Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Hijacking and Terror Attacks.

Статті в журналах з теми "Hijacking and Terror Attacks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Hijacking and Terror Attacks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Supardi, Achmad. "Indonesian Muslims and Christians Positions During a Terror Attack: Analysis on Facebook Posts #prayforsurabaya." Jurnal Komunikasi: Malaysian Journal of Communication 38, no. 1 (2022): 74–98. http://dx.doi.org/10.17576/jkmjc-2022-3801-05.

Повний текст джерела
Анотація:
Indonesians and the world were shocked by a series of terror attacks in Surabaya, East Java, 13-14 May 2018. As predicted, Indonesians went online to share their mourning and condemnation of the attacks. Facebook posts with the hashtag #prayforsurabaya are places for online users to express their thoughts. This research employed content analysis and Leximancer’s thematic analysis to investigate three research questions: the dominant themes among the Facebook users’ responses as shown in #prayforsurabaya, how Facebook users position the terror attacks and religious identity within the Indonesia
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zubrzycki, Waldemar. "The Security of the Republic of Poland’s Maritime Areas and the Polish Coast in the Context of Terrorist Attacks." Internal Security 9, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7465.

Повний текст джерела
Анотація:
The threat of terrorist attack posed to the Republic of Poland is of a potential character and possible targets for such attacks include also objects located in the area of the Baltic Sea. Terrorist activities may be carried out in order to destroy or render vessels such as passenger, cargo and the navy ships, hydraulic structures and port facilities inoperative, as well as to take control over them. A terrorist attack may also aim at causing an environmental disaster. Direct targets of terrorist attacks may be passengers or crew members, but attempts of cargo seizure may also be expected. Pot
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.

Повний текст джерела
Анотація:
Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most dangerous attack. There are a number of measures proposed to prevent SSL tripping-based session hijacking attacks. However, existing surveys did not summarize all the preventive measures in a comprehensive manner (without much illustration and categorization). The objective of this paper is to provide a comprehensive survey of existing measures
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Cherckesova, Larissa, Elena Revyakina, Evgeniya Roshchina, and Vitaliy Porksheyan. "The development of countermeasures against session hijacking." E3S Web of Conferences 531 (2024): 03019. http://dx.doi.org/10.1051/e3sconf/202453103019.

Повний текст джерела
Анотація:
This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and sites much vulnerability, which developers often do not pay attention to, are occurred. The paper presents a practical implementation of one of the attacks (MITM), and also proposes methods to counteract and protect against most types of attacks. The main purpose of this paper is to study Session Hijacking attacks and to propose countermeasures against them and existing vulnerabilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kummari Teja and Dr.K.Pavan Kumar. "EXPOSING WEB VULNERABILITIES: A STUDY OF MAN-IN-THE-MIDDLE AND SESSION HIJACKING ATTACKS." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 747–55. https://doi.org/10.62643/ijerst.2025.v21.i2.pp747-755.

Повний текст джерела
Анотація:
These days, data is king, thanks to the Internet. This data is very susceptible to attackers because of the seemingly open access Internet service. Attacks happening on the web may compromise users' data privacy. Attacks that occur on the Internet, including Man-In-The-Middle and session hijacking, are the subject of this SLR. Using an appropriate research selection approach, it examines around 30 studies spanning from 2016 to 2023. There are three research questions that make up this SLR. The first one gives an overview of recent tendencies in research on session hijacking and man-in-the-midd
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Zhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.

Повний текст джерела
Анотація:
The inter-domain routing system based on the BGP protocol is a kernel establishment in the Internet. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation between prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three tiers based on the power-law and commercial relations of autonomous systems. The relation between network topology
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.

Повний текст джерела
Анотація:
Session Hijacking is an attack which is basically used to gain the unauthorized access between an authorized session connections. This is usually done to attack the social network website and banking websites in order to gain the access over the valid session as well as over the website too. These attacks are one of the commonly experienced cyber threats in today’s network. Most of the websites and networks are vulnerable from this kind of attack. For providing the protection I have given the multiple ways to protecting from this session hijacking attack. I have especially focused on one of th
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Shaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.

