Journal articles on the topic 'Hijacking and Terror Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hijacking and Terror Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Supardi, Achmad. "Indonesian Muslims and Christians Positions During a Terror Attack: Analysis on Facebook Posts #prayforsurabaya." Jurnal Komunikasi: Malaysian Journal of Communication 38, no. 1 (2022): 74–98. http://dx.doi.org/10.17576/jkmjc-2022-3801-05.
Full textZubrzycki, Waldemar. "The Security of the Republic of Poland’s Maritime Areas and the Polish Coast in the Context of Terrorist Attacks." Internal Security 9, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7465.
Full textHossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.
Full textCherckesova, Larissa, Elena Revyakina, Evgeniya Roshchina, and Vitaliy Porksheyan. "The development of countermeasures against session hijacking." E3S Web of Conferences 531 (2024): 03019. http://dx.doi.org/10.1051/e3sconf/202453103019.
Full textKummari Teja and Dr.K.Pavan Kumar. "EXPOSING WEB VULNERABILITIES: A STUDY OF MAN-IN-THE-MIDDLE AND SESSION HIJACKING ATTACKS." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 747–55. https://doi.org/10.62643/ijerst.2025.v21.i2.pp747-755.
Full textZhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.
Full textKumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.
Full textShaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.
Full textKansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.
Full textRai, Tage S. "Predicting future terror attacks." Science 366, no. 6467 (2019): 834.7–835. http://dx.doi.org/10.1126/science.366.6467.834-g.
Full textSchlamp, Johann, Ralph Holz, Quentin Jacquemart, Georg Carle, and Ernst W. Biersack. "HEAP: Reliable Assessment of BGP Hijacking Attacks." IEEE Journal on Selected Areas in Communications 34, no. 6 (2016): 1849–61. http://dx.doi.org/10.1109/jsac.2016.2558978.
Full textMirzabeigi, Abdollah, Ali Kazemy, Mehdi Ramezani, and Seyed Mohammad Azimi. "Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems." International Transactions on Electrical Energy Systems 2023 (May 19, 2023): 1–15. http://dx.doi.org/10.1155/2023/6622346.
Full textR, Santhakumar, Keerthana R, Madhubala S, and Dr Thamizh Selvam D. "Session Hijacking in Cybersecurity: Threats, Prevention Strategies, and Future Directions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft029.
Full textEriksson Krutrök, Moa, and Simon Lindgren. "Continued Contexts of Terror: Analyzing Temporal Patterns of Hashtag Co-Occurrence as Discursive Articulations." Social Media + Society 4, no. 4 (2018): 205630511881364. http://dx.doi.org/10.1177/2056305118813649.
Full textFaria, João Ricardo, and Daniel Arce. "The Path of Terror Attacks." Games 12, no. 2 (2021): 35. http://dx.doi.org/10.3390/g12020035.
Full textMogensen, Kirsten. "Television journalism during terror attacks." Media, War & Conflict 1, no. 1 (2008): 31–49. http://dx.doi.org/10.1177/1750635207087624.
Full textGoldman, Ogen. "The Globalization of Terror Attacks." Terrorism and Political Violence 23, no. 1 (2010): 31–59. http://dx.doi.org/10.1080/09546553.2010.514776.
Full textHasso, Tim, Matthias Pelster, and Bastian Breitmayer. "Terror attacks and individual investor behavior: Evidence from the 2015–2017 European terror attacks." Journal of Behavioral and Experimental Finance 28 (December 2020): 100397. http://dx.doi.org/10.1016/j.jbef.2020.100397.
Full textBaccini, Leonardo, Abel Brodeur, Sean Nossek, and Eran Shor. "Terrorism and Voting Behavior: Evidence from the United States." Research & Politics 8, no. 1 (2021): 205316802098733. http://dx.doi.org/10.1177/2053168020987333.
Full textHoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms in the use of internet." Global Journal of Computer Sciences: Theory and Research 12, no. 1 (2022): 23–31. http://dx.doi.org/10.18844/gjcs.v12i1.7449.
Full textHe, Xing, Jiahao Chen, Yuwen Pu, et al. "CAMH: Advancing Model Hijacking Attack in Machine Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 16 (2025): 17141–49. https://doi.org/10.1609/aaai.v39i16.33884.
Full textSusanto, Andy, and Wahyu Kusuma Raharja. "Simulation and Analysis of Network Security Performance Using Attack Vector Method for Public Wifi Communication." IJICS (International Journal of Informatics and Computer Science) 5, no. 1 (2021): 7. http://dx.doi.org/10.30865/ijics.v5i1.2764.
Full textBugliesi, Michele, Stefano Calzavara, Riccardo Focardi, and Wilayat Khan. "CookiExt: Patching the browser against session hijacking attacks." Journal of Computer Security 23, no. 4 (2015): 509–37. http://dx.doi.org/10.3233/jcs-150529.
Full textRagazzi, Francesco. "The Paris attacks: magical thinking & hijacking trust." Critical Studies on Security 4, no. 2 (2016): 225–28. http://dx.doi.org/10.1080/21624887.2016.1216051.
Full textSahoo, Subham, Jimmy Chih-Hsien Peng, Sukumar Mishra, and Tomislav Dragicevic. "Distributed Screening of Hijacking Attacks in DC Microgrids." IEEE Transactions on Power Electronics 35, no. 7 (2020): 7574–82. http://dx.doi.org/10.1109/tpel.2019.2957071.
Full textBouks, Barak. "Israel’s Strategic Threats and Challenges." Security science journal 4, no. 1 (2023): 119–33. http://dx.doi.org/10.37458/ssj.4.1.8.
