Academic literature on the topic 'Internet of Threads'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet of Threads.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Internet of Threads"
Tillabaeva, A. A., and V. A. Shulginov. "Speech behaviour of Internet users in conflict communication." Slovo.ru: Baltic accent 11, no. 4 (2020): 45–57. http://dx.doi.org/10.5922/2225-5346-2020-4-4.
Full textCLARK, KEITH, PETER J. ROBINSON, and RICHARD HAGEN. "Multi-threading and message communication in Qu-Prolog." Theory and Practice of Logic Programming 1, no. 3 (May 2001): 283–301. http://dx.doi.org/10.1017/s147106840100120x.
Full textMarshall, Michael. "Fungal threads are the internet of the plant world." New Scientist 208, no. 2786 (November 2010): 14. http://dx.doi.org/10.1016/s0262-4079(10)62793-5.
Full textSaravanan, D. "A Proposed Architecture for Finding Missing Threads in Internet." Bioscience Biotechnology Research Communications 13, no. 13 (December 25, 2020): 363–67. http://dx.doi.org/10.21786/bbrc/13.13/56.
Full textTIGELAAR, ALMER S., RIEKS OP DEN AKKER, and DJOERD HIEMSTRA. "Automatic summarisation of discussion fora." Natural Language Engineering 16, no. 2 (March 24, 2010): 161–92. http://dx.doi.org/10.1017/s135132491000001x.
Full textZen Munawar, S.T., S.Kom., M.Kom. "PENGGUNAAN METODE MULTI THREADS UNTUK PENGELOLAAN PROSES DOWNLOAD DI INTERNET." TEMATIK 1, no. 1 (June 30, 2014): 47–58. http://dx.doi.org/10.38204/tematik.v1i1.35.
Full textColes, Bryn Alexander, and Melanie West. "Weaving the internet together: Imagined communities in newspaper comment threads." Computers in Human Behavior 60 (July 2016): 44–53. http://dx.doi.org/10.1016/j.chb.2016.02.049.
Full textKaigo, Muneo. "Internet Aggregators Constructing the Political Right Wing in Japan." JeDEM - eJournal of eDemocracy and Open Government 5, no. 1 (November 20, 2013): 59–79. http://dx.doi.org/10.29379/jedem.v5i1.184.
Full textSquires, Lauren. "Enregistering internet language." Language in Society 39, no. 4 (August 18, 2010): 457–92. http://dx.doi.org/10.1017/s0047404510000412.
Full textKamiński, Mikołaj, Michał Borger, Piotr Prymas, Agnieszka Muth, Adam Stachowski, Igor Łoniewski, and Wojciech Marlicz. "Analysis of Answers to Queries among Anonymous Users with Gastroenterological Problems on an Internet Forum." International Journal of Environmental Research and Public Health 17, no. 3 (February 6, 2020): 1042. http://dx.doi.org/10.3390/ijerph17031042.
Full textDissertations / Theses on the topic "Internet of Threads"
Giuggioloni, Federico. "PycoTCP: Una libreria Python per l'Internet of Threads." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/11888/.
Full textDe, Marchi Federico. "Studio e implementazione di strumenti di domain name resolution per l'Internet of Threads." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23547/.
Full textAronsson, Johanna. "Code Switching on Flashback : A Study of Code Switching on an Internet Based Discussion Forum." Thesis, Södertörns högskola, Institutionen för kultur och lärande, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-26800.
Full textBertin, Gilberto. "ExoTCP: uno stack di rete minimale e userspace specializzato per il protocollo HTTP." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7875/.
Full textNasyrov, Ildar. "Výroby závitů závitníky." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2017. http://www.nusl.cz/ntk/nusl-318401.
Full textAlm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Full textMealer, Michael J. "Internet Radicalization : Actual Threat or Phantom Menace?" Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17416.
