Academic literature on the topic 'Hijacking and Terror Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hijacking and Terror Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hijacking and Terror Attacks"
Supardi, Achmad. "Indonesian Muslims and Christians Positions During a Terror Attack: Analysis on Facebook Posts #prayforsurabaya." Jurnal Komunikasi: Malaysian Journal of Communication 38, no. 1 (2022): 74–98. http://dx.doi.org/10.17576/jkmjc-2022-3801-05.
Full textZubrzycki, Waldemar. "The Security of the Republic of Poland’s Maritime Areas and the Polish Coast in the Context of Terrorist Attacks." Internal Security 9, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7465.
Full textHossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.
Full textCherckesova, Larissa, Elena Revyakina, Evgeniya Roshchina, and Vitaliy Porksheyan. "The development of countermeasures against session hijacking." E3S Web of Conferences 531 (2024): 03019. http://dx.doi.org/10.1051/e3sconf/202453103019.
Full textKummari Teja and Dr.K.Pavan Kumar. "EXPOSING WEB VULNERABILITIES: A STUDY OF MAN-IN-THE-MIDDLE AND SESSION HIJACKING ATTACKS." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 747–55. https://doi.org/10.62643/ijerst.2025.v21.i2.pp747-755.
Full textZhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.
Full textKumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.
Full textShaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.
Full textKansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.
Full textRai, Tage S. "Predicting future terror attacks." Science 366, no. 6467 (2019): 834.7–835. http://dx.doi.org/10.1126/science.366.6467.834-g.
Full textDissertations / Theses on the topic "Hijacking and Terror Attacks"
Onder, Hulusi. "Session hijacking attacks in wireless local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOnder.pdf.
Full textShibli, Adania. "Visual terror : a study of the visual compositions of the 9/11 attacks and major attacks in the 'War on Terror' by British and French television networks." Thesis, University of East London, 2009. http://roar.uel.ac.uk/3146/.
Full textLanier, Cathy L. "Preventing terror attacks in the Homeland : a new mission for state and local police." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FLanier.pdf.
Full textBotha, Johannes Gideon. "Pastorale versorging van getraumatiseerde slagoffers van geweldmisdaad / Johannes Gideon Botha." Thesis, North-West University, 2004. http://hdl.handle.net/10394/480.
Full textWoods, Joshua. "Imagining terror the people, the press and politics /." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textRehman, Abdul. "Impact of drone attacks in Pakistan and the war on terror: A consideration of the effects of drone attacks in Pakistan and whether they are helping or not to win the war on terror!" Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22238.
Full textCoultas, Bryan T. "Crowdsourcing intelligence to combat terrorism: harnessing bottom-up collection to prevent lone-wolf terror attacks." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45174.
Full textManxhuka, Bardh, and Max Hägglund. "The terror attacks of 2015 in Paris and their effect on Perceived Discrimination : The Swedish experience." Thesis, Linnéuniversitetet, Institutionen för nationalekonomi och statistik (NS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105227.
Full textRogers, Paul F. "Into the Long War." Pluto Press, 2006. http://hdl.handle.net/10454/3702.
Full textMor, Nuriel Shalom. "Impact of Sense of Community, Ideology, and Religiosity on Post Traumatic Stress Disorder Symptomatology From Chronic Terror Attacks." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2856.
Full textBooks on the topic "Hijacking and Terror Attacks"
Amis, Martin. The second plane: September 11 : terror and boredom. Alfred A. Knopf, 2008.
Find full textAmis, Martin. The second plane: September 11 : terror and boredom. A.A. Knopf Canada, 2008.
Find full textErgun, Capan, ed. An Islamic perspective: Terror and suicide attacks. 2nd ed. The Light, 2004.
Find full textBook chapters on the topic "Hijacking and Terror Attacks"
Johns, Martin. "Session Hijacking Attacks." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_661.
Full textJohns, Martin. "Session Hijacking Attacks." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_661.
Full textBarbar, Mohamad, Yulei Sui, Hongyu Zhang, Shiping Chen, and Jingling Xue. "Live Path CFI Against Control Flow Hijacking Attacks." In Information Security and Privacy. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3_45.
