To see the other types of publications on this topic, follow the link: Hijacking and Terror Attacks.

Journal articles on the topic 'Hijacking and Terror Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hijacking and Terror Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Supardi, Achmad. "Indonesian Muslims and Christians Positions During a Terror Attack: Analysis on Facebook Posts #prayforsurabaya." Jurnal Komunikasi: Malaysian Journal of Communication 38, no. 1 (2022): 74–98. http://dx.doi.org/10.17576/jkmjc-2022-3801-05.

Full text
Abstract:
Indonesians and the world were shocked by a series of terror attacks in Surabaya, East Java, 13-14 May 2018. As predicted, Indonesians went online to share their mourning and condemnation of the attacks. Facebook posts with the hashtag #prayforsurabaya are places for online users to express their thoughts. This research employed content analysis and Leximancer’s thematic analysis to investigate three research questions: the dominant themes among the Facebook users’ responses as shown in #prayforsurabaya, how Facebook users position the terror attacks and religious identity within the Indonesia
APA, Harvard, Vancouver, ISO, and other styles
2

Zubrzycki, Waldemar. "The Security of the Republic of Poland’s Maritime Areas and the Polish Coast in the Context of Terrorist Attacks." Internal Security 9, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7465.

Full text
Abstract:
The threat of terrorist attack posed to the Republic of Poland is of a potential character and possible targets for such attacks include also objects located in the area of the Baltic Sea. Terrorist activities may be carried out in order to destroy or render vessels such as passenger, cargo and the navy ships, hydraulic structures and port facilities inoperative, as well as to take control over them. A terrorist attack may also aim at causing an environmental disaster. Direct targets of terrorist attacks may be passengers or crew members, but attempts of cargo seizure may also be expected. Pot
APA, Harvard, Vancouver, ISO, and other styles
3

Hossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.

Full text
Abstract:
Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most dangerous attack. There are a number of measures proposed to prevent SSL tripping-based session hijacking attacks. However, existing surveys did not summarize all the preventive measures in a comprehensive manner (without much illustration and categorization). The objective of this paper is to provide a comprehensive survey of existing measures
APA, Harvard, Vancouver, ISO, and other styles
4

Cherckesova, Larissa, Elena Revyakina, Evgeniya Roshchina, and Vitaliy Porksheyan. "The development of countermeasures against session hijacking." E3S Web of Conferences 531 (2024): 03019. http://dx.doi.org/10.1051/e3sconf/202453103019.

Full text
Abstract:
This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and sites much vulnerability, which developers often do not pay attention to, are occurred. The paper presents a practical implementation of one of the attacks (MITM), and also proposes methods to counteract and protect against most types of attacks. The main purpose of this paper is to study Session Hijacking attacks and to propose countermeasures against them and existing vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
5

Kummari Teja and Dr.K.Pavan Kumar. "EXPOSING WEB VULNERABILITIES: A STUDY OF MAN-IN-THE-MIDDLE AND SESSION HIJACKING ATTACKS." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 747–55. https://doi.org/10.62643/ijerst.2025.v21.i2.pp747-755.

Full text
Abstract:
These days, data is king, thanks to the Internet. This data is very susceptible to attackers because of the seemingly open access Internet service. Attacks happening on the web may compromise users' data privacy. Attacks that occur on the Internet, including Man-In-The-Middle and session hijacking, are the subject of this SLR. Using an appropriate research selection approach, it examines around 30 studies spanning from 2016 to 2023. There are three research questions that make up this SLR. The first one gives an overview of recent tendencies in research on session hijacking and man-in-the-midd
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.

Full text
Abstract:
The inter-domain routing system based on the BGP protocol is a kernel establishment in the Internet. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation between prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three tiers based on the power-law and commercial relations of autonomous systems. The relation between network topology
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.

Full text
Abstract:
Session Hijacking is an attack which is basically used to gain the unauthorized access between an authorized session connections. This is usually done to attack the social network website and banking websites in order to gain the access over the valid session as well as over the website too. These attacks are one of the commonly experienced cyber threats in today’s network. Most of the websites and networks are vulnerable from this kind of attack. For providing the protection I have given the multiple ways to protecting from this session hijacking attack. I have especially focused on one of th
APA, Harvard, Vancouver, ISO, and other styles
8

Shaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.

