Добірка наукової літератури з теми "Hijacking and Terror Attacks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Hijacking and Terror Attacks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Hijacking and Terror Attacks"

1

Supardi, Achmad. "Indonesian Muslims and Christians Positions During a Terror Attack: Analysis on Facebook Posts #prayforsurabaya." Jurnal Komunikasi: Malaysian Journal of Communication 38, no. 1 (2022): 74–98. http://dx.doi.org/10.17576/jkmjc-2022-3801-05.

Повний текст джерела
Анотація:
Indonesians and the world were shocked by a series of terror attacks in Surabaya, East Java, 13-14 May 2018. As predicted, Indonesians went online to share their mourning and condemnation of the attacks. Facebook posts with the hashtag #prayforsurabaya are places for online users to express their thoughts. This research employed content analysis and Leximancer’s thematic analysis to investigate three research questions: the dominant themes among the Facebook users’ responses as shown in #prayforsurabaya, how Facebook users position the terror attacks and religious identity within the Indonesia
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zubrzycki, Waldemar. "The Security of the Republic of Poland’s Maritime Areas and the Polish Coast in the Context of Terrorist Attacks." Internal Security 9, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7465.

Повний текст джерела
Анотація:
The threat of terrorist attack posed to the Republic of Poland is of a potential character and possible targets for such attacks include also objects located in the area of the Baltic Sea. Terrorist activities may be carried out in order to destroy or render vessels such as passenger, cargo and the navy ships, hydraulic structures and port facilities inoperative, as well as to take control over them. A terrorist attack may also aim at causing an environmental disaster. Direct targets of terrorist attacks may be passengers or crew members, but attempts of cargo seizure may also be expected. Pot
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.

Повний текст джерела
Анотація:
Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most dangerous attack. There are a number of measures proposed to prevent SSL tripping-based session hijacking attacks. However, existing surveys did not summarize all the preventive measures in a comprehensive manner (without much illustration and categorization). The objective of this paper is to provide a comprehensive survey of existing measures
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Cherckesova, Larissa, Elena Revyakina, Evgeniya Roshchina, and Vitaliy Porksheyan. "The development of countermeasures against session hijacking." E3S Web of Conferences 531 (2024): 03019. http://dx.doi.org/10.1051/e3sconf/202453103019.

Повний текст джерела
Анотація:
This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and sites much vulnerability, which developers often do not pay attention to, are occurred. The paper presents a practical implementation of one of the attacks (MITM), and also proposes methods to counteract and protect against most types of attacks. The main purpose of this paper is to study Session Hijacking attacks and to propose countermeasures against them and existing vulnerabilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kummari Teja and Dr.K.Pavan Kumar. "EXPOSING WEB VULNERABILITIES: A STUDY OF MAN-IN-THE-MIDDLE AND SESSION HIJACKING ATTACKS." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 747–55. https://doi.org/10.62643/ijerst.2025.v21.i2.pp747-755.

Повний текст джерела
Анотація:
These days, data is king, thanks to the Internet. This data is very susceptible to attackers because of the seemingly open access Internet service. Attacks happening on the web may compromise users' data privacy. Attacks that occur on the Internet, including Man-In-The-Middle and session hijacking, are the subject of this SLR. Using an appropriate research selection approach, it examines around 30 studies spanning from 2016 to 2023. There are three research questions that make up this SLR. The first one gives an overview of recent tendencies in research on session hijacking and man-in-the-midd
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.

Повний текст джерела
Анотація:
The inter-domain routing system based on the BGP protocol is a kernel establishment in the Internet. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation between prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three tiers based on the power-law and commercial relations of autonomous systems. The relation between network topology
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.

Повний текст джерела
Анотація:
Session Hijacking is an attack which is basically used to gain the unauthorized access between an authorized session connections. This is usually done to attack the social network website and banking websites in order to gain the access over the valid session as well as over the website too. These attacks are one of the commonly experienced cyber threats in today’s network. Most of the websites and networks are vulnerable from this kind of attack. For providing the protection I have given the multiple ways to protecting from this session hijacking attack. I have especially focused on one of th
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Shaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.

