc Kinney . "Cyberart." Journal of Applied Sciences 4, no. 4 (2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.
Full textLEVIN, BRIAN. "Cyberhate." American Behavioral Scientist 45, no. 6 (2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.
Full textLewis, Mike. "CYBERLOG." Health Libraries Review 5, no. 3 (1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.
Full textPorett, Tom. "Cyberart Considerations." Art Journal 53, no. 3 (1994): 32. http://dx.doi.org/10.2307/777416.
Full textMeyer, Helen. "Cybercop scanner." Computers & Security 18, no. 3 (1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.
Full textDouglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc, and Girish Lala. "Understanding Cyberhate." Social Science Computer Review 23, no. 1 (2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.
Full textMaulitz, R. C., J. A. Ohles, R. L. Schnuth, M. S. Lipsky, and R. J. Grealish. "The CyberDoc project." Academic Medicine 71, no. 12 (1996): 1325–8. http://dx.doi.org/10.1097/00001888-199612000-00014.
Full textBakalis, Chara. "Rethinking cyberhate laws." Information & Communications Technology Law 27, no. 1 (2017): 86–110. http://dx.doi.org/10.1080/13600834.2017.1393934.
Full textCelik, Serkan. "Experiences of internet users regarding cyberhate." Information Technology & People 32, no. 6 (2019): 1446–71. http://dx.doi.org/10.1108/itp-01-2018-0009.
Full textCelik, Serkan. "Tertiary-level internet users’ opinions and perceptions of cyberhate." Information Technology & People 31, no. 3 (2018): 845–68. http://dx.doi.org/10.1108/itp-05-2017-0147.
Full textDissertations / Theses on the topic "Cyberhot"
Olsson, Sanna, and Isabella Hultberg. "Cybersäkerhet - Att stärka den svaga länken : En flerfallsstudie om hur formella och informella styrmedel förebygger interna cyberhot i banksektorn." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176804.
Full textFearn, Harriet. "The impacts of cyberhate." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/66869/.
Full textCheung, Kwong-chung. "Reinforced earth wall design & construction in northern access road for Cyberport Development /." View the Table of Contents & Abstract, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3676288X.
Full textCheung, Kwong-chung, and 張光中. "Reinforced earth wall design & construction in northern access road for Cyberport Development." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B45014279.
Full textKabil, Alexandre. "CyberCOP 3D : visualisation 3D interactive et collaborative de l'état de sécurité d'un système informatique." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0166.
Full textDul, Anna, and Johanna Velin. "How Do Leadership Behaviours Affect Employee Attitudes Towards Sustainability? A case study on IT consultancy Cybercom." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23091.
Full textStrauss, Juergen. "Interaktions- und Animationstechniken in virtuellen Welten." Master's thesis, Universitätsbibliothek Chemnitz, 1997. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199700063.
Full textEdin, Andreas. "Autentisering med OAuth 2.0 i SiteVision : Jämförelse mellan Java Portlets och WebApps." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33878.
Full textNicolas, Clémence. "Polymérisation par ouverture de cycle par métathèse de monomères antioxydants en vue de l’amélioration des propriétés de matériaux à base de polydicyclopentadiène." Thesis, Le Mans, 2019. http://cyberdoc-int.univ-lemans.fr/Theses/2019/2019LEMA1025.pdf.
Full textClavier, Batiste. "Synthèse, caractérisations et évaluation de l'activité bactéricide de composés inorganiques à base de cuivre." Thesis, Le Mans, 2019. http://cyberdoc-int.univ-lemans.fr/Theses/2019/2019LEMA1041.pdf.
Full textBooks on the topic "Cyberhot"
Heickerö, Roland. Internets mörka sidor: Om cyberhot och informationskrigföring. Atlantis, 2012.
Find full textHeickerö, Roland. Emerging cyber threats and Russian views on information warfare and information operations: Utveckling av cyberhot och den ryska synen på informationskrigföring och informationsoperationer. FOI, Swedish Defence Research Agency, Division of Defence Analysis, 2010.
Find full textFeiler, Jesse. Cyberdog: The complete guide to Apple's Internet productivity technology. AP Professional, 1996.
Find full textMatrix, Sidney Eve. Cyberpop: Digital lifestyles and commodity culture. Routledge, 2007.
Find full textBoyle, Sean 1977. Perfect horizon: Finiens perfectus 215X : HDL cyberpop setting. Tremorworks, LLC, 2006.
Find full textRobin, Régine. Le Golem de l'ecriture: De l'autofiction au cybersoi. XYZ éditeur, 1997.
Find full textGlobal medium, local laws: Regulating cross-border cyberhate. LFB Scholarly Pub., 2009.