Full text
Abstract:
Cybersecurity threats such as Man-in-the-Middle (MITM) attacks and Session Hijacking (SH) account for over 35% of web-based cyber intrusions, causing financial losses exceeding $6 billion annually. Despite extensive research on these attacks independently, a unified analysis remains underexplored. This study bridges that gap by conducting a Systematic Literature Review (SLR) on over 150 research papers from IEEE, ACM, and ScienceDirect, comparing MITM and SH in terms of attack frequency, methodologies, vulnerabilities, and countermeasures.<strong> </strong>Our findings indicate that MITM attac
APA, Harvard, Vancouver, ISO, and other styles
9

Kansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.

Full text
Abstract:
WhatsApp provides a fertile ground for the large-scale dissemination of information, particularly in countries like Brazil and India. Given its increasing popularity and use for political discussions, it is paramount to ensure that WhatsApp groups are adequately protected from attackers who aim to disrupt the activity of WhatsApp groups. Motivated by this, in this work, we characterize two types of attacks that may disrupt WhatsApp groups. We look into the flooding attack, where an attacker shares a large number of usually duplicate messages within a short period, and the hijacking attack, whe
APA, Harvard, Vancouver, ISO, and other styles
10

Rai, Tage S. "Predicting future terror attacks." Science 366, no. 6467 (2019): 834.7–835. http://dx.doi.org/10.1126/science.366.6467.834-g.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Schlamp, Johann, Ralph Holz, Quentin Jacquemart, Georg Carle, and Ernst W. Biersack. "HEAP: Reliable Assessment of BGP Hijacking Attacks." IEEE Journal on Selected Areas in Communications 34, no. 6 (2016): 1849–61. http://dx.doi.org/10.1109/jsac.2016.2558978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mirzabeigi, Abdollah, Ali Kazemy, Mehdi Ramezani, and Seyed Mohammad Azimi. "Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems." International Transactions on Electrical Energy Systems 2023 (May 19, 2023): 1–15. http://dx.doi.org/10.1155/2023/6622346.

Full text
Abstract:
Today, eliminating the effects of cyber-attacks is essential for stability and synchronization in island microgrids. In this article, island microgrid has been investigated from the view of multiagent systems and graph theory. This study uses the cooperative distributed hierarchical controller in two primary and secondary layers to control the hijacking cyber-attack in the islanded microgrid. Hijacking attacks’ impact on the control of distributed generators (DGs) has been mathematically formulated, and a suitable controller has been designed. Then, global stability and simultaneous synchroniz
APA, Harvard, Vancouver, ISO, and other styles
13

R, Santhakumar, Keerthana R, Madhubala S, and Dr Thamizh Selvam D. "Session Hijacking in Cybersecurity: Threats, Prevention Strategies, and Future Directions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft029.

Full text
Abstract:
Session hijacking poses a grim threat to cybersecurity, for the attackers take undue advantage of an active session to access protected user accounts and confidential information without consent. This is a direct attack on the session tokens, usually performed by packet sniffing, XSS, or MITM. Web session protection is vital with the growing trend of digital interactions to avert identification theft, financial scamming, and data breaches. This paper helps analyse methods of session hijacking, methods of prevention, and the building of better security practices such as encryption, token valida
APA, Harvard, Vancouver, ISO, and other styles
14

Eriksson Krutrök, Moa, and Simon Lindgren. "Continued Contexts of Terror: Analyzing Temporal Patterns of Hashtag Co-Occurrence as Discursive Articulations." Social Media + Society 4, no. 4 (2018): 205630511881364. http://dx.doi.org/10.1177/2056305118813649.

Full text
Abstract:
This study looks at how terror attacks are rendered discursively meaningful on social media through the concurrent use and reiteration of terror hashtags, which were created following previous incidents of terror. The article focuses on 12 terror attacks in Europe in 2015-2017 and their relating hashtags on Twitter, to see how various combinations of these were reused and co-articulated in tweets posted in relation to subsequent attacks. Through social network analysis of co-occurring hashtags in about 3 million tweets, in combination with close readings of a smaller sample, this study aims to
APA, Harvard, Vancouver, ISO, and other styles
15

Faria, João Ricardo, and Daniel Arce. "The Path of Terror Attacks." Games 12, no. 2 (2021): 35. http://dx.doi.org/10.3390/g12020035.

