Literatura científica selecionada sobre o tema "Cyberhot"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cyberhot".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Cyberhot"
Curran, Kevin, and Sheila Mc Kinney . "Cyberart." Journal of Applied Sciences 4, no. 4 (2004): 531–36. http://dx.doi.org/10.3923/jas.2004.531.536.
Texto completo da fonteLEVIN, BRIAN. "Cyberhate." American Behavioral Scientist 45, no. 6 (2002): 958–88. http://dx.doi.org/10.1177/0002764202045006004.
Texto completo da fonteLewis, Mike. "CYBERLOG." Health Libraries Review 5, no. 3 (1988): 211–14. http://dx.doi.org/10.1046/j.1365-2532.1988.5302102.x.
Texto completo da fonteWachs, Sebastian, Juan Manuel Machimbarrena, Michelle F. Wright, et al. "Associations between Coping Strategies and Cyberhate Involvement: Evidence from Adolescents across Three World Regions." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6749. http://dx.doi.org/10.3390/ijerph19116749.
Texto completo da fonteKorol, Liliia, and Catherine Blaya. "THE PHENOMENON OF CYBERHATE: ANALYSIS OF CONCEPTUAL APPROACHES AND EMPIRICAL FINDINGS OF YOUTH’S CYBERHATE EXPERIENCES IN FRANCE." Scientific Notes of Ostroh Academy National University: Psychology Series 1, no. 17 (2024): 82–89. http://dx.doi.org/10.25264/2415-7384-2024-17-82-89.
Texto completo da fonteAlmaliki, Malik, Abdulqader M. Almars, Khulood O. Aljuhani, and El-Sayed Atlam. "Combining the Strengths of LLMs and Persuasive Technology to Combat Cyberhate." Computers 14, no. 5 (2025): 173. https://doi.org/10.3390/computers14050173.
Texto completo da fontePorett, Tom. "Cyberart Considerations." Art Journal 53, no. 3 (1994): 32. http://dx.doi.org/10.2307/777416.
Texto completo da fonteDouglas, Karen M., Craig Mcgarty, Ana-Maria Bliuc, and Girish Lala. "Understanding Cyberhate." Social Science Computer Review 23, no. 1 (2005): 68–76. http://dx.doi.org/10.1177/0894439304271538.
Texto completo da fonteMeyer, Helen. "Cybercop scanner." Computers & Security 18, no. 3 (1999): 234. http://dx.doi.org/10.1016/s0167-4048(99)90941-0.
Texto completo da fonteMróz, Justyna, and Kinga Kaleta. "Internet Addiction as a Moderator of the Relationship between Cyberhate Severity and Decisional Forgiveness." International Journal of Environmental Research and Public Health 19, no. 10 (2022): 5844. http://dx.doi.org/10.3390/ijerph19105844.
Texto completo da fonteTeses / dissertações sobre o assunto "Cyberhot"
Olsson, Sanna, and Isabella Hultberg. "Cybersäkerhet - Att stärka den svaga länken : En flerfallsstudie om hur formella och informella styrmedel förebygger interna cyberhot i banksektorn." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176804.
Texto completo da fonteFearn, Harriet. "The impacts of cyberhate." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/66869/.
Texto completo da fonteCheung, Kwong-chung. "Reinforced earth wall design & construction in northern access road for Cyberport Development /." View the Table of Contents & Abstract, 2005. http://sunzi.lib.hku.hk/hkuto/record/B3676288X.
Texto completo da fonteCheung, Kwong-chung, and 張光中. "Reinforced earth wall design & construction in northern access road for Cyberport Development." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B45014279.
Texto completo da fonteKabil, Alexandre. "CyberCOP 3D : visualisation 3D interactive et collaborative de l'état de sécurité d'un système informatique." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0166.
Texto completo da fonteDul, Anna, and Johanna Velin. "How Do Leadership Behaviours Affect Employee Attitudes Towards Sustainability? A case study on IT consultancy Cybercom." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23091.
Texto completo da fonteStrauss, Juergen. "Interaktions- und Animationstechniken in virtuellen Welten." Master's thesis, Universitätsbibliothek Chemnitz, 1997. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199700063.
Texto completo da fonteEdin, Andreas. "Autentisering med OAuth 2.0 i SiteVision : Jämförelse mellan Java Portlets och WebApps." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33878.
Texto completo da fonteLundberg, Johan. "Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-87359.
Texto completo da fonteVarela, Fernandez Dario. "Les réseaux hispanistes français au début du XXème siècle : coopérations savantes et relations culturelles, France-Espagne-Amériques (1890-1930)." Thesis, Le Mans, 2019. http://cyberdoc-int.univ-lemans.fr/Theses/2019/2019LEMA3012.pdf.
Texto completo da fonteLivros sobre o assunto "Cyberhot"
Heickerö, Roland. Internets mörka sidor: Om cyberhot och informationskrigföring. Atlantis, 2012.
Encontre o texto completo da fonteHeickerö, Roland. Emerging cyber threats and Russian views on information warfare and information operations: Utveckling av cyberhot och den ryska synen på informationskrigföring och informationsoperationer. FOI, Swedish Defence Research Agency, Division of Defence Analysis, 2010.
Encontre o texto completo da fonteInc, Apple Computer, ed. Cyberdog programmer's kit. Addison-Wesley Pub. Co., 1996.
