Статті в журналах з теми "Hijacking and Terror Attacks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Hijacking and Terror Attacks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Supardi, Achmad. "Indonesian Muslims and Christians Positions During a Terror Attack: Analysis on Facebook Posts #prayforsurabaya." Jurnal Komunikasi: Malaysian Journal of Communication 38, no. 1 (2022): 74–98. http://dx.doi.org/10.17576/jkmjc-2022-3801-05.
Повний текст джерелаZubrzycki, Waldemar. "The Security of the Republic of Poland’s Maritime Areas and the Polish Coast in the Context of Terrorist Attacks." Internal Security 9, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7465.
Повний текст джерелаHossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.
Повний текст джерелаCherckesova, Larissa, Elena Revyakina, Evgeniya Roshchina, and Vitaliy Porksheyan. "The development of countermeasures against session hijacking." E3S Web of Conferences 531 (2024): 03019. http://dx.doi.org/10.1051/e3sconf/202453103019.
Повний текст джерелаKummari Teja and Dr.K.Pavan Kumar. "EXPOSING WEB VULNERABILITIES: A STUDY OF MAN-IN-THE-MIDDLE AND SESSION HIJACKING ATTACKS." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 747–55. https://doi.org/10.62643/ijerst.2025.v21.i2.pp747-755.
Повний текст джерелаZhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.
Повний текст джерелаKumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.
Повний текст джерелаShaik, Faqrunnisa, Adil Shaik, Mohammed Arbaaz Shaik, Althaf Ali Shaik, and Arifullah Shaik. "Exploring Web Security Vulnerabilities Considering Man in the Middle and Session Hijacking." International Journal of Computational Learning & Intelligence 4, no. 4 (2025): 580–90. https://doi.org/10.5281/zenodo.15224950.
Повний текст джерелаKansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.
Повний текст джерелаRai, Tage S. "Predicting future terror attacks." Science 366, no. 6467 (2019): 834.7–835. http://dx.doi.org/10.1126/science.366.6467.834-g.
Повний текст джерелаSchlamp, Johann, Ralph Holz, Quentin Jacquemart, Georg Carle, and Ernst W. Biersack. "HEAP: Reliable Assessment of BGP Hijacking Attacks." IEEE Journal on Selected Areas in Communications 34, no. 6 (2016): 1849–61. http://dx.doi.org/10.1109/jsac.2016.2558978.
Повний текст джерелаMirzabeigi, Abdollah, Ali Kazemy, Mehdi Ramezani, and Seyed Mohammad Azimi. "Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems." International Transactions on Electrical Energy Systems 2023 (May 19, 2023): 1–15. http://dx.doi.org/10.1155/2023/6622346.
Повний текст джерелаR, Santhakumar, Keerthana R, Madhubala S, and Dr Thamizh Selvam D. "Session Hijacking in Cybersecurity: Threats, Prevention Strategies, and Future Directions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft029.
Повний текст джерелаEriksson Krutrök, Moa, and Simon Lindgren. "Continued Contexts of Terror: Analyzing Temporal Patterns of Hashtag Co-Occurrence as Discursive Articulations." Social Media + Society 4, no. 4 (2018): 205630511881364. http://dx.doi.org/10.1177/2056305118813649.
Повний текст джерелаFaria, João Ricardo, and Daniel Arce. "The Path of Terror Attacks." Games 12, no. 2 (2021): 35. http://dx.doi.org/10.3390/g12020035.
Повний текст джерелаMogensen, Kirsten. "Television journalism during terror attacks." Media, War & Conflict 1, no. 1 (2008): 31–49. http://dx.doi.org/10.1177/1750635207087624.
Повний текст джерелаGoldman, Ogen. "The Globalization of Terror Attacks." Terrorism and Political Violence 23, no. 1 (2010): 31–59. http://dx.doi.org/10.1080/09546553.2010.514776.
Повний текст джерелаHasso, Tim, Matthias Pelster, and Bastian Breitmayer. "Terror attacks and individual investor behavior: Evidence from the 2015–2017 European terror attacks." Journal of Behavioral and Experimental Finance 28 (December 2020): 100397. http://dx.doi.org/10.1016/j.jbef.2020.100397.