Full text
Abstract:
This paper derives a dynamic path of ongoing terror attacks as a function of terrorists’ capacity and a target government’s counterterror capacity. The analysis provides several novel insights and characterizations. First, the effect of counterterror policy is limited. Second, proactive counterterror policy affects the depreciation (fatigue) of terrorists’ capacity, and defensive counterterror policy limits the worst-case scenario. Third, fluctuations in the time path of attacks are a function of terrorists’ time preferences and adjustment costs of changing tactics, which are policy invariant.
APA, Harvard, Vancouver, ISO, and other styles
16

Mogensen, Kirsten. "Television journalism during terror attacks." Media, War & Conflict 1, no. 1 (2008): 31–49. http://dx.doi.org/10.1177/1750635207087624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Goldman, Ogen. "The Globalization of Terror Attacks." Terrorism and Political Violence 23, no. 1 (2010): 31–59. http://dx.doi.org/10.1080/09546553.2010.514776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hasso, Tim, Matthias Pelster, and Bastian Breitmayer. "Terror attacks and individual investor behavior: Evidence from the 2015–2017 European terror attacks." Journal of Behavioral and Experimental Finance 28 (December 2020): 100397. http://dx.doi.org/10.1016/j.jbef.2020.100397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Baccini, Leonardo, Abel Brodeur, Sean Nossek, and Eran Shor. "Terrorism and Voting Behavior: Evidence from the United States." Research & Politics 8, no. 1 (2021): 205316802098733. http://dx.doi.org/10.1177/2053168020987333.

Full text
Abstract:
This article examines the impact of terrorism on voting behavior in the United States. We rely on an exhaustive list of terror attacks over the period 1970–2016 and exploit the inherent randomness of the success or failure of terror attacks to identify the political impacts of terrorism. We first confirm that the success of terror attacks is plausibly random by showing that it is orthogonal to potential confounders. We then show that on average successful attacks have no effect on presidential and non-presidential elections. As a benchmark, we also rely on a more naïve identification strategy
APA, Harvard, Vancouver, ISO, and other styles
20

Hoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms in the use of internet." Global Journal of Computer Sciences: Theory and Research 12, no. 1 (2022): 23–31. http://dx.doi.org/10.18844/gjcs.v12i1.7449.

Full text
Abstract:
The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. This paper aims to present vulnerability with the respective control mechanisms and to propose an approach for avoiding hijacking threats by using one-time cookies along with other preventi
APA, Harvard, Vancouver, ISO, and other styles
21

He, Xing, Jiahao Chen, Yuwen Pu, et al. "CAMH: Advancing Model Hijacking Attack in Machine Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 16 (2025): 17141–49. https://doi.org/10.1609/aaai.v39i16.33884.

Full text
Abstract:
In the burgeoning domain of machine learning, the reliance on third-party services for model training and the adoption of pre-trained models have surged. However, this reliance introduces vulnerabilities to model hijacking attacks, where adversaries manipulate models to perform unintended tasks, leading to significant security and ethical concerns, like turning an ordinary image classifier into a tool for detecting faces in pornographic content, all without the model owner’s knowledge. This paper introduces Category-Agnostic Model Hijacking (CAMH), a novel model hijacking attack method capable
APA, Harvard, Vancouver, ISO, and other styles
22

Susanto, Andy, and Wahyu Kusuma Raharja. "Simulation and Analysis of Network Security Performance Using Attack Vector Method for Public Wifi Communication." IJICS (International Journal of Informatics and Computer Science) 5, no. 1 (2021): 7. http://dx.doi.org/10.30865/ijics.v5i1.2764.

Full text
Abstract:
The use of wifi networks in public spaces has a risk of robbery of user access data in cyberspace, such as banking transactions, social media and other online access. The threat of Man In The Middle Attack (MITM) attacks is carried out on public wifi networks to gain access to user information by illegal means. The attack vector simulation process is carried out on the site access exampleriset.com/dvwa/login.php. ARP Poisoning attack with Ettercap device performs interception and manipulation which provides 08: 00: 27: 25: 22: 99 MAC address information to the target. Session Hijacking attack
APA, Harvard, Vancouver, ISO, and other styles
23