Full textVogelsang, Terry. "LLM Controls Execution Flow Hijacking." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_10.
Full textHetzer, Wolfgang. "Terrorist Attacks: Criminal Prosecution or National Defence?" In A War on Terror? Springer New York, 2009. http://dx.doi.org/10.1007/978-0-387-89291-7_10.
Full textTripathy, Somanath, and Praveen Kumar. "CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy." In Network and System Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_7.
Full textWin, Su Su, and Mie Mie Su Thwin. "Handling the Hypervisor Hijacking Attacks on Virtual Cloud Environment." In Advances in Biometrics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30436-2_2.
Full textCai, Hang, and Krishna K. Venkatasubramanian. "Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors." In Mission-Oriented Sensor Networks and Systems: Art and Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91146-5_20.
Full textSteinhausler, Friedrich. "EU Efforts in Managing CBRN Terror Attacks." In NATO Science for Peace and Security Series B: Physics and Biophysics. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5_11.
Full textShachar, Ayelet. "7. The Search for Equal Membership in the Age of Terror." In After the Paris Attacks, edited by Edward M. Iacobucci and Stephen J. Toope. University of Toronto Press, 2015. http://dx.doi.org/10.3138/9781442630024-008.
Full textConference papers on the topic "Hijacking and Terror Attacks"
Yang, Zijiao, Xiangxi Shi, Eric Slyman, and Stefan Lee. "Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks." In 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2025. https://doi.org/10.1109/wacv61041.2025.00594.
Full textApostolaki, Maria, Aviv Zohar, and Laurent Vanbever. "Hijacking Bitcoin: Routing Attacks on Cryptocurrencies." In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. http://dx.doi.org/10.1109/sp.2017.29.
Full textSchlamp, Johann, Georg Carle, and Ernst W. Biersack. "How to prevent AS hijacking attacks." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2413247.2413265.
Full textMuller, Raymond, Yanmao Man, Z. Berkay Celik, Ming Li, and Ryan Gerdes. "Physical Hijacking Attacks against Object Trackers." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3548606.3559390.
Full textToure, Ibrahim, and Aryya Gangopadhyay. "Analyzing terror attacks using latent semantic indexing." In 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2013. http://dx.doi.org/10.1109/ths.2013.6699024.
Full textCremers, Cas, Kasper B. Rasmussen, Benedikt Schmidt, and Srdjan Capkun. "Distance Hijacking Attacks on Distance Bounding Protocols." In 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change. IEEE, 2012. http://dx.doi.org/10.1109/sp.2012.17.
Full textWu, Min-Hao, Fu-Hau Hsu, Ting-Cheng Chang, and Liang Hsuan Lin. "Preventing Activity Hijacking Attacks in Android APP." In 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS). IEEE, 2019. http://dx.doi.org/10.1109/ecbios.2019.8807833.
Full textKrasnyánszki, Brúnó, Sándor Tihamér Brassai, and András Németh. "UAV weaknesses against deauthentication based hijacking attacks." In 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2024. http://dx.doi.org/10.1109/sami60510.2024.10432859.
Full textCheng, Kefei, Meng Gao, and Ruijie Guo. "Analysis and Research on HTTPS Hijacking Attacks." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.187.
Full textHochdorf, Zipi, and Irit Gill-Lev. "Empowering Couples Victimized by Terror Attacks in Israel." In The International Conference on Research in Psychology. Acavent, 2019. http://dx.doi.org/10.33422/icrpconf.2019.03.133.
Full textReports on the topic "Hijacking and Terror Attacks"
Водолєєва, І. С., А. О. Лазаренко та В. М. Соловйов. Дослідження стійкості мультиплексних мереж під час кризових явищ. Видавець Вовчок О.Ю., 2017. http://dx.doi.org/10.31812/0564/1259.
Full textCastañeda, A. Reporting on terror. Analysis of the use of infographics in news on the Barcelona terror attacks of 17 August, 2017, by print newspapers from the Basque Autonomous Community. Revista Latina de Comunicación Social, 2018. http://dx.doi.org/10.4185/rlcs-2018-1275en.
Full textKelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full text