Повний текст джерела
Анотація:
Cybersecurity threats such as Man-in-the-Middle (MITM) attacks and Session Hijacking (SH) account for over 35% of web-based cyber intrusions, causing financial losses exceeding $6 billion annually. Despite extensive research on these attacks independently, a unified analysis remains underexplored. This study bridges that gap by conducting a Systematic Literature Review (SLR) on over 150 research papers from IEEE, ACM, and ScienceDirect, comparing MITM and SH in terms of attack frequency, methodologies, vulnerabilities, and countermeasures.<strong> </strong>Our findings indicate that MITM attac
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.

Повний текст джерела
Анотація:
WhatsApp provides a fertile ground for the large-scale dissemination of information, particularly in countries like Brazil and India. Given its increasing popularity and use for political discussions, it is paramount to ensure that WhatsApp groups are adequately protected from attackers who aim to disrupt the activity of WhatsApp groups. Motivated by this, in this work, we characterize two types of attacks that may disrupt WhatsApp groups. We look into the flooding attack, where an attacker shares a large number of usually duplicate messages within a short period, and the hijacking attack, whe
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rai, Tage S. "Predicting future terror attacks." Science 366, no. 6467 (2019): 834.7–835. http://dx.doi.org/10.1126/science.366.6467.834-g.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Schlamp, Johann, Ralph Holz, Quentin Jacquemart, Georg Carle, and Ernst W. Biersack. "HEAP: Reliable Assessment of BGP Hijacking Attacks." IEEE Journal on Selected Areas in Communications 34, no. 6 (2016): 1849–61. http://dx.doi.org/10.1109/jsac.2016.2558978.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Mirzabeigi, Abdollah, Ali Kazemy, Mehdi Ramezani, and Seyed Mohammad Azimi. "Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems." International Transactions on Electrical Energy Systems 2023 (May 19, 2023): 1–15. http://dx.doi.org/10.1155/2023/6622346.

Повний текст джерела
Анотація:
Today, eliminating the effects of cyber-attacks is essential for stability and synchronization in island microgrids. In this article, island microgrid has been investigated from the view of multiagent systems and graph theory. This study uses the cooperative distributed hierarchical controller in two primary and secondary layers to control the hijacking cyber-attack in the islanded microgrid. Hijacking attacks’ impact on the control of distributed generators (DGs) has been mathematically formulated, and a suitable controller has been designed. Then, global stability and simultaneous synchroniz
Стилі APA, Harvard, Vancouver, ISO та ін.
13

R, Santhakumar, Keerthana R, Madhubala S, and Dr Thamizh Selvam D. "Session Hijacking in Cybersecurity: Threats, Prevention Strategies, and Future Directions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft029.

Повний текст джерела
Анотація:
Session hijacking poses a grim threat to cybersecurity, for the attackers take undue advantage of an active session to access protected user accounts and confidential information without consent. This is a direct attack on the session tokens, usually performed by packet sniffing, XSS, or MITM. Web session protection is vital with the growing trend of digital interactions to avert identification theft, financial scamming, and data breaches. This paper helps analyse methods of session hijacking, methods of prevention, and the building of better security practices such as encryption, token valida
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Eriksson Krutrök, Moa, and Simon Lindgren. "Continued Contexts of Terror: Analyzing Temporal Patterns of Hashtag Co-Occurrence as Discursive Articulations." Social Media + Society 4, no. 4 (2018): 205630511881364. http://dx.doi.org/10.1177/2056305118813649.

Повний текст джерела
Анотація:
This study looks at how terror attacks are rendered discursively meaningful on social media through the concurrent use and reiteration of terror hashtags, which were created following previous incidents of terror. The article focuses on 12 terror attacks in Europe in 2015-2017 and their relating hashtags on Twitter, to see how various combinations of these were reused and co-articulated in tweets posted in relation to subsequent attacks. Through social network analysis of co-occurring hashtags in about 3 million tweets, in combination with close readings of a smaller sample, this study aims to
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Faria, João Ricardo, and Daniel Arce. "The Path of Terror Attacks." Games 12, no. 2 (2021): 35. http://dx.doi.org/10.3390/g12020035.