Bugliesi, Michele, Stefano Calzavara, Riccardo Focardi, and Wilayat Khan. "CookiExt: Patching the browser against session hijacking attacks." Journal of Computer Security 23, no. 4 (2015): 509–37. http://dx.doi.org/10.3233/jcs-150529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ragazzi, Francesco. "The Paris attacks: magical thinking & hijacking trust." Critical Studies on Security 4, no. 2 (2016): 225–28. http://dx.doi.org/10.1080/21624887.2016.1216051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sahoo, Subham, Jimmy Chih-Hsien Peng, Sukumar Mishra, and Tomislav Dragicevic. "Distributed Screening of Hijacking Attacks in DC Microgrids." IEEE Transactions on Power Electronics 35, no. 7 (2020): 7574–82. http://dx.doi.org/10.1109/tpel.2019.2957071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Bouks, Barak. "Israel’s Strategic Threats and Challenges." Security science journal 4, no. 1 (2023): 119–33. http://dx.doi.org/10.37458/ssj.4.1.8.

Full text
Abstract:
Israel is characterized as a Jewish democratic state. Its location in the Middle-East is a driver of significant unique security threats and challenges for its citizens. Albeit having peace treaties with Egypt, Jordan and the PA (Palestinian Authority), culminating with the Abraham accords in the regional arena, it is still surrounded by hostile countries such as Syria and Lebanon vis-à-vis terror groups, culminating with Iran in the broader arena, which can be defined as a patron of terror to all of the above. Through a discussion of the following main hypotheses, this article will discuss ke
APA, Harvard, Vancouver, ISO, and other styles
27

Abugharsa, Afif, Bashir Elkharraz, and Eltohami Elghoul. "BGP Prefix Hijacking Attack and its Prevention Methods." International Journal of Advanced Networking and Applications 16, no. 02 (2024): 6328–31. http://dx.doi.org/10.35444/ijana.2024.16203.

Full text
Abstract:
The Border Gateway Protocol (BGP) is an Internet routing protocol that is widely used. With the introduction and implementation of various security features to prevent attacks and alleviate routing instabilities, BGP remains vulnerable due to the lack of integrity and authentication of BGP messages. BGP operations are highly dependent on its security, and attacks against BGP have a detrimental effect on packet forwarding. Given the importance of BGP security, Two techniques to improve BGP session security have been studied in this project to improve secure Internet routing, this project descri
APA, Harvard, Vancouver, ISO, and other styles
28

Olsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.

Full text
Abstract:
&#x0D; &#x0D; &#x0D; In essence, terror attacks are communicative events. From the perspective of political leaders, the challenge is to make sense of the event by explaining what has happened, who is behind the attack, what is the most appropriate response, and how to move forward. Adding to the difficulties is the fact that leaders have to communicate in a highly mediated environment. In this article, we explore the Norwegian government’s crisis communication in the terrorist attacks in Oslo and on the island of Utöya on July 22, 2011. We do so by applying a model of crisis framing. Accordi
APA, Harvard, Vancouver, ISO, and other styles
29

Ali, Raden Muhammad, and Aria Candramukti. "Terrorism as reflected in Joseph Conrad’s the secret agent: A sociological approach." UAD TEFL International Conference 2 (January 17, 2021): 62. http://dx.doi.org/10.12928/utic.v2.5737.2019.

Full text
Abstract:
Nowadays, there are so many people talking and discussing what we called terrorism. However, most of us still do not have sufficient insight related to the kinds, motivations, and purposes of terror attacks. This paper is aimed to find the types of terror attack as reflected in The Secret Agent by Joseph Conrad and to show the causes of terror as reflected in the novel. The researchers apply descriptive qualitative as the method of analyzing the data. Some of the research findings are as follows. First, the terror attacks found in the novel are physical and mental. Second, the causes of terror
APA, Harvard, Vancouver, ISO, and other styles
30

Hoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms." Global Journal of Information Technology: Emerging Technologies 12, no. 1 (2022): 77–85. http://dx.doi.org/10.18844/gjit.v12i1.7749.

Full text
Abstract:
The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. Based on recent OWASP guidelines, this kind of attack is indeed one of the most frequent attacks that happens lately. Session hijacking happens as a result of poorly designed websites and a
APA, Harvard, Vancouver, ISO, and other styles
31

Goldman, Ogen S., and Michal Neubauer-Shani. "Does International Tourism Affect Transnational Terrorism?" Journal of Travel Research 56, no. 4 (2016): 451–67. http://dx.doi.org/10.1177/0047287516649059.

