Academic literature on the topic 'Terrorism – Computer network resources'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Terrorism – Computer network resources.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Terrorism – Computer network resources"
Baranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.
Full textChernova, E. V., P. N. Polezhaev, A. E. Shukhman, Yu A. Ushakov, I. P. Bolodurina, and N. F. Bakhareva. "Security event data collection and analysis in large corporate networks." Information Technology and Nanotechnology, no. 2416 (2019): 233–41. http://dx.doi.org/10.18287/1613-0073-2019-2416-233-241.
Full textAndrusyshyn, Julia, and Valeria Barannik. "INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 6–15. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-1.
Full textSurma, Ivan V. "The role of information and psychological operations in the escalation of the Ukrainian crisis." Diplomaticheskaja sluzhba (Diplomatic Service), no. 3 (June 7, 2022): 204–9. http://dx.doi.org/10.33920/vne-01-2203-04.
Full textHaynes, Steven R., Thomas George Kannampallil, Lawrence L. Larson, and Nitesh Garg. "Optimizing anti-terrorism resource allocation." Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 299–309. http://dx.doi.org/10.1002/asi.20120.
Full textRomanov, Rashit. "The Basic Principles of Information Protection in the Russian Federation in the Transition to a Digital Economy." NBI Technologies, no. 3 (January 2019): 13–18. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.2.
Full textGoffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.
Full textBura, Aman, and Yang Dacheng . "GPRS Network Resources Optimization." Information Technology Journal 5, no. 5 (August 15, 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.
Full textKlebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Full textWang, Yaojie, Xiaolong Cui, and Peiyong He. "Winning the War on Terror." International Journal of Information Technology and Web Engineering 17, no. 1 (January 2022): 1–15. http://dx.doi.org/10.4018/ijitwe.288038.
Full textDissertations / Theses on the topic "Terrorism – Computer network resources"
Daniels, Minji. "Online Islamic organizations and measuring Web effectiveness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDaniels.pdf.
Full textThesis Advisor(s): James Ehlert, Raymond Buettner. Includes bibliographical references (p. 55-58). Also available online.
Spinks, Brandon Todd. "Assessing Perceived Credibility of Web Sites in a Terrorism Context: The PFLP, Tamil Tigers, Hamas, and Hezbollah." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc10980/.
Full textCrause, Ewald. "The effect of using a computer-based exploration tool on children's career development learning." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1015020.
Full textBailey, Charles W. "Intelligent Multimedia Computer Systems: Emerging Information Resources in the Network Environment." Pierian Press, 1990. http://hdl.handle.net/10150/105658.
Full textYang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.
Full textNguyen, Thanh Vinh. "Content distribution networks over shared infrastructure a paradigm for future content network deployment /." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.094632/index.html.
Full textPoon, Auliana. "Information technology and innovation in international tourism Implications for the Caribbean tourist industry /." Online version, 1987. http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.383578.
Full textRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Full textMainville, Sylvie. "Investigating the Delivery of Therapeutic Recreation Services on the Internet: a Pilot Study Using Leisure Education for the Prevention of Alcohol Abuse." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278246/.
Full textJahani, Masoumeh. "Computer simulation of the osteocyte and bone lining cell network and the effect of normal physiological changes in cellular functions on that network." Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:7112.
Full textBooks on the topic "Terrorism – Computer network resources"
Brandon, James. Virtual Caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion, 2008.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. Washington: U.S. G.P.O., 2009.
Find full textUsing the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. Washington: U.S. G.P.O., 2009.
Find full textThe making of a homegrown terrorist: Brainwashing rebels in search of a cause. Santa Barbara: Praeger, An imprint of ABC-CLIO, LLC, 2014.
Find full textVirtual caliphate: Exposing the Islamist state on the internet. Dulles, Va: Potomac Books, 2010.
Find full textUnited States. Congress. House. Committee on Foreign Affairs. Subcommittee on Terrorism, Nonproliferation, and Trade. ISIS: defining the enemy: Hearing before the Subcommittee on Terrorism, Nonproliferation, and Trade of the Committee on Foreign Affairs, House of Representatives, One Hundred Fourteenth Congress, first session, April 29, 2015. Washington: U.S. Government Publishing Office, 2015.
Find full textPortals to the world: Selected Internet resources : Terrorism : links to electronic resources selected by Library of Congress subject experts. Washington, DC: Library of Congress, 2002.
Find full textIsis ®: Il marketing dell'Apocalisse. Milano: Baldini&Castoldi, 2015.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Counterterrorism and Intelligence. Jihadist use of social media: How to prevent terrorism and preserve innovation : hearing before the Subcommittee on Counterterrorism and Intelligence of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, December 6, 2011. Washington: U.S. Government Printing Office, 2012.
Find full textTerror on the internet: The new arena, the new challenges. Washington, DC: United States Institute of Peace Press, 2006.