Full textAbugharsa, Afif, Bashir Elkharraz, and Eltohami Elghoul. "BGP Prefix Hijacking Attack and its Prevention Methods." International Journal of Advanced Networking and Applications 16, no. 02 (2024): 6328–31. http://dx.doi.org/10.35444/ijana.2024.16203.
Full textOlsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.
Full textAli, Raden Muhammad, and Aria Candramukti. "Terrorism as reflected in Joseph Conrad’s the secret agent: A sociological approach." UAD TEFL International Conference 2 (January 17, 2021): 62. http://dx.doi.org/10.12928/utic.v2.5737.2019.
Full textHoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms." Global Journal of Information Technology: Emerging Technologies 12, no. 1 (2022): 77–85. http://dx.doi.org/10.18844/gjit.v12i1.7749.
Full textGoldman, Ogen S., and Michal Neubauer-Shani. "Does International Tourism Affect Transnational Terrorism?" Journal of Travel Research 56, no. 4 (2016): 451–67. http://dx.doi.org/10.1177/0047287516649059.
Full textBrodeur, Abel. "The Effect of Terrorism on Employment and Consumer Sentiment: Evidence from Successful and Failed Terror Attacks." American Economic Journal: Applied Economics 10, no. 4 (2018): 246–82. http://dx.doi.org/10.1257/app.20160556.
Full textOuellet, Marie, and Martin Bouchard. "Terror on Repeat." International Criminal Justice Review 26, no. 4 (2016): 316–36. http://dx.doi.org/10.1177/1057567716666642.
Full textРазинкин, К. А., А. А. Науменко, А. И. Мордовин, О. Н. Чопоров, and Ю. В. Макаров. "IMPROVING THE SECURITY OF TELECOMMUNICATION NETWORKS BUILT ON THE BASIS OF THE BGP PROTOCOL: ALGORITHMIC SUPPORT FOR THE ASSESSMENT AND REGULATION OF IMPLEMENTATION RISKS IP HIJACKING ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 1(-) (2023): 61–72. http://dx.doi.org/10.36622/vstu.2023.26.1.008.
Full textLI, Kai, Yongyu GUO, and Shenlong YANG. "Public risk perception of terror attacks." Advances in Psychological Science 25, no. 2 (2017): 358. http://dx.doi.org/10.3724/sp.j.1042.2017.00358.
Full textArehart-Treichel, Joan. "Driving Accidents Up After Terror Attacks." Psychiatric News 39, no. 19 (2004): 22. http://dx.doi.org/10.1176/pn.39.19.0390022b.
Full textFeinstein, Jonathan S., and Edward H. Kaplan. "Counterterror intelligence operations and terror attacks." Public Choice 149, no. 3-4 (2011): 281–95. http://dx.doi.org/10.1007/s11127-011-9842-7.
Full textGonciarz, Agnieszka, and Robert Pich. "INCREASED RISK OF CHEMICAL TERROR ATTACKS." Zeszyty Naukowe SGSP 2, no. 88 (2024): 109–26. http://dx.doi.org/10.5604/01.3001.0054.3831.
Full textCole, L. "(A103) Understanding Terror Medicine." Prehospital and Disaster Medicine 26, S1 (2011): s28. http://dx.doi.org/10.1017/s1049023x11001051.
Full textJati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries." Simulacra 4, no. 2 (2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.
Full textCui, Xi, and Eric Rothenbuhler. "Communicating Terror: Mediatization and Ritualization." Television & New Media 19, no. 2 (2017): 155–62. http://dx.doi.org/10.1177/1527476417715685.
Full textWaters, Andrew J., W. Gerrod Parrott, Karin Mogg, Brendan P. Bradley, Mary C. Fuller, and Joan M. Wertz. "Processing Bias for Terror-Related Stimuli and September 11Th-Related Distress in College Students." Psychological Reports 101, no. 3 (2007): 787–95. http://dx.doi.org/10.2466/pr0.101.3.787-795.
Full textMorton, Brian. "Terror and the Ethics of Resistance." Dissent 70, no. 4 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a918676.
Full textMorton, Brian. "Terror and the Ethics of Resistance." Dissent 71, no. 1 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a929088.
Full textGao, Zhen, Fucai Chen, Yawen Wang, Weizhen He, Xin Shi, and Genlin Xie. "MVPN: A Defense Architecture against VPN Traffic Hijacking Based on MTD." Electronics 12, no. 3 (2023): 711. http://dx.doi.org/10.3390/electronics12030711.
Full textKhraban, Ihor, and Serhii Yevtukh. "STATE TERROR OF RUSSIA AGAINST UKRAINE." STATE SECURITY 1, no. 3 (2024): 118–24. http://dx.doi.org/10.33405/2786-8613/2024/1/3/309968.
Full textTew, Joanna, and Richard Ward. "Paramedics at risk? How responding to a terror attack affects mental wellbeing." Journal of Paramedic Practice 16, no. 10 (2024): 416–25. http://dx.doi.org/10.12968/jpar.2023.0061.
Full textLuhmann, Maike, and Wiebke Bleidorn. "Changes in Affect, Cognition, and Perceived Behavioral Changes Among Vicarious Victims of the Paris Terrorist Attacks of November 13, 2015." Social Psychological and Personality Science 9, no. 2 (2017): 214–22. http://dx.doi.org/10.1177/1948550617732818.
Full textTrikalinou, Anna, and Nikolaos G. Bourbakis. "A Survey on Protection Methodologies Against Control Flow Hijacking Attacks." IEEE Potentials 33, no. 6 (2014): 21–26. http://dx.doi.org/10.1109/mpot.2014.2344211.
Full textOlsson, Filip. "Implicit Terror: A Natural Experiment on How Terror Attacks Affect Implicit Bias." Sociological Science 11 (2024): 379–412. http://dx.doi.org/10.15195/v11.a14.
Full text