Повний текст джерела
Анотація:
This paper derives a dynamic path of ongoing terror attacks as a function of terrorists’ capacity and a target government’s counterterror capacity. The analysis provides several novel insights and characterizations. First, the effect of counterterror policy is limited. Second, proactive counterterror policy affects the depreciation (fatigue) of terrorists’ capacity, and defensive counterterror policy limits the worst-case scenario. Third, fluctuations in the time path of attacks are a function of terrorists’ time preferences and adjustment costs of changing tactics, which are policy invariant.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Mogensen, Kirsten. "Television journalism during terror attacks." Media, War & Conflict 1, no. 1 (2008): 31–49. http://dx.doi.org/10.1177/1750635207087624.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Goldman, Ogen. "The Globalization of Terror Attacks." Terrorism and Political Violence 23, no. 1 (2010): 31–59. http://dx.doi.org/10.1080/09546553.2010.514776.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Hasso, Tim, Matthias Pelster, and Bastian Breitmayer. "Terror attacks and individual investor behavior: Evidence from the 2015–2017 European terror attacks." Journal of Behavioral and Experimental Finance 28 (December 2020): 100397. http://dx.doi.org/10.1016/j.jbef.2020.100397.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Baccini, Leonardo, Abel Brodeur, Sean Nossek, and Eran Shor. "Terrorism and Voting Behavior: Evidence from the United States." Research & Politics 8, no. 1 (2021): 205316802098733. http://dx.doi.org/10.1177/2053168020987333.

Повний текст джерела
Анотація:
This article examines the impact of terrorism on voting behavior in the United States. We rely on an exhaustive list of terror attacks over the period 1970–2016 and exploit the inherent randomness of the success or failure of terror attacks to identify the political impacts of terrorism. We first confirm that the success of terror attacks is plausibly random by showing that it is orthogonal to potential confounders. We then show that on average successful attacks have no effect on presidential and non-presidential elections. As a benchmark, we also rely on a more naïve identification strategy
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Hoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms in the use of internet." Global Journal of Computer Sciences: Theory and Research 12, no. 1 (2022): 23–31. http://dx.doi.org/10.18844/gjcs.v12i1.7449.

Повний текст джерела
Анотація:
The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. This paper aims to present vulnerability with the respective control mechanisms and to propose an approach for avoiding hijacking threats by using one-time cookies along with other preventi
Стилі APA, Harvard, Vancouver, ISO та ін.
21

He, Xing, Jiahao Chen, Yuwen Pu, et al. "CAMH: Advancing Model Hijacking Attack in Machine Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 16 (2025): 17141–49. https://doi.org/10.1609/aaai.v39i16.33884.

Повний текст джерела
Анотація:
In the burgeoning domain of machine learning, the reliance on third-party services for model training and the adoption of pre-trained models have surged. However, this reliance introduces vulnerabilities to model hijacking attacks, where adversaries manipulate models to perform unintended tasks, leading to significant security and ethical concerns, like turning an ordinary image classifier into a tool for detecting faces in pornographic content, all without the model owner’s knowledge. This paper introduces Category-Agnostic Model Hijacking (CAMH), a novel model hijacking attack method capable
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Susanto, Andy, and Wahyu Kusuma Raharja. "Simulation and Analysis of Network Security Performance Using Attack Vector Method for Public Wifi Communication." IJICS (International Journal of Informatics and Computer Science) 5, no. 1 (2021): 7. http://dx.doi.org/10.30865/ijics.v5i1.2764.