Full text
Abstract:
Studies focusing on the relationship between transnational terrorism and tourism examine the effect of terror on tourism, while this study looks at a different question: does international tourism affect transnational terrorism? We hypothesized that the higher the number of international tourist arrivals to a country, the higher the number of terror attacks, and examined this effect from four distinct aspects: perpetration by foreign attackers against local victims, perpetration by local attackers against foreign victims, perpetration by foreign attackers against foreign victims, and perpetrat
APA, Harvard, Vancouver, ISO, and other styles
32

Brodeur, Abel. "The Effect of Terrorism on Employment and Consumer Sentiment: Evidence from Successful and Failed Terror Attacks." American Economic Journal: Applied Economics 10, no. 4 (2018): 246–82. http://dx.doi.org/10.1257/app.20160556.

Full text
Abstract:
This paper examines the economic consequences of terror attacks by exploiting the inherent randomness in the success or failure of terror attacks. The findings suggest that successful attacks, in comparison to failed attacks, reduce the number of jobs and total earnings in targeted counties by approximately 2 percent in the years following the attack. Analyzing the channels, I find that successful attacks affect, in particular, specific industries such as housing. Last, I show that successful attacks receive more media coverage and increase levels of consumer pessimism in terms of business con
APA, Harvard, Vancouver, ISO, and other styles
33

Ouellet, Marie, and Martin Bouchard. "Terror on Repeat." International Criminal Justice Review 26, no. 4 (2016): 316–36. http://dx.doi.org/10.1177/1057567716666642.

Full text
Abstract:
Criminal and terrorist organizations often depend on repeat offenders to maintain the group’s longevity, especially after repeated law enforcement interventions. Yet, little is known about the offenders who perpetrate multiple incidents on behalf of a group. Relying on data for 118 terrorist offenders involved across eight attacks from 2000 to 2005, this study examines the correlates of repeat offending within a terrorist organization. Our main predictor, criminal social capital, is measured by the number and structure of co-offending ties. Poisson regression results demonstrate that offenders
APA, Harvard, Vancouver, ISO, and other styles
34

Разинкин, К. А., А. А. Науменко, А. И. Мордовин, О. Н. Чопоров, and Ю. В. Макаров. "IMPROVING THE SECURITY OF TELECOMMUNICATION NETWORKS BUILT ON THE BASIS OF THE BGP PROTOCOL: ALGORITHMIC SUPPORT FOR THE ASSESSMENT AND REGULATION OF IMPLEMENTATION RISKS IP HIJACKING ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 1(-) (2023): 61–72. http://dx.doi.org/10.36622/vstu.2023.26.1.008.

Full text
Abstract:
В статье предложена методика повышения защищенности телекоммуникационных сетей, построенных на базе протокола BGP от атаки IP-hijacking, направленной на нарушение конфиденциальности и доступности перехваченной информации автономных систем. Ключевой составляющей данной методики является алгоритм оценки и регулирования рисков успешной реализации атаки IP-hijacking на телекоммуникационную сеть. В работе представлены особенности топологии телекоммуникационной сети, построенной на базе протокола BGP, и специфика атаки IP-hijacking, типовой сценарий реализации атаки, включающий описание уязвимостей
APA, Harvard, Vancouver, ISO, and other styles
35

LI, Kai, Yongyu GUO, and Shenlong YANG. "Public risk perception of terror attacks." Advances in Psychological Science 25, no. 2 (2017): 358. http://dx.doi.org/10.3724/sp.j.1042.2017.00358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Arehart-Treichel, Joan. "Driving Accidents Up After Terror Attacks." Psychiatric News 39, no. 19 (2004): 22. http://dx.doi.org/10.1176/pn.39.19.0390022b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Feinstein, Jonathan S., and Edward H. Kaplan. "Counterterror intelligence operations and terror attacks." Public Choice 149, no. 3-4 (2011): 281–95. http://dx.doi.org/10.1007/s11127-011-9842-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gonciarz, Agnieszka, and Robert Pich. "INCREASED RISK OF CHEMICAL TERROR ATTACKS." Zeszyty Naukowe SGSP 2, no. 88 (2024): 109–26. http://dx.doi.org/10.5604/01.3001.0054.3831.