Повний текст джерела
Анотація:
Cybersecurity threats such as Man-in-the-Middle (MITM) attacks and Session Hijacking (SH) account for over 35% of web-based cyber intrusions, causing financial losses exceeding $6 billion annually. Despite extensive research on these attacks independently, a unified analysis remains underexplored. This study bridges that gap by conducting a Systematic Literature Review (SLR) on over 150 research papers from IEEE, ACM, and ScienceDirect, comparing MITM and SH in terms of attack frequency, methodologies, vulnerabilities, and countermeasures.<strong> </strong>Our findings indicate that MITM attac
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.

Повний текст джерела
Анотація:
WhatsApp provides a fertile ground for the large-scale dissemination of information, particularly in countries like Brazil and India. Given its increasing popularity and use for political discussions, it is paramount to ensure that WhatsApp groups are adequately protected from attackers who aim to disrupt the activity of WhatsApp groups. Motivated by this, in this work, we characterize two types of attacks that may disrupt WhatsApp groups. We look into the flooding attack, where an attacker shares a large number of usually duplicate messages within a short period, and the hijacking attack, whe
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rai, Tage S. "Predicting future terror attacks." Science 366, no. 6467 (2019): 834.7–835. http://dx.doi.org/10.1126/science.366.6467.834-g.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Hijacking and Terror Attacks"

1

Onder, Hulusi. "Session hijacking attacks in wireless local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOnder.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Shibli, Adania. "Visual terror : a study of the visual compositions of the 9/11 attacks and major attacks in the 'War on Terror' by British and French television networks." Thesis, University of East London, 2009. http://roar.uel.ac.uk/3146/.

Повний текст джерела
Анотація:
Over the past four decades, terrorism has gradually come to be seen as a central threat facing contemporary societies. However, the definition of the term remains highly contested; in particular, to which acts of violence it should apply and which not. Aware of the complexity of formulating a universally accepted definition of terrorism, and proposing that this complexity is inherent in language itself, this study analyses the visual representations of a number of acts of violence in television. Drawing on the claim that, despite definitional disagreements, there is a common image of terrorism
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lanier, Cathy L. "Preventing terror attacks in the Homeland : a new mission for state and local police." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FLanier.pdf.

Повний текст джерела
Анотація:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Christopher Bellavita. Includes bibliographical references (p.61-63). Also available online.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Botha, Johannes Gideon. "Pastorale versorging van getraumatiseerde slagoffers van geweldmisdaad / Johannes Gideon Botha." Thesis, North-West University, 2004. http://hdl.handle.net/10394/480.

Повний текст джерела
Анотація:
South Africa, after ten years of democracy should have been a secure and peaceful place. It has however developed into a cesspool of violence. Violent crime is currently a common factor in everyday life. It is especially the severe nature of the assault and mutilation that makes violent crimes so traumatizing. The aim of this study is to identify the need for counselling of these traumatized victims of violent crimes and to design a future strategy for the possible application by pastoral counsellors and ministers to support and minister these violent crime victims. The method of approach acco
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Woods, Joshua. "Imagining terror the people, the press and politics /." Diss., Connect to online resource - MSU authorized users, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Rehman, Abdul. "Impact of drone attacks in Pakistan and the war on terror: A consideration of the effects of drone attacks in Pakistan and whether they are helping or not to win the war on terror!" Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22238.

Повний текст джерела
Анотація:
AbstractThis study began with the idea that the drone attacks launched by the United States on the northwest region of Pakistan since 2004 have not helped in the expressed aim of the US to win the war on terror. The study asked three main questions. It wished to discover why drone attacks in Pakistan had not helped to win the war on terror, the main reasons that these attacks have not been successful and how these attacks have led to the increase of the anti-US feeling in Pakistan. The study used a case study methodology that focused on gaining a qualitative insight from a range of perspective
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Coultas, Bryan T. "Crowdsourcing intelligence to combat terrorism: harnessing bottom-up collection to prevent lone-wolf terror attacks." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45174.

Повний текст джерела
Анотація:
Approved for public release; distribution is unlimited<br>U.S. officials have acknowledged that attackers of the lone-wolf and isolated-cell organizational type are on the rise and now pose a greater threat than major coordinated actions. Traditional intelligence methods, using a top-down approach with an emphasis on signals intelligence, are ill-equipped to identify and prevent terrorists using lone-wolf tactics. Crowdsourcing, as a problem-solving technique, is a relatively new idea but has shown great promise in tackling issues similar to the identification of lone-wolf terrorists. At its c
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Manxhuka, Bardh, and Max Hägglund. "The terror attacks of 2015 in Paris and their effect on Perceived Discrimination : The Swedish experience." Thesis, Linnéuniversitetet, Institutionen för nationalekonomi och statistik (NS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105227.