Encontre o texto completo da fonteIncarico, Irene. Notturno digitale: Romanzo cybergoth. Cut-up, 2011.
Encontre o texto completo da fonteFeiler, Jesse. Cyberdog: The complete guide to Apple's Internet productivity technology. AP Professional, 1996.
Encontre o texto completo da fonteMatrix, Sidney Eve. Cyberpop: Digital lifestyles and commodity culture. Routledge, 2007.
Encontre o texto completo da fonteMonnier, Angeliki, Axel Boursier, and Annabelle Seoane, eds. Cyberhate in the Context of Migrations. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92103-3.
Texto completo da fonteKissell, Joe. Cyberdog: Live objects on the Internet. MIS Press, 1997.
Encontre o texto completo da fonteBoyle, Sean 1977. Perfect horizon: Finiens perfectus 215X : HDL cyberpop setting. Tremorworks, LLC, 2006.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Cyberhot"
Tsantes, George K., and James F. Ransome. "Solution—CYBERPHOS." In Cybertax. Auerbach Publications, 2023. http://dx.doi.org/10.1201/9781003330103-6.
Texto completo da fonteJane, Emma A., and Nicole A. Vincent. "Cyberhate, Communication and Transdisciplinarity." In Reimagining Communication: Meaning. Routledge, 2020. http://dx.doi.org/10.4324/9781351007924-10.
Texto completo da fonteShi, Shumin, Xinyu Zhou, Meng Zhao, and Heyan Huang. "Identifying Suspected Cybermob on Tieba." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47674-2_31.
Texto completo da fonteProkopenko, Mikhail, Peter Wang, and Thomas Howard. "Cyberoos’2001: “Deep Behaviour Projection” Agent Architecture." In RoboCup 2001: Robot Soccer World Cup V. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45603-1_70.
Texto completo da fonteSpiesel, Christina. "Cyberhate: Medium? Message? Speech? Act? An Exploration." In Law and Visual Jurisprudence. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-51248-3_5.
Texto completo da fonteMonnier, Angeliki, Axel Boursier, and Annabelle Seoane. "Anti-Migrant Hate Speech as a Symptom of a Representation Crisis." In Cyberhate in the Context of Migrations. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92103-3_1.
Texto completo da fonteLahti, Emmi. "The Joint Construction of Hate Speech in Online Discussions." In Cyberhate in the Context of Migrations. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92103-3_7.
Texto completo da fonteAscone, Laura. "Discrediting the Other, Building In-Group Bonds: An Analysis of French and Italian User-Generated Hate Contents." In Cyberhate in the Context of Migrations. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92103-3_3.
Texto completo da fontePasta, Stefano. "Social Network Conversations with Young Authors of Online Hate Speech Against Migrants." In Cyberhate in the Context of Migrations. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92103-3_8.
Texto completo da fonteStrani, Katerina, and Anna Szczepaniak-Kozak. "Online Hate Speech in the UK and Poland: A Case-Study of Online Reactions to the Killing of Arkadiusz Jóźwik." In Cyberhate in the Context of Migrations. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92103-3_2.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Cyberhot"
Barbadekar, Ashwini, Shital Raut, Kalyani Laddha, and Akash Shekhavat. "Realtime Cyberbullying Detection on Telegram: A Machine Learning Approach with Cyberbot." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837449.
Texto completo da fonteBinhulayyil, Sarah, Shancang Li, and Neetesh Saxena. "IoT Vulnerability Detection using Featureless LLM CyBert Model." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00343.
Texto completo da fonteDhiman, Ranjana, Uttam Kumar Giri, Atul Tiwary, Ramamani Tripathy, Ashok Kumar Sahoo, and Pradeepta Kumar Sarangi. "Machine Learning Based Predictive Models for Lung Cancer Detection and Classification." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803196.
Texto completo da fonteSoni, Palvi, and Chirag Sharma. "Machine Learning Applications in the Diagnosis of PCOS: A Systematic Review." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803205.
Texto completo da fonteMarathe, Abha, Sahil Makadi, Pratik Meshram, Amey Mahulkar, Ayush Maurya, and Krishna Mhaske. "Development of an Application for Detecting Lung Cancer Using Machine Learning." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803220.
Texto completo da fonteChib, Shiney, Manjusha P. Gandhi, Shantanu S. Bose, V. P. Thirulogasundaram, H. N. Prasanna, and S. R. Lakshmi. "Managing with Machines: A Comprehensive Assessment on the Use of Artificial Intelligence in Organizational Perspectives." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803230.
Texto completo da fonteGupta, Shipra, Indu Bharti Jain, Merry Saxena, Pradeepta Kumar Sarangi, Ashok Kumar Sahoo, and Alok Kumar Agrawal. "Cyber Bullying Detection and Classification Using Machine Learning Algorithms." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803176.
Texto completo da fonteDhondiyal, Shiv Ashish, and Sushil Chandra Dimri. "Detection and Treatment of Epilepsy Disease using EEG Signals." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803173.
Texto completo da fonteBoopalan, Sunil. "Synergistic Solutions for Cloud Cybersecurity and Financial Operations using AI, Blockchain and Quantum Computing." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803251.
Texto completo da fonteNarkhede, Ekta, Bharti Ingle, Purva Pandey, et al. "Future of Drug Design and Reinforcement Learning." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803201.
Texto completo da fonte