Повний текст джерелаBaccini, Leonardo, Abel Brodeur, Sean Nossek, and Eran Shor. "Terrorism and Voting Behavior: Evidence from the United States." Research & Politics 8, no. 1 (2021): 205316802098733. http://dx.doi.org/10.1177/2053168020987333.
Повний текст джерелаHoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms in the use of internet." Global Journal of Computer Sciences: Theory and Research 12, no. 1 (2022): 23–31. http://dx.doi.org/10.18844/gjcs.v12i1.7449.
Повний текст джерелаHe, Xing, Jiahao Chen, Yuwen Pu, et al. "CAMH: Advancing Model Hijacking Attack in Machine Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 16 (2025): 17141–49. https://doi.org/10.1609/aaai.v39i16.33884.
Повний текст джерелаSusanto, Andy, and Wahyu Kusuma Raharja. "Simulation and Analysis of Network Security Performance Using Attack Vector Method for Public Wifi Communication." IJICS (International Journal of Informatics and Computer Science) 5, no. 1 (2021): 7. http://dx.doi.org/10.30865/ijics.v5i1.2764.
Повний текст джерелаBugliesi, Michele, Stefano Calzavara, Riccardo Focardi, and Wilayat Khan. "CookiExt: Patching the browser against session hijacking attacks." Journal of Computer Security 23, no. 4 (2015): 509–37. http://dx.doi.org/10.3233/jcs-150529.
Повний текст джерелаRagazzi, Francesco. "The Paris attacks: magical thinking & hijacking trust." Critical Studies on Security 4, no. 2 (2016): 225–28. http://dx.doi.org/10.1080/21624887.2016.1216051.
Повний текст джерелаSahoo, Subham, Jimmy Chih-Hsien Peng, Sukumar Mishra, and Tomislav Dragicevic. "Distributed Screening of Hijacking Attacks in DC Microgrids." IEEE Transactions on Power Electronics 35, no. 7 (2020): 7574–82. http://dx.doi.org/10.1109/tpel.2019.2957071.
Повний текст джерелаBouks, Barak. "Israel’s Strategic Threats and Challenges." Security science journal 4, no. 1 (2023): 119–33. http://dx.doi.org/10.37458/ssj.4.1.8.
Повний текст джерелаAbugharsa, Afif, Bashir Elkharraz, and Eltohami Elghoul. "BGP Prefix Hijacking Attack and its Prevention Methods." International Journal of Advanced Networking and Applications 16, no. 02 (2024): 6328–31. http://dx.doi.org/10.35444/ijana.2024.16203.
Повний текст джерелаOlsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.
Повний текст джерелаAli, Raden Muhammad, and Aria Candramukti. "Terrorism as reflected in Joseph Conrad’s the secret agent: A sociological approach." UAD TEFL International Conference 2 (January 17, 2021): 62. http://dx.doi.org/10.12928/utic.v2.5737.2019.
Повний текст джерелаHoxha, Elira, Igli Tafa, Kristi Ndoni, Islam Tahiraj, and Andrea Muco. "Session hijacking vulnerabilities and prevention algorithms." Global Journal of Information Technology: Emerging Technologies 12, no. 1 (2022): 77–85. http://dx.doi.org/10.18844/gjit.v12i1.7749.
Повний текст джерелаGoldman, Ogen S., and Michal Neubauer-Shani. "Does International Tourism Affect Transnational Terrorism?" Journal of Travel Research 56, no. 4 (2016): 451–67. http://dx.doi.org/10.1177/0047287516649059.
Повний текст джерелаBrodeur, Abel. "The Effect of Terrorism on Employment and Consumer Sentiment: Evidence from Successful and Failed Terror Attacks." American Economic Journal: Applied Economics 10, no. 4 (2018): 246–82. http://dx.doi.org/10.1257/app.20160556.
Повний текст джерелаOuellet, Marie, and Martin Bouchard. "Terror on Repeat." International Criminal Justice Review 26, no. 4 (2016): 316–36. http://dx.doi.org/10.1177/1057567716666642.
Повний текст джерелаРазинкин, К. А., А. А. Науменко, А. И. Мордовин, О. Н. Чопоров, and Ю. В. Макаров. "IMPROVING THE SECURITY OF TELECOMMUNICATION NETWORKS BUILT ON THE BASIS OF THE BGP PROTOCOL: ALGORITHMIC SUPPORT FOR THE ASSESSMENT AND REGULATION OF IMPLEMENTATION RISKS IP HIJACKING ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 1(-) (2023): 61–72. http://dx.doi.org/10.36622/vstu.2023.26.1.008.