Повний текст джерела
Анотація:
Using a quasi-experimental approach, this study analyses the effects of a specific exogenous shock on ethnic discrimination in Sweden by treating the terror attacks of 2015 in Paris as a natural experiment. Our research is based on cross-sectional survey data published by the European Social Survey (ESS). Slightly deviating from the traditional analytical approach, we observe individuals’ perception of being discriminated against rather than factual discrimination, thus contributing by analysing a common topic from a different perspective. We find that immigrants generally have a higher probab
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rogers, Paul F. "Into the Long War." Pluto Press, 2006. http://hdl.handle.net/10454/3702.

Повний текст джерела
Анотація:
No<br>This book provides a contemporary month-by-month analysis of events in Iraq since May 2005 and assesses how they impact on other countries including Afghanistan, Iran and the wider Middle East. The book charts a tumultuous period in the conflict, including a wider international perspective on the terrorist attacks in London and Sharm al Sheik, and an assessment of how US public opinion has changed as the war drags on. It brings together Paul Rogers' international security monthly briefings as published on the Oxford Research Group website between May 2005 - April 2006, and conclude
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mor, Nuriel Shalom. "Impact of Sense of Community, Ideology, and Religiosity on Post Traumatic Stress Disorder Symptomatology From Chronic Terror Attacks." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2856.

Повний текст джерела
Анотація:
Since 2000, the southern Israeli town of Sderot and a neighboring rural region, Otef Aza, have been frequently exposed to nearly identical terror attacks by Hamas. While only a small minority of Otef Aza residents have been diagnosed with post-traumatic stress disorder (PTSD), more than a third of Sderot residents have been diagnosed with PTSD. Factors such as social cohesion and ideology may be the unique factors that protect Otef Aza kibbutzim residents from PTSD; however, a gap in the literature exists as to how these same factors might affect PTSD symptomology in Sderot residents. Orthodox
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Книги з теми "Hijacking and Terror Attacks"

1

Amis, Martin. The second plane: September 11 : terror and boredom. Alfred A. Knopf, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Amis, Martin. The second plane: September 11 : terror and boredom. A.A. Knopf Canada, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Vivian, Head, ed. Terror attacks. Futura, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Jagtiani, Lata. Mumbai terror attacks. Rupa & Co., 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Jagtiani, Lata. Mumbai terror attacks. Rupa & Co., 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ashwood, Thomas M. Terror in the skies. Stein and Day, 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bodden, Valerie. The 9/11 terror attacks: Odysseys. Creative Education, 2016.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Testrake, John. Triumph over terror on Flight 847. F.H. Revell Co., 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

David, Wimbish, ed. Triumph over terror on Flight 847. F.H. Revell Co., 1987.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ergun, Capan, ed. An Islamic perspective: Terror and suicide attacks. 2nd ed. The Light, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Частини книг з теми "Hijacking and Terror Attacks"

1

Johns, Martin. "Session Hijacking Attacks." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_661.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Johns, Martin. "Session Hijacking Attacks." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_661.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Barbar, Mohamad, Yulei Sui, Hongyu Zhang, Shiping Chen, and Jingling Xue. "Live Path CFI Against Control Flow Hijacking Attacks." In Information Security and Privacy. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3_45.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Vogelsang, Terry. "LLM Controls Execution Flow Hijacking." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_10.

