Littérature scientifique sur le sujet « Vehicle hijacking »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Vehicle hijacking ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Vehicle hijacking"

1

Davis, Linda. "Carjacking — Insights from South Africa to a New Crime Problem." Australian & New Zealand Journal of Criminology 36, no. 2 (2003): 173–91. http://dx.doi.org/10.1375/acri.36.2.173.

Texte intégral
Résumé :
Although vehicle hijacking is a worldwide phenomenon, it has increased to such an extent in South Africa that it is currently regarded as one of the countries with the highest hijacking figures in the world. It is estimated that a motor vehicle is hijacked every 40 to 54 minutes in South Africa. This implies that more than 25 motor vehicle drivers become victims of hijackings daily. Despite these statistics, little is known about the factors that could increase an individual's potential to become a victim of this crime. In this article, selective research findings of an exploratory study of 12
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kruger, Joshua J. "Vehicle Fraud Detection Using Microscopy." Microscopy Today 8, no. 6 (2000): 8–11. http://dx.doi.org/10.1017/s1551929500052779.

Texte intégral
Résumé :
In a criminal case, such as vehicle theft or vehicle hijacking, where a vehicle has been dismantled, the forensic scientist is many times faced with the problem of establishing the history of a specific auto body part. The normal method for doing this is by performing paint analysis. There are, however, a few shortcomings to paint analysis. In this paper another technique for determining the history of a body part is discussed, namely the comparison of surface replicas.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Macgregor, J., WJ Schoeman, and AD Stuart. "The victim's experience of hijacking: an exploratory study." Health SA Gesondheid 7, no. 1 (2002): 33–45. http://dx.doi.org/10.4102/hsag.v7i1.374.

Texte intégral
Résumé :
This paper summarises a phenomenological study that was designed to explore the victim's lived experience of
 undergoing a motor vehicle hijacking. OpsommingHierdie artikel verskaf 'n oorsig oor 'n fenomenologiese studio wat ontwerp is om die slagofferse geleefde ervaring van 'n motorkaping te ondersoek.
 
 *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ziehn, Jens R., Masoud Roschani, Miriam Ruf, Dennis Bruestle, Jürgen Beyerer, and Melanie Helmer. "Imaging vehicle-to-vehicle communication using visible light." Advanced Optical Technologies 9, no. 6 (2020): 339–48. http://dx.doi.org/10.1515/aot-2020-0038.

Texte intégral
Résumé :
AbstractWith advances in automated and connected driving, secure communication is increasingly becoming a safety-critical function. Injection of manipulated radio messages into traffic can cause severe accidents in the foreseeable future, and can currently be achieved without having to manipulate on-board vehicle systems directly, for example by hijacking cellphones instead and using these as senders. Thereby, large-scale attacks on vehicles can be executed remotely, and target relatively vulnerable devices. To mitigate remaining vulnerabilities in current automotive security architectures, th
Styles APA, Harvard, Vancouver, ISO, etc.
5

Zhang, Junsong, Qikun Zhang, Xianling Lu, and Yong Gan. "A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment." Wireless Communications and Mobile Computing 2021 (June 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/6692568.

Texte intégral
Résumé :
With the rapid development of communication and microelectronic technology, the vehicular ad hoc network (VANET) has received extensive attention. However, due to the open nature of wireless communication links, it will cause VANET to generate many network security issues such as data leakage, network hijacking, and eavesdropping. To solve the above problem, this paper proposes a new authentication protocol which uses bilinear pairings and temporary pseudonyms. The proposed authentication protocol can realize functions such as the identity authentication of the vehicle and the verification of
Styles APA, Harvard, Vancouver, ISO, etc.
6