Повний текст джерела
Анотація:
The use of wifi networks in public spaces has a risk of robbery of user access data in cyberspace, such as banking transactions, social media and other online access. The threat of Man In The Middle Attack (MITM) attacks is carried out on public wifi networks to gain access to user information by illegal means. The attack vector simulation process is carried out on the site access exampleriset.com/dvwa/login.php. ARP Poisoning attack with Ettercap device performs interception and manipulation which provides 08: 00: 27: 25: 22: 99 MAC address information to the target. Session Hijacking attack
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Bugliesi, Michele, Stefano Calzavara, Riccardo Focardi, and Wilayat Khan. "CookiExt: Patching the browser against session hijacking attacks." Journal of Computer Security 23, no. 4 (2015): 509–37. http://dx.doi.org/10.3233/jcs-150529.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Ragazzi, Francesco. "The Paris attacks: magical thinking & hijacking trust." Critical Studies on Security 4, no. 2 (2016): 225–28. http://dx.doi.org/10.1080/21624887.2016.1216051.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Sahoo, Subham, Jimmy Chih-Hsien Peng, Sukumar Mishra, and Tomislav Dragicevic. "Distributed Screening of Hijacking Attacks in DC Microgrids." IEEE Transactions on Power Electronics 35, no. 7 (2020): 7574–82. http://dx.doi.org/10.1109/tpel.2019.2957071.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Bouks, Barak. "Israel’s Strategic Threats and Challenges." Security science journal 4, no. 1 (2023): 119–33. http://dx.doi.org/10.37458/ssj.4.1.8.

Повний текст джерела
Анотація:
Israel is characterized as a Jewish democratic state. Its location in the Middle-East is a driver of significant unique security threats and challenges for its citizens. Albeit having peace treaties with Egypt, Jordan and the PA (Palestinian Authority), culminating with the Abraham accords in the regional arena, it is still surrounded by hostile countries such as Syria and Lebanon vis-à-vis terror groups, culminating with Iran in the broader arena, which can be defined as a patron of terror to all of the above. Through a discussion of the following main hypotheses, this article will discuss ke
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Abugharsa, Afif, Bashir Elkharraz, and Eltohami Elghoul. "BGP Prefix Hijacking Attack and its Prevention Methods." International Journal of Advanced Networking and Applications 16, no. 02 (2024): 6328–31. http://dx.doi.org/10.35444/ijana.2024.16203.

Повний текст джерела
Анотація:
The Border Gateway Protocol (BGP) is an Internet routing protocol that is widely used. With the introduction and implementation of various security features to prevent attacks and alleviate routing instabilities, BGP remains vulnerable due to the lack of integrity and authentication of BGP messages. BGP operations are highly dependent on its security, and attacks against BGP have a detrimental effect on packet forwarding. Given the importance of BGP security, Two techniques to improve BGP session security have been studied in this project to improve secure Internet routing, this project descri
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Olsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.

Повний текст джерела
Анотація:
&#x0D; &#x0D; &#x0D; In essence, terror attacks are communicative events. From the perspective of political leaders, the challenge is to make sense of the event by explaining what has happened, who is behind the attack, what is the most appropriate response, and how to move forward. Adding to the difficulties is the fact that leaders have to communicate in a highly mediated environment. In this article, we explore the Norwegian government’s crisis communication in the terrorist attacks in Oslo and on the island of Utöya on July 22, 2011. We do so by applying a model of crisis framing. Accordi
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Ali, Raden Muhammad, and Aria Candramukti. "Terrorism as reflected in Joseph Conrad’s the secret agent: A sociological approach." UAD TEFL International Conference 2 (January 17, 2021): 62. http://dx.doi.org/10.12928/utic.v2.5737.2019.

Повний текст джерела
Анотація:
Nowadays, there are so many people talking and discussing what we called terrorism. However, most of us still do not have sufficient insight related to the kinds, motivations, and purposes of terror attacks. This paper is aimed to find the types of terror attack as reflected in The Secret Agent by Joseph Conrad and to show the causes of terror as reflected in the novel. The researchers apply descriptive qualitative as the method of analyzing the data. Some of the research findings are as follows. First, the terror attacks found in the novel are physical and mental. Second, the causes of terror
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Hoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms." Global Journal of Information Technology: Emerging Technologies 12, no. 1 (2022): 77–85. http://dx.doi.org/10.18844/gjit.v12i1.7749.

Повний текст джерела
Анотація:
The concept of Internet security is studied by computer science as a safe medium for exchanging data while minimizing the likelihood of online threats. The extensive use of advanced web-based software in different industries such as education, retail, medical care, and payment systems, represents a security challenge for the programmers and an opportunity for the hackers to attack through session hijacking. Based on recent OWASP guidelines, this kind of attack is indeed one of the most frequent attacks that happens lately. Session hijacking happens as a result of poorly designed websites and a
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Goldman, Ogen S., and Michal Neubauer-Shani. "Does International Tourism Affect Transnational Terrorism?" Journal of Travel Research 56, no. 4 (2016): 451–67. http://dx.doi.org/10.1177/0047287516649059.

