Добірка наукової літератури з теми "Hijacking and Terror Attacks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Hijacking and Terror Attacks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Hijacking and Terror Attacks"
Supardi, Achmad. "Indonesian Muslims and Christians Positions During a Terror Attack: Analysis on Facebook Posts #prayforsurabaya." Jurnal Komunikasi: Malaysian Journal of Communication 38, no. 1 (2022): 74–98. http://dx.doi.org/10.17576/jkmjc-2022-3801-05.
Повний текст джерелаZubrzycki, Waldemar. "The Security of the Republic of Poland’s Maritime Areas and the Polish Coast in the Context of Terrorist Attacks." Internal Security 9, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7465.
Повний текст джерелаHossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.
Повний текст джерелаCherckesova, Larissa, Elena Revyakina, Evgeniya Roshchina, and Vitaliy Porksheyan. "The development of countermeasures against session hijacking." E3S Web of Conferences 531 (2024): 03019. http://dx.doi.org/10.1051/e3sconf/202453103019.
Повний текст джерелаKummari Teja and Dr.K.Pavan Kumar. "EXPOSING WEB VULNERABILITIES: A STUDY OF MAN-IN-THE-MIDDLE AND SESSION HIJACKING ATTACKS." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 747–55. https://doi.org/10.62643/ijerst.2025.v21.i2.pp747-755.
Повний текст джерелаZhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.
Повний текст джерелаKumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.
Повний текст джерелаShaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.
Повний текст джерелаKansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.
Повний текст джерелаRai, Tage S. "Predicting future terror attacks." Science 366, no. 6467 (2019): 834.7–835. http://dx.doi.org/10.1126/science.366.6467.834-g.
Повний текст джерелаДисертації з теми "Hijacking and Terror Attacks"
Onder, Hulusi. "Session hijacking attacks in wireless local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOnder.pdf.
Повний текст джерелаShibli, Adania. "Visual terror : a study of the visual compositions of the 9/11 attacks and major attacks in the 'War on Terror' by British and French television networks." Thesis, University of East London, 2009. http://roar.uel.ac.uk/3146/.
Повний текст джерелаLanier, Cathy L. "Preventing terror attacks in the Homeland : a new mission for state and local police." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FLanier.pdf.
Повний текст джерелаBotha, Johannes Gideon. "Pastorale versorging van getraumatiseerde slagoffers van geweldmisdaad / Johannes Gideon Botha." Thesis, North-West University, 2004. http://hdl.handle.net/10394/480.
Повний текст джерелаWoods, Joshua. "Imagining terror the people, the press and politics /." Diss., Connect to online resource - MSU authorized users, 2008.
Знайти повний текст джерелаRehman, Abdul. "Impact of drone attacks in Pakistan and the war on terror: A consideration of the effects of drone attacks in Pakistan and whether they are helping or not to win the war on terror!" Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22238.
Повний текст джерелаCoultas, Bryan T. "Crowdsourcing intelligence to combat terrorism: harnessing bottom-up collection to prevent lone-wolf terror attacks." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45174.
Повний текст джерелаManxhuka, Bardh, and Max Hägglund. "The terror attacks of 2015 in Paris and their effect on Perceived Discrimination : The Swedish experience." Thesis, Linnéuniversitetet, Institutionen för nationalekonomi och statistik (NS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105227.
Повний текст джерелаRogers, Paul F. "Into the Long War." Pluto Press, 2006. http://hdl.handle.net/10454/3702.
Повний текст джерелаMor, Nuriel Shalom. "Impact of Sense of Community, Ideology, and Religiosity on Post Traumatic Stress Disorder Symptomatology From Chronic Terror Attacks." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2856.
Повний текст джерелаКниги з теми "Hijacking and Terror Attacks"
Amis, Martin. The second plane: September 11 : terror and boredom. Alfred A. Knopf, 2008.
Знайти повний текст джерелаAmis, Martin. The second plane: September 11 : terror and boredom. A.A. Knopf Canada, 2008.
Знайти повний текст джерелаBodden, Valerie. The 9/11 terror attacks: Odysseys. Creative Education, 2016.
Знайти повний текст джерелаTestrake, John. Triumph over terror on Flight 847. F.H. Revell Co., 1987.
Знайти повний текст джерелаDavid, Wimbish, ed. Triumph over terror on Flight 847. F.H. Revell Co., 1987.
Знайти повний текст джерелаErgun, Capan, ed. An Islamic perspective: Terror and suicide attacks. 2nd ed. The Light, 2004.
Знайти повний текст джерелаЧастини книг з теми "Hijacking and Terror Attacks"
Johns, Martin. "Session Hijacking Attacks." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_661.
Повний текст джерелаJohns, Martin. "Session Hijacking Attacks." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_661.