Full text
Abstract:
The risk of using highly toxic chemicals in a terrorist attack is resurfacing. Over the last fewdecades, terrorists have proven that they can source, develop and produce their own toxicchemicals. These substances are particularly dangerous for civilians who do not have access tothe protective equipment to be used in the event of contamination. It is impossible to guaranteefull public security in relation to the threats of chemical terrorism. Only trained, functioningand cooperating elements of state crisis response systems (mainly: medical rescue services,fire brigades, the police and the army
APA, Harvard, Vancouver, ISO, and other styles
39

Cole, L. "(A103) Understanding Terror Medicine." Prehospital and Disaster Medicine 26, S1 (2011): s28. http://dx.doi.org/10.1017/s1049023x11001051.

Full text
Abstract:
The term terror medicine emerged early in the 21st century to describe medical issues associated with terrorist events. While related to emergency and disaster medicine, the field also includes several features that are specific to terrorist attacks. The Israeli healthcare experience as related to terrorist attacks during the intifada (2000–2006), provides a base for comparison to responses elsewhere including to events in Oklahoma City (1995), Madrid (2004), and London (2005). Terror medicine covers four broad areas. First is preparedness, which encompasses hospital surge capacity, training a
APA, Harvard, Vancouver, ISO, and other styles
40

Jati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries." Simulacra 4, no. 2 (2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.

Full text
Abstract:
This article aims for revisiting the terrorism studies from different perspective. The terror attacks itself cannot be hundred percent zero but it just fluctuated trend. More specifically, terrorism always adaptive in following trends. While terror attacks still to target innocent civilians, the perpetrators could be closest relatives and neighbors. The way terror attack to reach out that group of people basically shows the silent role of returning foreign fighters (RFF)/returnees nurturing dan breeding terror ideologies. By using critical literature review especially historical narrative anal
APA, Harvard, Vancouver, ISO, and other styles
41

Cui, Xi, and Eric Rothenbuhler. "Communicating Terror: Mediatization and Ritualization." Television & New Media 19, no. 2 (2017): 155–62. http://dx.doi.org/10.1177/1527476417715685.

Full text
Abstract:
In this essay, we explicate the internal logic of contemporary terrorist acts and our society’s responses, to denaturalize the label and meanings we give to “terrorism.” We argue that contemporary terrorism communicates intimidation, fear, and anxiety through the ritualization and mediatization of terrorist attacks. Mediatization refers to the strategic coercion of imperative media coverage of the attacks, and ritualization refers to the focus on sacred life structures in both terrorist attacks and remedial responses. In combining ritualization and mediatization, terrorism aims to introduce ma
APA, Harvard, Vancouver, ISO, and other styles
42

Waters, Andrew J., W. Gerrod Parrott, Karin Mogg, Brendan P. Bradley, Mary C. Fuller, and Joan M. Wertz. "Processing Bias for Terror-Related Stimuli and September 11Th-Related Distress in College Students." Psychological Reports 101, no. 3 (2007): 787–95. http://dx.doi.org/10.2466/pr0.101.3.787-795.

Full text
Abstract:
The psychological sequelae of the September 11th terrorist attacks were examined in 249 college students at three sites in the USA and one site in the UK in the year following the attacks. Participants completed questionnaires tapping 9/11-related exposure and distress, and completed a modified Stroop task assessing time to color-name cards containing terror-related and neutral words. Geographical location and amount of exposure to the attacks were significant predictors of self-reported 9/11-related distress, but were not associated with processing bias for terror-related stimuli. Self-report
APA, Harvard, Vancouver, ISO, and other styles
43

Morton, Brian. "Terror and the Ethics of Resistance." Dissent 70, no. 4 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a918676.

Full text
Abstract:
ABSTRACT: After the terror attacks of September 11, 2001, it took the United States almost two years to forfeit the sympathy of the world. After the terror attacks of October 7 of last year, Israel, a more nimble superpower, accomplished the same feat in just a few days. Because the atrocities committed by Hamas have been eclipsed by the horrors that Israel has brought down on the people of Gaza, a consideration of the way the U.S. left responded to Hamas’s attacks might seem to be of nothing more than historical interest. But some of the questions raised by our responses should still be of co
APA, Harvard, Vancouver, ISO, and other styles
44

Morton, Brian. "Terror and the Ethics of Resistance." Dissent 71, no. 1 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a929088.