Cao, Yue, Omprakash Kaiwartya, Sinem Coleri Ergen, Houbing Song, Jaime Lloret, and Naveed Ahmad. "Guest Editorial Special Issue on Toward Securing Internet of Connected Vehicles (IoV) From Virtual Vehicle Hijacking." IEEE Internet of Things Journal 6, no. 4 (2019): 5866–69. http://dx.doi.org/10.1109/jiot.2019.2926608.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zheng, Xian-Chun, and Hung-Min Sun. "Hijacking Unmanned Aerial Vehicle by Exploiting Civil GPS Vulnerabilities Using Software-defined Radio." Sensors and Materials 32, no. 8 (2020): 2729. http://dx.doi.org/10.18494/sam.2020.2783.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kong, Victor, Ross Weale, Joanna Blodgett, John Bruce, Grant Laing, and Damian Clarke. "Spectrum of injuries resulting from gunshot wounds in car hijacking: a South African experience." Trauma Surgery & Acute Care Open 3, no. 1 (2018): e000260. http://dx.doi.org/10.1136/tsaco-2018-000260.

Texte intégral
Résumé :
BackgroundCar hijacking, known as “carjacking”, is a form of aggravated robbery of a vehicle from the driver frequently involving firearm and is common in South Africa. There is, however, little literature on the spectrum of injuries sustained by victims of car hijacking. The study aimed to describe the spectrum of gunshot wound-related (GSW) injuries and review our experience of management of victims of car hijacking in our trauma center based in South Africa.MethodsA retrospective review was conducted during an 8-year period from January 2010 to January 2018 on all patients who presented wit
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ma, Ming Tu, Gang Chen, Yu Hao Ma, Zhi Gang Li, and Yi Feng. "The Development and Application Research of Light Weight Heat Treated C-Grade Bullet Proof Steel." Advanced Materials Research 1063 (December 2014): 21–27. http://dx.doi.org/10.4028/www.scientific.net/amr.1063.21.

Texte intégral
Résumé :
The Light weight heat treated C-grade bullet proof steel was developed through composition design and optimization based on multiplex alloying, multiplex micro-alloying design ideas and complex phase structure strengthening theory. The puzzle how to avoid the quenching deformation problem of super high strength thin sheet was solved through heat treatment in die with a suit of cooling system. Such C-grade bullet proof steel plate has fine tempered lath martensite structure and has a higher strength than production which is made by a Inc. in Sweden. The shooting and certification test results s
Styles APA, Harvard, Vancouver, ISO, etc.
10

Thobane, Mahlongonolo, and Johan Prinsloo. "Is crime getting increasingly violent? An assessment of the role of bank associated robbery in South Africa." South African Crime Quarterly, no. 65 (September 30, 2018): 33–41. http://dx.doi.org/10.17159/2413-3108/2018/v0n65a4367.

Texte intégral
Résumé :
There is public concern about the violent nature of crime in South Africa and the continuously increasing levels of crime, both of which place a huge burden on the resources of the criminal justice system. ‘Bank associated robbery’ is a bank-related robbery (or attempted robbery) of cash, committed against a bank client while en route to or from a bank or ATM. Although this phenomenon is relatively unknown both in the academe and to the general public, the drastic increase in these violent and potentially traumatic crimes puts the general public at risk, and is therefore of particular concern
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Vehicle hijacking"

1

Zheng, Xian-Chun, and 鄭先淳. "Hijacking Unmanned Aerial Vehicle Exploiting Civil GPS Vulnerability by Software Defined Radio." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6x66h4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wienand, Liezl. "The influence of a vehicle hijacking prevention intervention on stress experience and personal competence." Thesis, 2010. http://hdl.handle.net/10210/3350.

Texte intégral
Résumé :
M.A.<br>One of the most perturbing factors of South Africa's communal existence is the high rates of violent crime and the high incidence of Post-Traumatic Stress Disorder JPTSD) amongst all communities. Crime-related PTSD is a problem of epidemic proportions. Therapeutic and mental health services for trauma related counselling are limited and in some communities non-existent. It is therefor essential to develop preventative programmes aimed at equipping individuals with the skills to avoid possible trauma-inducing situations such as vehicle hijacking. It was decided to utilise a vehicle hija
Styles APA, Harvard, Vancouver, ISO, etc.
3

Steenkamp, Douw Gerbrand. "Motor vehicle theft: a comparative study." Thesis, 1999. http://hdl.handle.net/10530/1035.