Find full textBook chapters on the topic "Terrorism – Computer network resources"
Sallabi, Farag, and Ahmed Karmouch. "Mobile Network Domain Agency for Managing Network Resources." In Lecture Notes in Computer Science, 67–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45391-1_5.
Full textNowicki, Krzysztof, Aleksander Malinowski, and Marcin Sikorski. "More Just Measure of Fairness for Sharing Network Resources." In Computer Networks, 52–58. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39207-3_5.
Full textReinhardt, Wilko. "Advance reservation of network resources for multimedia applications." In Lecture Notes in Computer Science, 23–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58494-3_3.
Full textReilly, James, and Maurizio Abate. "Scheduled connections: Managing temporal constraints on broadband network resources." In Lecture Notes in Computer Science, 425–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0056987.
Full textZhang, Haiqing, Lei Huang, Jianjun Zhou, Haifei Xu, and Yintian Liu. "A Novel Personalized Recommendation for Intelligent Sharing of Network Resources." In Communications in Computer and Information Science, 227–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23226-8_30.
Full textIsmail, Ziad, Christophe Kiennert, Jean Leneutre, and Lin Chen. "A Game Theoretical Model for Optimal Distribution of Network Security Resources." In Lecture Notes in Computer Science, 234–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68711-7_13.
Full textMatsumoto, Nobutaka, Takahiro Miyamoto, Michiaki Hayashi, and Hideaki Tanaka. "BPEL Driven Policy Management of Virtualized Network Resources for IMS Environments." In Lecture Notes in Computer Science, 317–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88623-5_32.
Full textKuchař, Štěpán, Jan Martinovič, Pavla Dráždilová, and Kateřina Slaninová. "Synthetic Social Network Based on Competency-Based Description of Human Resources." In Computer Information Systems and Industrial Management, 313–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_29.
Full textYin, Zhixiang, and Hua Chen. "Impact of Network Information on the Management of Library E-Resources." In Communications in Computer and Information Science, 234–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16397-5_21.
Full textZhang, Hongyan, Bo Liu, Long Qin, Jing Zhang, and Weichao Gong. "Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain." In Lecture Notes in Computer Science, 135–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78612-0_11.
Full textConference papers on the topic "Terrorism – Computer network resources"
Zhang, Youzhi, Bo An, Long Tran-Thanh, Zhen Wang, Jiarui Gan, and Nicholas R. Jennings. "Optimal Escape Interdiction on Transportation Networks." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/550.
Full textFife, Leslie D., and Kevin I. Frost. "Cost Savings through Effective Use of Network Resources." In Petroleum Computer Conference. Society of Petroleum Engineers, 1994. http://dx.doi.org/10.2118/28268-ms.
Full textLuan, Meng, Duoyong Sun, and Zhanfeng Li. "Terrorism Risk Prediction Model Based on Support Vector Machine Optimized by Whale Algorithm." In 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2019. http://dx.doi.org/10.1109/iccsnt47585.2019.8962435.
Full textKim, M., M. Medard, V. Aggarwal, U. M. O�Reilly, W. Kim, C. W. Ahn, and M. Effros. "Evolutionary Approaches To Minimizing Network Coding Resources." In IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. IEEE, 2007. http://dx.doi.org/10.1109/infcom.2007.231.
Full textLiu, Xiaodong, and Huating Xu. "A Network Resources Scheduling Method for Virtual Machine." In Next Generation Computer and Information Technology 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.63.07.
Full textZhu, Y., and M. Ammar. "Algorithms for Assigning Substrate Network Resources to Virtual Network Components." In Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. IEEE, 2006. http://dx.doi.org/10.1109/infocom.2006.322.
Full textBalan, T. C., D. N. Robu, and F. Sandu. "Ad-hoc lab computer network configuration using remote resources." In 2015 IEEE 21st International Symposium for Design and Technology in Electronic Packaging (SIITME). IEEE, 2015. http://dx.doi.org/10.1109/siitme.2015.7342360.
Full textBaxley, Stuart, Deniz Gurkan, Hamidreza Validi, and Illya Hicks. "Graph Representation of Computer Network Resources for Precise Allocations." In 2022 International Conference on Computer Communications and Networks (ICCCN). IEEE, 2022. http://dx.doi.org/10.1109/icccn54977.2022.9868852.
Full text"Application of Computer Network Information Resources in Physical Education." In 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science. Francis Academic Press, 2018. http://dx.doi.org/10.25236/iceeecs.2018.042.
Full textHuang, Pengda, Matthew Jordan Tonnemacher, Yongjiu Du, Dinesh Rajan, and Joseph Camp. "Towards scalable network emulation: Channel accuracy versus implementation resources." In IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. IEEE, 2013. http://dx.doi.org/10.1109/infcom.2013.6566996.
Full text