Повний текст джерела
Анотація:
Studies focusing on the relationship between transnational terrorism and tourism examine the effect of terror on tourism, while this study looks at a different question: does international tourism affect transnational terrorism? We hypothesized that the higher the number of international tourist arrivals to a country, the higher the number of terror attacks, and examined this effect from four distinct aspects: perpetration by foreign attackers against local victims, perpetration by local attackers against foreign victims, perpetration by foreign attackers against foreign victims, and perpetrat
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Brodeur, Abel. "The Effect of Terrorism on Employment and Consumer Sentiment: Evidence from Successful and Failed Terror Attacks." American Economic Journal: Applied Economics 10, no. 4 (2018): 246–82. http://dx.doi.org/10.1257/app.20160556.

Повний текст джерела
Анотація:
This paper examines the economic consequences of terror attacks by exploiting the inherent randomness in the success or failure of terror attacks. The findings suggest that successful attacks, in comparison to failed attacks, reduce the number of jobs and total earnings in targeted counties by approximately 2 percent in the years following the attack. Analyzing the channels, I find that successful attacks affect, in particular, specific industries such as housing. Last, I show that successful attacks receive more media coverage and increase levels of consumer pessimism in terms of business con
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Ouellet, Marie, and Martin Bouchard. "Terror on Repeat." International Criminal Justice Review 26, no. 4 (2016): 316–36. http://dx.doi.org/10.1177/1057567716666642.

Повний текст джерела
Анотація:
Criminal and terrorist organizations often depend on repeat offenders to maintain the group’s longevity, especially after repeated law enforcement interventions. Yet, little is known about the offenders who perpetrate multiple incidents on behalf of a group. Relying on data for 118 terrorist offenders involved across eight attacks from 2000 to 2005, this study examines the correlates of repeat offending within a terrorist organization. Our main predictor, criminal social capital, is measured by the number and structure of co-offending ties. Poisson regression results demonstrate that offenders
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Разинкин, К. А., А. А. Науменко, А. И. Мордовин, О. Н. Чопоров, and Ю. В. Макаров. "IMPROVING THE SECURITY OF TELECOMMUNICATION NETWORKS BUILT ON THE BASIS OF THE BGP PROTOCOL: ALGORITHMIC SUPPORT FOR THE ASSESSMENT AND REGULATION OF IMPLEMENTATION RISKS IP HIJACKING ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 1(-) (2023): 61–72. http://dx.doi.org/10.36622/vstu.2023.26.1.008.

Повний текст джерела
Анотація:
В статье предложена методика повышения защищенности телекоммуникационных сетей, построенных на базе протокола BGP от атаки IP-hijacking, направленной на нарушение конфиденциальности и доступности перехваченной информации автономных систем. Ключевой составляющей данной методики является алгоритм оценки и регулирования рисков успешной реализации атаки IP-hijacking на телекоммуникационную сеть. В работе представлены особенности топологии телекоммуникационной сети, построенной на базе протокола BGP, и специфика атаки IP-hijacking, типовой сценарий реализации атаки, включающий описание уязвимостей
Стилі APA, Harvard, Vancouver, ISO та ін.
35

LI, Kai, Yongyu GUO, and Shenlong YANG. "Public risk perception of terror attacks." Advances in Psychological Science 25, no. 2 (2017): 358. http://dx.doi.org/10.3724/sp.j.1042.2017.00358.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Arehart-Treichel, Joan. "Driving Accidents Up After Terror Attacks." Psychiatric News 39, no. 19 (2004): 22. http://dx.doi.org/10.1176/pn.39.19.0390022b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Feinstein, Jonathan S., and Edward H. Kaplan. "Counterterror intelligence operations and terror attacks." Public Choice 149, no. 3-4 (2011): 281–95. http://dx.doi.org/10.1007/s11127-011-9842-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Gonciarz, Agnieszka, and Robert Pich. "INCREASED RISK OF CHEMICAL TERROR ATTACKS." Zeszyty Naukowe SGSP 2, no. 88 (2024): 109–26. http://dx.doi.org/10.5604/01.3001.0054.3831.