Full textPopular opinion expresses fear that accessing radical Islamic content and connecting with extremist networks through Internet functionalities causes radicalization and recruitment to commit terrorist acts. Anecdotal evidence has been used to support this assertion. The opinion assumes the Internet creates a new path that drives radicalization and recruitment. Whether computer-mediated communication (CMC) and Internet functionalities cause individuals to radicalize has not been thoroughly studied. This thesis explores whether a correlation can be found to attribute radicalization to radicalizing content and extremist networks accessed through CMC and Internet functionalities. A framework is used to evaluate vulnerabilities identified by the psychological, sociological and social-psychological elements of radicalization against the radicalization process, personal history, and the presence of radicalizing conventional communication and extremist contact. The analysis finds three cases that may support a conclusion that Internet radicalization is possible; however, the importance of root causes and individual vulnerabilities may have a greater impact. Since some circumstances involving CMC may increase the likelihood of radicalization, the fear of Internet radicalization may be reasonable, but the number of incidents validating that fear makes the threat unlikely, and appears more as a phantom menace than a real threat.
Fifield, David. "Threat Modeling and Circumvention of Internet Censorship." Thesis, University of California, Berkeley, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688573.
Full textResearch on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities—such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations.
My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. Rather, let us state the assumptions about censor behavior atop which we build circumvention designs, and let those assumptions be based on an informed understanding of censor behavior.
Larsson, Victor. "IoT - an internet of threats? : Identifying the dangers of an IoT-connection." Thesis, Blekinge Tekniska Högskola, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15351.
Full textSieklik, Ivan. "Thread Smart Home Model." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316420.
Full textBooks on the topic "Internet of Threads"
Shiaeles, Stavros, and Nicholas Kolokotronis, eds. Internet of Things, Threats, Landscape, and Countermeasures. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152.
Full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Boston, MA: Addison-Wesley, 2007.
Find full textAri, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Upper Saddle River, NJ: Addison-Wesley, 2008.
Find full textDienel, Hans-Liudger. Terrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.
Find full textTerrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.
Find full textBou-Harb, Elias, and Nataliia Neshenko. Cyber Threat Intelligence for the Internet of Things. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45858-4.
Full textThreat talk: The comparative politics of internet addiction. Burlington, VT: Ashgate, 2011.
Find full textBook chapters on the topic "Internet of Threads"
Enokido, Tomoya, and Makoto Takizawa. "The Improved Active Time-Based (IATB) Algorithm with Multi-threads Allocation." In Advances in Internet, Data and Web Technologies, 134–42. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70639-5_13.
Full textWolf, Marilyn, and Dimitrios Serpanos. "Threats and Threat Analysis." In Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.
Full textBuchmann, Johannes A. "Privacy Threats and Their Impact on the Core Values." In Internet Privacy, 61–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37913-0_5.
Full textHallur, Sudhakar, Roopa Kulkarni, and Prashant Patavardhan. "Introduction, Security Challenges, and Threats in IoT." In Internet of Things, 13–38. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, LLC, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003032441-2.
Full textPatten, Mildred L., and Michelle Newhart. "Threats to Internal Validity." In Understanding Research Methods, 186–88. Tenth edition. | New York, NY : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.4324/9781315213033-60.
Full textMcCall, Robert B., and Christina J. Groark. "Relationships and Internal Threats." In Conducting International Research and Service Collaborations, 185–95. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003183433-16-19.
Full textPeratikou, A., S. Shiaeles, and S. Stavrou. "Threats in Critical Infrastructures." In Internet of Things, Threats, Landscape, and Countermeasures, 97–135. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152-3.
Full textScheidt, N., and M. Adda. "Threats in Industrial IoT." In Internet of Things, Threats, Landscape, and Countermeasures, 137–66. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152-4.
Full textCabaj, Krzysztof, Konrad Grochowski, and Piotr Gawkowski. "Practical Problems of Internet Threats Analyses." In Advances in Intelligent Systems and Computing, 87–96. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19216-1_9.
Full textDhanoa, Amanpreet Singh. "Implementation of Protection Protocols for Security Threats in SDN." In Internet of Things, 247–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89328-6_14.
Full textConference papers on the topic "Internet of Threads"
"MINOS - Threads of Knowledge." In Science, Art and Internet Technology: Using Mobile Devices in Cultural Environments. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0001292604750478.