Full text
Abstract:
ABSTRACT: After the terror attacks of September 11, 2001, it took the United States almost two years to forfeit the sympathy of the world. After the terror attacks of October 7 of last year, Israel, a more nimble superpower, accomplished the same feat in just a few days. Because the atrocities committed by Hamas have been eclipsed by the horrors that Israel has brought down on the people of Gaza, a consideration of the way the U.S. left responded to Hamas's attacks might seem to be of nothing more than historical interest. But some of the questions raised by our responses should still be of co
APA, Harvard, Vancouver, ISO, and other styles
45

Gao, Zhen, Fucai Chen, Yawen Wang, Weizhen He, Xin Shi, and Genlin Xie. "MVPN: A Defense Architecture against VPN Traffic Hijacking Based on MTD." Electronics 12, no. 3 (2023): 711. http://dx.doi.org/10.3390/electronics12030711.

Full text
Abstract:
With the increasing awareness of privacy protection, Virtual Private Networks (VPNs) are widely used to build a more secure communication tunnel. However, a traffic hijacking attack called blind in/on-path has seriously threatened the security of VPNs. Inspired by Moving Target Defense (MTD), Moving VPN architecture (MVPN) is designed to defend against such attacks. MVPN includes multiple nodes to encrypt and decrypt traffic to enhance reliability. Thus, the consistency judgment algorithm is proposed to make MVPN obtain the ability to perceive attacks. Moreover, according to the judgment resul
APA, Harvard, Vancouver, ISO, and other styles
46

Khraban, Ihor, and Serhii Yevtukh. "STATE TERROR OF RUSSIA AGAINST UKRAINE." STATE SECURITY 1, no. 3 (2024): 118–24. http://dx.doi.org/10.33405/2786-8613/2024/1/3/309968.

Full text
Abstract:
The question of the terrorist activities of the russian federation during the full-scale war against Ukraine aimed at destroying the country�s economic potential and achieving the political objectives of this armed conflict is considered. An analysis of the main targets of attacks on strategic objects of Ukraine, the consequences of these attacks, and ways of countering terror on the part of the aggressor country has been carried out.
APA, Harvard, Vancouver, ISO, and other styles
47

Tew, Joanna, and Richard Ward. "Paramedics at risk? How responding to a terror attack affects mental wellbeing." Journal of Paramedic Practice 16, no. 10 (2024): 416–25. http://dx.doi.org/10.12968/jpar.2023.0061.

Full text
Abstract:
Background: Terror attacks have a significant impact on first responders’ wellbeing, with an associated risk of post-traumatic stress disorder (PTSD). Aims: To improve understanding of how responding to terror attacks affects paramedics’ mental health. Methodology: A literature search was carried out on databases using the PRISMA strategy. Critical appraisal tools were used alongside thematic analysis to appraise and synthesise the literature. Findings: Ten papers were identified. Themes arising regarding risks to responders included: the level of exposure, with the amount related to the risks
APA, Harvard, Vancouver, ISO, and other styles
48

Luhmann, Maike, and Wiebke Bleidorn. "Changes in Affect, Cognition, and Perceived Behavioral Changes Among Vicarious Victims of the Paris Terrorist Attacks of November 13, 2015." Social Psychological and Personality Science 9, no. 2 (2017): 214–22. http://dx.doi.org/10.1177/1948550617732818.

Full text
Abstract:
Terrorist attacks are supposed to hit not only the direct victims but the entire society. In this prospective longitudinal study, we examined changes in mood, life satisfaction, and terror-related cognitions and perceived behavioral changes 2, 4, and 8 weeks after the terrorist attacks of November 13, 2015, in Paris in a sample of the so-called vicarious victims ( N = 201). Average mood levels dropped significantly after the attacks compared to preattack levels but recovered within 8 weeks. Average levels of life satisfaction did not change significantly across this time period. Level of preoc
APA, Harvard, Vancouver, ISO, and other styles
49

Trikalinou, Anna, and Nikolaos G. Bourbakis. "A Survey on Protection Methodologies Against Control Flow Hijacking Attacks." IEEE Potentials 33, no. 6 (2014): 21–26. http://dx.doi.org/10.1109/mpot.2014.2344211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Olsson, Filip. "Implicit Terror: A Natural Experiment on How Terror Attacks Affect Implicit Bias." Sociological Science 11 (2024): 379–412. http://dx.doi.org/10.15195/v11.a14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!