Повний текст джерела
Анотація:
AbstractLLMs can be vulnerable to prompt injection attacks. Similar to how code injections can alter the behavior of a given program, malicious prompt injection can influence the execution flow of a specific business logic. This is due to their reliance on user-provided text for controlling execution flow. In the context of interactive systems, this poses significant business and cybersecurity risks. Mitigations such as prohibiting the use of LLMs in critical systems, developing prompt and resulting API calls verification tools, implementing security by designing good practices, and enhancing
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hetzer, Wolfgang. "Terrorist Attacks: Criminal Prosecution or National Defence?" In A War on Terror? Springer New York, 2009. http://dx.doi.org/10.1007/978-0-387-89291-7_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tripathy, Somanath, and Praveen Kumar. "CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy." In Network and System Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Win, Su Su, and Mie Mie Su Thwin. "Handling the Hypervisor Hijacking Attacks on Virtual Cloud Environment." In Advances in Biometrics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30436-2_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Cai, Hang, and Krishna K. Venkatasubramanian. "Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors." In Mission-Oriented Sensor Networks and Systems: Art and Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91146-5_20.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Steinhausler, Friedrich. "EU Efforts in Managing CBRN Terror Attacks." In NATO Science for Peace and Security Series B: Physics and Biophysics. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Shachar, Ayelet. "7. The Search for Equal Membership in the Age of Terror." In After the Paris Attacks, edited by Edward M. Iacobucci and Stephen J. Toope. University of Toronto Press, 2015. http://dx.doi.org/10.3138/9781442630024-008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Hijacking and Terror Attacks"

1

Yang, Zijiao, Xiangxi Shi, Eric Slyman, and Stefan Lee. "Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks." In 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2025. https://doi.org/10.1109/wacv61041.2025.00594.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Apostolaki, Maria, Aviv Zohar, and Laurent Vanbever. "Hijacking Bitcoin: Routing Attacks on Cryptocurrencies." In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. http://dx.doi.org/10.1109/sp.2017.29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Schlamp, Johann, Georg Carle, and Ernst W. Biersack. "How to prevent AS hijacking attacks." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2413247.2413265.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Muller, Raymond, Yanmao Man, Z. Berkay Celik, Ming Li, and Ryan Gerdes. "Physical Hijacking Attacks against Object Trackers." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3548606.3559390.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Toure, Ibrahim, and Aryya Gangopadhyay. "Analyzing terror attacks using latent semantic indexing." In 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2013. http://dx.doi.org/10.1109/ths.2013.6699024.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Cremers, Cas, Kasper B. Rasmussen, Benedikt Schmidt, and Srdjan Capkun. "Distance Hijacking Attacks on Distance Bounding Protocols." In 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change. IEEE, 2012. http://dx.doi.org/10.1109/sp.2012.17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wu, Min-Hao, Fu-Hau Hsu, Ting-Cheng Chang, and Liang Hsuan Lin. "Preventing Activity Hijacking Attacks in Android APP." In 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS). IEEE, 2019. http://dx.doi.org/10.1109/ecbios.2019.8807833.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Krasnyánszki, Brúnó, Sándor Tihamér Brassai, and András Németh. "UAV weaknesses against deauthentication based hijacking attacks." In 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2024. http://dx.doi.org/10.1109/sami60510.2024.10432859.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cheng, Kefei, Meng Gao, and Ruijie Guo. "Analysis and Research on HTTPS Hijacking Attacks." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.187.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hochdorf, Zipi, and Irit Gill-Lev. "Empowering Couples Victimized by Terror Attacks in Israel." In The International Conference on Research in Psychology. Acavent, 2019. http://dx.doi.org/10.33422/icrpconf.2019.03.133.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Hijacking and Terror Attacks"

1

Водолєєва, І. С., А. О. Лазаренко та В. М. Соловйов. Дослідження стійкості мультиплексних мереж під час кризових явищ. Видавець Вовчок О.Ю., 2017. http://dx.doi.org/10.31812/0564/1259.

Повний текст джерела
Анотація:
Demonstrated features of modeling random and directed attacks on the network as the basis for timely monitoring adverse events and to ensure the stability and reliability of the system. A testing system developed indicators robustness for example the actual functioning of complex systems, including a series of attacks on the social, technical and terror networks modeled changing dynamics of the occurrence of such attacks. Analysis of the results gives rise to recommendations for practical application range of indicators developed as a system of sustainable development of complex socio-economic
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Castañeda, A. Reporting on terror. Analysis of the use of infographics in news on the Barcelona terror attacks of 17 August, 2017, by print newspapers from the Basque Autonomous Community. Revista Latina de Comunicación Social, 2018. http://dx.doi.org/10.4185/rlcs-2018-1275en.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Повний текст джерела
Анотація:
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review foc
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!