Academic literature on the topic 'Vehicle hijacking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vehicle hijacking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Vehicle hijacking"
Davis, Linda. "Carjacking — Insights from South Africa to a New Crime Problem." Australian & New Zealand Journal of Criminology 36, no. 2 (2003): 173–91. http://dx.doi.org/10.1375/acri.36.2.173.
Full textKruger, Joshua J. "Vehicle Fraud Detection Using Microscopy." Microscopy Today 8, no. 6 (2000): 8–11. http://dx.doi.org/10.1017/s1551929500052779.
Full textMacgregor, J., WJ Schoeman, and AD Stuart. "The victim's experience of hijacking: an exploratory study." Health SA Gesondheid 7, no. 1 (2002): 33–45. http://dx.doi.org/10.4102/hsag.v7i1.374.
Full textZiehn, Jens R., Masoud Roschani, Miriam Ruf, Dennis Bruestle, Jürgen Beyerer, and Melanie Helmer. "Imaging vehicle-to-vehicle communication using visible light." Advanced Optical Technologies 9, no. 6 (2020): 339–48. http://dx.doi.org/10.1515/aot-2020-0038.
Full textZhang, Junsong, Qikun Zhang, Xianling Lu, and Yong Gan. "A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment." Wireless Communications and Mobile Computing 2021 (June 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/6692568.
Full textCao, Yue, Omprakash Kaiwartya, Sinem Coleri Ergen, Houbing Song, Jaime Lloret, and Naveed Ahmad. "Guest Editorial Special Issue on Toward Securing Internet of Connected Vehicles (IoV) From Virtual Vehicle Hijacking." IEEE Internet of Things Journal 6, no. 4 (2019): 5866–69. http://dx.doi.org/10.1109/jiot.2019.2926608.
Full textZheng, Xian-Chun, and Hung-Min Sun. "Hijacking Unmanned Aerial Vehicle by Exploiting Civil GPS Vulnerabilities Using Software-defined Radio." Sensors and Materials 32, no. 8 (2020): 2729. http://dx.doi.org/10.18494/sam.2020.2783.
Full textKong, Victor, Ross Weale, Joanna Blodgett, John Bruce, Grant Laing, and Damian Clarke. "Spectrum of injuries resulting from gunshot wounds in car hijacking: a South African experience." Trauma Surgery & Acute Care Open 3, no. 1 (2018): e000260. http://dx.doi.org/10.1136/tsaco-2018-000260.
Full textMa, Ming Tu, Gang Chen, Yu Hao Ma, Zhi Gang Li, and Yi Feng. "The Development and Application Research of Light Weight Heat Treated C-Grade Bullet Proof Steel." Advanced Materials Research 1063 (December 2014): 21–27. http://dx.doi.org/10.4028/www.scientific.net/amr.1063.21.
Full textThobane, Mahlongonolo, and Johan Prinsloo. "Is crime getting increasingly violent? An assessment of the role of bank associated robbery in South Africa." South African Crime Quarterly, no. 65 (September 30, 2018): 33–41. http://dx.doi.org/10.17159/2413-3108/2018/v0n65a4367.
Full textDissertations / Theses on the topic "Vehicle hijacking"
Zheng, Xian-Chun, and 鄭先淳. "Hijacking Unmanned Aerial Vehicle Exploiting Civil GPS Vulnerability by Software Defined Radio." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6x66h4.
Full textWienand, Liezl. "The influence of a vehicle hijacking prevention intervention on stress experience and personal competence." Thesis, 2010. http://hdl.handle.net/10210/3350.
Full textSteenkamp, Douw Gerbrand. "Motor vehicle theft: a comparative study." Thesis, 1999. http://hdl.handle.net/10530/1035.
Full textSymington, Claire. "The application of emotional intelligence incorporated in therapy to a vehicle hijack survivor." Diss., 2007. http://hdl.handle.net/2263/26749.
Full textMathebula, Esewu Mxolisi. "Prevention of theft of official vehicles of the South African National Defence Force (SANDF) in the Gauteng Province." Diss., 2014. http://hdl.handle.net/10500/14140.
Full textMpata, Modjadji Fletta. "Personal experiences of victims of violent crimes: an African perspective." Diss., 2011. http://hdl.handle.net/10500/7693.
Full textBooks on the topic "Vehicle hijacking"
Big money: 2.5 billion dollars, one suspicious vehicle, and a pimp-- on the trail of the ultra-rich hijacking American politics. PublicAffairs, 2014.
Find full textConference papers on the topic "Vehicle hijacking"
Liu, Xiaoming, and Shaozhong Jiang. "The vehicle hijacking alarm system." In 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 2017. http://dx.doi.org/10.1109/fskd.2017.8393344.
Full textNegi, Naman, Ons Jelassi, Stephan Clemencon, and Sebastian Fischmeister. "A LSTM Approach to Detection of Autonomous Vehicle Hijacking." In 5th International Conference on Vehicle Technology and Intelligent Transport Systems. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007726004750482.
Full textGiray, Sait Murat. "Anatomy of unmanned aerial vehicle hijacking with signal spoofing." In 2013 6th International Conference on Recent Advances in Space Technologies (RAST). IEEE, 2013. http://dx.doi.org/10.1109/rast.2013.6581320.
Full textFaughnan, M. S., B. J. Hourican, G. C. MacDonald, et al. "Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection." In 2013 IEEE Systems and Information Engineering Design Symposium (SIEDS). IEEE, 2013. http://dx.doi.org/10.1109/sieds.2013.6549509.
Full textReports on the topic "Vehicle hijacking"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full text