Повний текст джерела
Анотація:
The risk of using highly toxic chemicals in a terrorist attack is resurfacing. Over the last fewdecades, terrorists have proven that they can source, develop and produce their own toxicchemicals. These substances are particularly dangerous for civilians who do not have access tothe protective equipment to be used in the event of contamination. It is impossible to guaranteefull public security in relation to the threats of chemical terrorism. Only trained, functioningand cooperating elements of state crisis response systems (mainly: medical rescue services,fire brigades, the police and the army
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Cole, L. "(A103) Understanding Terror Medicine." Prehospital and Disaster Medicine 26, S1 (2011): s28. http://dx.doi.org/10.1017/s1049023x11001051.

Повний текст джерела
Анотація:
The term terror medicine emerged early in the 21st century to describe medical issues associated with terrorist events. While related to emergency and disaster medicine, the field also includes several features that are specific to terrorist attacks. The Israeli healthcare experience as related to terrorist attacks during the intifada (2000–2006), provides a base for comparison to responses elsewhere including to events in Oklahoma City (1995), Madrid (2004), and London (2005). Terror medicine covers four broad areas. First is preparedness, which encompasses hospital surge capacity, training a
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Jati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries." Simulacra 4, no. 2 (2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.

Повний текст джерела
Анотація:
This article aims for revisiting the terrorism studies from different perspective. The terror attacks itself cannot be hundred percent zero but it just fluctuated trend. More specifically, terrorism always adaptive in following trends. While terror attacks still to target innocent civilians, the perpetrators could be closest relatives and neighbors. The way terror attack to reach out that group of people basically shows the silent role of returning foreign fighters (RFF)/returnees nurturing dan breeding terror ideologies. By using critical literature review especially historical narrative anal
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Cui, Xi, and Eric Rothenbuhler. "Communicating Terror: Mediatization and Ritualization." Television & New Media 19, no. 2 (2017): 155–62. http://dx.doi.org/10.1177/1527476417715685.

Повний текст джерела
Анотація:
In this essay, we explicate the internal logic of contemporary terrorist acts and our society’s responses, to denaturalize the label and meanings we give to “terrorism.” We argue that contemporary terrorism communicates intimidation, fear, and anxiety through the ritualization and mediatization of terrorist attacks. Mediatization refers to the strategic coercion of imperative media coverage of the attacks, and ritualization refers to the focus on sacred life structures in both terrorist attacks and remedial responses. In combining ritualization and mediatization, terrorism aims to introduce ma
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Waters, Andrew J., W. Gerrod Parrott, Karin Mogg, Brendan P. Bradley, Mary C. Fuller, and Joan M. Wertz. "Processing Bias for Terror-Related Stimuli and September 11Th-Related Distress in College Students." Psychological Reports 101, no. 3 (2007): 787–95. http://dx.doi.org/10.2466/pr0.101.3.787-795.

Повний текст джерела
Анотація:
The psychological sequelae of the September 11th terrorist attacks were examined in 249 college students at three sites in the USA and one site in the UK in the year following the attacks. Participants completed questionnaires tapping 9/11-related exposure and distress, and completed a modified Stroop task assessing time to color-name cards containing terror-related and neutral words. Geographical location and amount of exposure to the attacks were significant predictors of self-reported 9/11-related distress, but were not associated with processing bias for terror-related stimuli. Self-report
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Morton, Brian. "Terror and the Ethics of Resistance." Dissent 70, no. 4 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a918676.

Повний текст джерела
Анотація:
ABSTRACT: After the terror attacks of September 11, 2001, it took the United States almost two years to forfeit the sympathy of the world. After the terror attacks of October 7 of last year, Israel, a more nimble superpower, accomplished the same feat in just a few days. Because the atrocities committed by Hamas have been eclipsed by the horrors that Israel has brought down on the people of Gaza, a consideration of the way the U.S. left responded to Hamas’s attacks might seem to be of nothing more than historical interest. But some of the questions raised by our responses should still be of co
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Morton, Brian. "Terror and the Ethics of Resistance." Dissent 71, no. 1 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a929088.