Texte intégral
Résumé :
Submitted to the Faculty of Arts in fulfillment of the requirements for the Degree Master of Arts in the Department of Criminal Justice at the University of Zululand, South Africa, 1999.<br>This investigation entails a study of motor vehicle theft and hijacking in KwaZulu-Natal and Western Cape for the period of 1 January till 31 December 1995. The present study is empirically founded and for this purpose an information schedule has been implemented to capture data from police case dossiers for statistical analysis and description. Data forthcoming from a previous Honours study in the Westem
Styles APA, Harvard, Vancouver, ISO, etc.
4

Symington, Claire. "The application of emotional intelligence incorporated in therapy to a vehicle hijack survivor." Diss., 2007. http://hdl.handle.net/2263/26749.

Texte intégral
Résumé :
Hijacking is an invasive and confrontational traumatic event that impacts significantly on the survivor’s biopsychosocial functioning. The experience of trauma shatters assumptions held about oneself, others and the world. It brings with it a diverse set of consequences that could possibly threaten effective coping behaviour (Meischenbaum, 1994). The purpose of the proposed study is to explore the application of emotional intelligence (EI) incorporated in therapy to a vehicle hijack survivor. It is therefore my intention to research the application value of emotional intelligence therapy as a
Styles APA, Harvard, Vancouver, ISO, etc.
5

Mathebula, Esewu Mxolisi. "Prevention of theft of official vehicles of the South African National Defence Force (SANDF) in the Gauteng Province." Diss., 2014. http://hdl.handle.net/10500/14140.

Texte intégral
Résumé :
The South African National Defence Force (SANDF) was formed in 1994 after the integration of different “defence forces” into one large force. The sole existence of the SANDF is to protect the borders of the Republic of South Africa and its inhabitants. Resources such as vehicles make it easier for the SANDF to conduct mobile patrols and other operations to ensure that the organisation is always combat-ready. Motor vehicle theft is a crime that affects both individual citizens and organisations in South Africa; the SANDF is not immune to the crime. Many SANDF motor vehicles are stolen al
Styles APA, Harvard, Vancouver, ISO, etc.
6

Mpata, Modjadji Fletta. "Personal experiences of victims of violent crimes: an African perspective." Diss., 2011. http://hdl.handle.net/10500/7693.

Texte intégral
Résumé :
This research focused on the personal experiences of both male and female victims of violent crimes. The aim of this research was to explore how indigenous Black South Africans understand and deal with victimisation. An African epistemology was used to help gain a deeper understanding of the experiences of the participants. Participants were recruited using purposive sampling strategy. Five participants were selected for this study. Data was collected using individual face-to-face semi-structured interviews. Based on the transcribed data, themes were extracted and analysed using content analys
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Vehicle hijacking"

1

Big money: 2.5 billion dollars, one suspicious vehicle, and a pimp-- on the trail of the ultra-rich hijacking American politics. PublicAffairs, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Vehicle hijacking"

1

Liu, Xiaoming, and Shaozhong Jiang. "The vehicle hijacking alarm system." In 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 2017. http://dx.doi.org/10.1109/fskd.2017.8393344.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Negi, Naman, Ons Jelassi, Stephan Clemencon, and Sebastian Fischmeister. "A LSTM Approach to Detection of Autonomous Vehicle Hijacking." In 5th International Conference on Vehicle Technology and Intelligent Transport Systems. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007726004750482.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Giray, Sait Murat. "Anatomy of unmanned aerial vehicle hijacking with signal spoofing." In 2013 6th International Conference on Recent Advances in Space Technologies (RAST). IEEE, 2013. http://dx.doi.org/10.1109/rast.2013.6581320.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Faughnan, M. S., B. J. Hourican, G. C. MacDonald, et al. "Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection." In 2013 IEEE Systems and Information Engineering Design Symposium (SIEDS). IEEE, 2013. http://dx.doi.org/10.1109/sieds.2013.6549509.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Vehicle hijacking"

1

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Texte intégral
Résumé :
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review foc
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!