Повний текст джерелаBarbar, Mohamad, Yulei Sui, Hongyu Zhang, Shiping Chen, and Jingling Xue. "Live Path CFI Against Control Flow Hijacking Attacks." In Information Security and Privacy. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3_45.
Повний текст джерелаVogelsang, Terry. "LLM Controls Execution Flow Hijacking." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_10.
Повний текст джерелаHetzer, Wolfgang. "Terrorist Attacks: Criminal Prosecution or National Defence?" In A War on Terror? Springer New York, 2009. http://dx.doi.org/10.1007/978-0-387-89291-7_10.
Повний текст джерелаTripathy, Somanath, and Praveen Kumar. "CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy." In Network and System Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_7.
Повний текст джерелаWin, Su Su, and Mie Mie Su Thwin. "Handling the Hypervisor Hijacking Attacks on Virtual Cloud Environment." In Advances in Biometrics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30436-2_2.
Повний текст джерелаCai, Hang, and Krishna K. Venkatasubramanian. "Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors." In Mission-Oriented Sensor Networks and Systems: Art and Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91146-5_20.
Повний текст джерелаSteinhausler, Friedrich. "EU Efforts in Managing CBRN Terror Attacks." In NATO Science for Peace and Security Series B: Physics and Biophysics. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5_11.
Повний текст джерелаShachar, Ayelet. "7. The Search for Equal Membership in the Age of Terror." In After the Paris Attacks, edited by Edward M. Iacobucci and Stephen J. Toope. University of Toronto Press, 2015. http://dx.doi.org/10.3138/9781442630024-008.
Повний текст джерелаТези доповідей конференцій з теми "Hijacking and Terror Attacks"
Yang, Zijiao, Xiangxi Shi, Eric Slyman, and Stefan Lee. "Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks." In 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2025. https://doi.org/10.1109/wacv61041.2025.00594.
Повний текст джерелаApostolaki, Maria, Aviv Zohar, and Laurent Vanbever. "Hijacking Bitcoin: Routing Attacks on Cryptocurrencies." In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. http://dx.doi.org/10.1109/sp.2017.29.
Повний текст джерелаSchlamp, Johann, Georg Carle, and Ernst W. Biersack. "How to prevent AS hijacking attacks." In the 2012 ACM conference. ACM Press, 2012. http://dx.doi.org/10.1145/2413247.2413265.
Повний текст джерелаMuller, Raymond, Yanmao Man, Z. Berkay Celik, Ming Li, and Ryan Gerdes. "Physical Hijacking Attacks against Object Trackers." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2022. http://dx.doi.org/10.1145/3548606.3559390.
Повний текст джерелаToure, Ibrahim, and Aryya Gangopadhyay. "Analyzing terror attacks using latent semantic indexing." In 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2013. http://dx.doi.org/10.1109/ths.2013.6699024.
Повний текст джерелаCremers, Cas, Kasper B. Rasmussen, Benedikt Schmidt, and Srdjan Capkun. "Distance Hijacking Attacks on Distance Bounding Protocols." In 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change. IEEE, 2012. http://dx.doi.org/10.1109/sp.2012.17.
Повний текст джерелаWu, Min-Hao, Fu-Hau Hsu, Ting-Cheng Chang, and Liang Hsuan Lin. "Preventing Activity Hijacking Attacks in Android APP." In 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS). IEEE, 2019. http://dx.doi.org/10.1109/ecbios.2019.8807833.
Повний текст джерелаKrasnyánszki, Brúnó, Sándor Tihamér Brassai, and András Németh. "UAV weaknesses against deauthentication based hijacking attacks." In 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2024. http://dx.doi.org/10.1109/sami60510.2024.10432859.
Повний текст джерелаCheng, Kefei, Meng Gao, and Ruijie Guo. "Analysis and Research on HTTPS Hijacking Attacks." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.187.
Повний текст джерелаHochdorf, Zipi, and Irit Gill-Lev. "Empowering Couples Victimized by Terror Attacks in Israel." In The International Conference on Research in Psychology. Acavent, 2019. http://dx.doi.org/10.33422/icrpconf.2019.03.133.
Повний текст джерелаЗвіти організацій з теми "Hijacking and Terror Attacks"
Водолєєва, І. С., А. О. Лазаренко та В. М. Соловйов. Дослідження стійкості мультиплексних мереж під час кризових явищ. Видавець Вовчок О.Ю., 2017. http://dx.doi.org/10.31812/0564/1259.
Повний текст джерелаCastañeda, A. Reporting on terror. Analysis of the use of infographics in news on the Barcelona terror attacks of 17 August, 2017, by print newspapers from the Basque Autonomous Community. Revista Latina de Comunicación Social, 2018. http://dx.doi.org/10.4185/rlcs-2018-1275en.
Повний текст джерелаKelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Повний текст джерела