Full textDavoli, Renzo. "VXVDEX: Internet of threads and networks of namespaces." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7996595.
Full textKalebe, Rubem, Gustavo Girao, and Itamir Filho. "A library for scheduling lightweight threads in Internet of Things microcontrollers." In 2017 International Conference on Computing Networking and Informatics (ICCNI). IEEE, 2017. http://dx.doi.org/10.1109/iccni.2017.8123793.
Full textNagata, Satoshi, Shinichi Fujita, and Toshiyuki Sawa. "A Comparative Study on Mechanical Behavior of Pipe-Socket Threaded Joints With Taper-Taper Threads and Taper-Parallel Threads Combinations by Finite Element Analysis and Experiments." In ASME 2018 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/pvp2018-84657.
Full textThames, J. Lane, Andrew Hyder, Robert Wellman, and Dirk Schaefer. "An Information Technology Infrastructure for Internet-Enabled Remote and Portable Laboratories." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87112.
Full textGalle, Timothy, Wim De Waele, and Patrick De Baets. "Enhancing Trapezoidal Threads Using a Parametric Numerical Approach." In ASME 2015 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/pvp2015-45192.
Full textNagata, Satoshi, Shinichi Fujita, and Toshiyuki Sawa. "FEM Stress Analysis and Leakage Behavior of Pipe-Socket Threaded Joints Subjected to Bending Moment and Internal Pressure." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21221.
Full textAlexander, Henry L. "Comparison of Traditional and Emerging Technology for the Calibration of Thread Plug Gage Pitch Diameter." In NCSL International Workshop & Symposium. NCSL International, 2013. http://dx.doi.org/10.51843/wsproceedings.2013.10.
Full textYüksel, İ. Ahmet, T. Oytun Kılınç, K. Berk Sönmez, and Sinem Ön Aktan. "Comparison of internal and external threads pitch diameter measurement by using conventional methods and CMM’s." In 19th International Congress of Metrology (CIM2019), edited by Sandrine Gazal. Les Ulis, France: EDP Sciences, 2019. http://dx.doi.org/10.1051/metrology/201909001.
Full textSato, Takuya, Kenji Yamamoto, Rixing Li, and Hiroteru Ando. "Finite Element Analysis of Load Distribution of Threaded Connections Made of Dissimilar Materials in High Pressure Facilities." In ASME 2008 Pressure Vessels and Piping Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/pvp2008-61424.
Full textReports on the topic "Internet of Threads"
Crispin, M., and K. Murchison. Internet Message Access Protocol - SORT and THREAD Extensions. RFC Editor, June 2008. http://dx.doi.org/10.17487/rfc5256.
Full textLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, June 2021. http://dx.doi.org/10.51593/2020ca013.
Full textPark, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.
Full textAllende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Full textEser Davolio, Miryam. Research on Islamist Extremism in the Swiss Context: Assessing and Analyzing a Sensitive Phenomenon. RESOLVE Network, March 2022. http://dx.doi.org/10.37805/rve2022.1.
Full textRoberts, Paige, Ahmed-Yasin Osman Moge, and Kaija Hurlburt. PROJECT BADWEYN: SOMALI COASTAL DEVELOPMENT OPPORTUNITIES. One Earth Future, August 2018. http://dx.doi.org/10.18289/oef.2018.032.
Full textPerk, Shimon, Maricarmen Garcia, Alexander Panshin, Caroline Banet-Noach, Irina Gissin, Mark W. Jackwood, and David Stallknecht. Avian Influenza Virus H9N2: Characterization and Control Strategies. United States Department of Agriculture, June 2007. http://dx.doi.org/10.32747/2007.7709882.bard.
Full textLevin, Ilan, John W. Scott, Moshe Lapidot, and Moshe Reuveni. Fine mapping, functional analysis and pyramiding of genes controlling begomovirus resistance in tomato. United States Department of Agriculture, November 2014. http://dx.doi.org/10.32747/2014.7594406.bard.
Full text