Повний текст джерелаLI, Kai, Yongyu GUO, and Shenlong YANG. "Public risk perception of terror attacks." Advances in Psychological Science 25, no. 2 (2017): 358. http://dx.doi.org/10.3724/sp.j.1042.2017.00358.
Повний текст джерелаArehart-Treichel, Joan. "Driving Accidents Up After Terror Attacks." Psychiatric News 39, no. 19 (2004): 22. http://dx.doi.org/10.1176/pn.39.19.0390022b.
Повний текст джерелаFeinstein, Jonathan S., and Edward H. Kaplan. "Counterterror intelligence operations and terror attacks." Public Choice 149, no. 3-4 (2011): 281–95. http://dx.doi.org/10.1007/s11127-011-9842-7.
Повний текст джерелаGonciarz, Agnieszka, and Robert Pich. "INCREASED RISK OF CHEMICAL TERROR ATTACKS." Zeszyty Naukowe SGSP 2, no. 88 (2024): 109–26. http://dx.doi.org/10.5604/01.3001.0054.3831.
Повний текст джерелаCole, L. "(A103) Understanding Terror Medicine." Prehospital and Disaster Medicine 26, S1 (2011): s28. http://dx.doi.org/10.1017/s1049023x11001051.
Повний текст джерелаJati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries." Simulacra 4, no. 2 (2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.
Повний текст джерелаCui, Xi, and Eric Rothenbuhler. "Communicating Terror: Mediatization and Ritualization." Television & New Media 19, no. 2 (2017): 155–62. http://dx.doi.org/10.1177/1527476417715685.
Повний текст джерелаWaters, Andrew J., W. Gerrod Parrott, Karin Mogg, Brendan P. Bradley, Mary C. Fuller, and Joan M. Wertz. "Processing Bias for Terror-Related Stimuli and September 11Th-Related Distress in College Students." Psychological Reports 101, no. 3 (2007): 787–95. http://dx.doi.org/10.2466/pr0.101.3.787-795.
Повний текст джерелаMorton, Brian. "Terror and the Ethics of Resistance." Dissent 70, no. 4 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a918676.
Повний текст джерелаMorton, Brian. "Terror and the Ethics of Resistance." Dissent 71, no. 1 (2024): 117–22. http://dx.doi.org/10.1353/dss.2024.a929088.
Повний текст джерелаGao, Zhen, Fucai Chen, Yawen Wang, Weizhen He, Xin Shi, and Genlin Xie. "MVPN: A Defense Architecture against VPN Traffic Hijacking Based on MTD." Electronics 12, no. 3 (2023): 711. http://dx.doi.org/10.3390/electronics12030711.
Повний текст джерелаKhraban, Ihor, and Serhii Yevtukh. "STATE TERROR OF RUSSIA AGAINST UKRAINE." STATE SECURITY 1, no. 3 (2024): 118–24. http://dx.doi.org/10.33405/2786-8613/2024/1/3/309968.
Повний текст джерелаTew, Joanna, and Richard Ward. "Paramedics at risk? How responding to a terror attack affects mental wellbeing." Journal of Paramedic Practice 16, no. 10 (2024): 416–25. http://dx.doi.org/10.12968/jpar.2023.0061.
Повний текст джерелаLuhmann, Maike, and Wiebke Bleidorn. "Changes in Affect, Cognition, and Perceived Behavioral Changes Among Vicarious Victims of the Paris Terrorist Attacks of November 13, 2015." Social Psychological and Personality Science 9, no. 2 (2017): 214–22. http://dx.doi.org/10.1177/1948550617732818.
Повний текст джерелаTrikalinou, Anna, and Nikolaos G. Bourbakis. "A Survey on Protection Methodologies Against Control Flow Hijacking Attacks." IEEE Potentials 33, no. 6 (2014): 21–26. http://dx.doi.org/10.1109/mpot.2014.2344211.
Повний текст джерелаOlsson, Filip. "Implicit Terror: A Natural Experiment on How Terror Attacks Affect Implicit Bias." Sociological Science 11 (2024): 379–412. http://dx.doi.org/10.15195/v11.a14.
Повний текст джерела