Повний текст джерела
Анотація:
ABSTRACT: After the terror attacks of September 11, 2001, it took the United States almost two years to forfeit the sympathy of the world. After the terror attacks of October 7 of last year, Israel, a more nimble superpower, accomplished the same feat in just a few days. Because the atrocities committed by Hamas have been eclipsed by the horrors that Israel has brought down on the people of Gaza, a consideration of the way the U.S. left responded to Hamas's attacks might seem to be of nothing more than historical interest. But some of the questions raised by our responses should still be of co
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Gao, Zhen, Fucai Chen, Yawen Wang, Weizhen He, Xin Shi, and Genlin Xie. "MVPN: A Defense Architecture against VPN Traffic Hijacking Based on MTD." Electronics 12, no. 3 (2023): 711. http://dx.doi.org/10.3390/electronics12030711.

Повний текст джерела
Анотація:
With the increasing awareness of privacy protection, Virtual Private Networks (VPNs) are widely used to build a more secure communication tunnel. However, a traffic hijacking attack called blind in/on-path has seriously threatened the security of VPNs. Inspired by Moving Target Defense (MTD), Moving VPN architecture (MVPN) is designed to defend against such attacks. MVPN includes multiple nodes to encrypt and decrypt traffic to enhance reliability. Thus, the consistency judgment algorithm is proposed to make MVPN obtain the ability to perceive attacks. Moreover, according to the judgment resul
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Khraban, Ihor, and Serhii Yevtukh. "STATE TERROR OF RUSSIA AGAINST UKRAINE." STATE SECURITY 1, no. 3 (2024): 118–24. http://dx.doi.org/10.33405/2786-8613/2024/1/3/309968.

Повний текст джерела
Анотація:
The question of the terrorist activities of the russian federation during the full-scale war against Ukraine aimed at destroying the country�s economic potential and achieving the political objectives of this armed conflict is considered. An analysis of the main targets of attacks on strategic objects of Ukraine, the consequences of these attacks, and ways of countering terror on the part of the aggressor country has been carried out.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Tew, Joanna, and Richard Ward. "Paramedics at risk? How responding to a terror attack affects mental wellbeing." Journal of Paramedic Practice 16, no. 10 (2024): 416–25. http://dx.doi.org/10.12968/jpar.2023.0061.

Повний текст джерела
Анотація:
Background: Terror attacks have a significant impact on first responders’ wellbeing, with an associated risk of post-traumatic stress disorder (PTSD). Aims: To improve understanding of how responding to terror attacks affects paramedics’ mental health. Methodology: A literature search was carried out on databases using the PRISMA strategy. Critical appraisal tools were used alongside thematic analysis to appraise and synthesise the literature. Findings: Ten papers were identified. Themes arising regarding risks to responders included: the level of exposure, with the amount related to the risks
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Luhmann, Maike, and Wiebke Bleidorn. "Changes in Affect, Cognition, and Perceived Behavioral Changes Among Vicarious Victims of the Paris Terrorist Attacks of November 13, 2015." Social Psychological and Personality Science 9, no. 2 (2017): 214–22. http://dx.doi.org/10.1177/1948550617732818.

Повний текст джерела
Анотація:
Terrorist attacks are supposed to hit not only the direct victims but the entire society. In this prospective longitudinal study, we examined changes in mood, life satisfaction, and terror-related cognitions and perceived behavioral changes 2, 4, and 8 weeks after the terrorist attacks of November 13, 2015, in Paris in a sample of the so-called vicarious victims ( N = 201). Average mood levels dropped significantly after the attacks compared to preattack levels but recovered within 8 weeks. Average levels of life satisfaction did not change significantly across this time period. Level of preoc
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Trikalinou, Anna, and Nikolaos G. Bourbakis. "A Survey on Protection Methodologies Against Control Flow Hijacking Attacks." IEEE Potentials 33, no. 6 (2014): 21–26. http://dx.doi.org/10.1109/mpot.2014.2344211.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Olsson, Filip. "Implicit Terror: A Natural Experiment on How Terror Attacks Affect Implicit Bias." Sociological Science 11 (2024): 379–412. http://dx.doi.org/10.15195/v11.a14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!