Find full textBook chapters on the topic "Cyberhot"
Jane, Emma A., and Nicole A. Vincent. "Cyberhate, Communication and Transdisciplinarity." In Reimagining Communication: Meaning. Routledge, 2020. http://dx.doi.org/10.4324/9781351007924-10.
Full textShi, Shumin, Xinyu Zhou, Meng Zhao, and Heyan Huang. "Identifying Suspected Cybermob on Tieba." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47674-2_31.
Full textProkopenko, Mikhail, Peter Wang, and Thomas Howard. "Cyberoos’2001: “Deep Behaviour Projection” Agent Architecture." In RoboCup 2001: Robot Soccer World Cup V. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45603-1_70.
Full textJane, Emma A. "Feminist flight and fight responses to gendered cyberhate." In Gender, Technology and Violence. Routledge, 2017. http://dx.doi.org/10.4324/9781315441160-4.
Full textProkopenko, Mikhail, Marc Butler, Wai Yat Wong, and Thomas Howard. "Cyberoos’99: Tactical Agents in the RoboCup Simulation League." In RoboCup-99: Robot Soccer World Cup III. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45327-x_47.
Full textVassanelli, Stefano, Florian Felderer, Mufti Mahmud, Marta Maschietto, and Stefano Girardi. "CyberRat Probes: High-Resolution Biohybrid Devices for Probing the Brain." In Biomimetic and Biohybrid Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31525-1_24.
Full textKabil, Alexandre, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, and Christophe Ponchel. "3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00560-3_24.
Full textProkopenko, Mikhail, and Peter Wang. "Disruptive Innovations in RoboCup 2D Soccer Simulation League: From Cyberoos’98 to Gliders2016." In RoboCup 2016: Robot World Cup XX. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68792-6_44.
Full textKabil, Alexandre, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, and Christophe Ponchel. "From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform." In Information Systems Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_14.
Full textJane, Emma. "Gendered cyberhate." In Theorizing Digital Divides. Routledge, 2017. http://dx.doi.org/10.4324/9781315455334-15.
Full textConference papers on the topic "Cyberhot"
Omidosu, Joseph, and Michael Kyobe. "Towards a harm-based framework to evaluate Cyberhate." In 2021 Conference on Information Communications Technology and Society (ICTAS). IEEE, 2021. http://dx.doi.org/10.1109/ictas50802.2021.9395008.
Full textKim, Jae H., Fu-Chung Wang, Carlo H. Séquin, and Paul K. Wright. "Design for Machining Over the Internet." In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/dfm-8938.
Full textSun, Jianhua, Kun Sun, and Qi Li. "CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms." In 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 2017. http://dx.doi.org/10.1109/cns.2017.8228642.
Full textGil, Debora, Aura Hernandez-Sabate, David Castells-Rufas, and Jordi Carrabina. "CYBERH: Cyber-Physical Systems in Health for Personalized Assistance." In 2017 19th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, 2017. http://dx.doi.org/10.1109/synasc.2017.00067.
Full textTeles, Lucio. "Re-engineering adult education through students' production of cyberart to support curriculum learning." In 2014 9th International Conference on Computer Science & Education (ICCSE). IEEE, 2014. http://dx.doi.org/10.1109/iccse.2014.6926463.
Full textWrona, Maciej, Mariusz Kastek, Marcin Szolucha, Jaroslaw Bareła, and Krzysztof Firmanty. "CYBERDOG: monitoring and control system for law enforcement forces K-9 special activities." In Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies, edited by Henri Bouma, Robert J. Stokes, Yitzhak Yitzhaky, and Radhakrishna Prabhu. SPIE, 2018. http://dx.doi.org/10.1117/12.2325581.
Full textFox, J. F., and A. N. Papanicolaou. "Carbon and Nitrogen Isotopes and C / N Ratio as a Fingerprinting tracer within Eco-Cybernet." In Watershed Management Conference 2005. American Society of Civil Engineers, 2005. http://dx.doi.org/10.1061/40763(178)17.
Full textInouye, Ryan, and Paul K. Wright. "Design Rules and Technology Guides for Web-Based Manufacturing." In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/cie-9082.
Full textKong, Daniel K. S., Andrew W. C. Kwong, and Hugo H. N. Wong. "Use of Glass Reinforced Concrete in the Construction of Bel-Air No. 8, Cyberport, Hong Kong." In 7th International Conference on Tall Buildings. Research Publishing Services, 2009. http://dx.doi.org/10.3850/9789628014194_0037.
Full textSubba, Rajib, and Tung Bui. "Self-Coordinated Defense Mechanisms against Cyberhate: An Analysis of Postings Related to the 2010 Haiti Earthquake on Facebook." In 2012 45th Hawaii International Conference on System Sciences (HICSS). IEEE, 2012. http://dx.doi.org/10.1109/hicss.2012.521.
Full text