Academic literature on the topic 'Terrorism – Computer network resources'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Terrorism – Computer network resources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Terrorism – Computer network resources"

1

Baranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.

Full text
Abstract:
Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.
APA, Harvard, Vancouver, ISO, and other styles
2

Chernova, E. V., P. N. Polezhaev, A. E. Shukhman, Yu A. Ushakov, I. P. Bolodurina, and N. F. Bakhareva. "Security event data collection and analysis in large corporate networks." Information Technology and Nanotechnology, no. 2416 (2019): 233–41. http://dx.doi.org/10.18287/1613-0073-2019-2416-233-241.

Full text
Abstract:
Every year computer networks become more complex, which directly affects the provision of a high level of information security. Different commercial services, critical systems, and information resources prevailing in such networks are profitable targets for terrorists, cyber-spies, and criminals. The consequences range from the theft of strategic, highly valued intellectual property and direct financial losses to significant damages to a brand and customer trust. Attackers have the advantage in complex computer networks – it is easier to hide their tracks. The detection and identification of security incidents are the most important and difficult tasks. It is required to detect security incidents as soon as possible, to analyze and respond to them correctly, so as not to complicate the work of the enterprise computer network. The difficulty is that different event sources offer different data formats or can duplicate events. In addition, some events do not indicate any problems on their own, but their sequence may indicate the presence of a security incident. All collection processes of security events must be performed in real-time, which means streaming data processing.
APA, Harvard, Vancouver, ISO, and other styles
3

Andrusyshyn, Julia, and Valeria Barannik. "INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 6–15. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-1.

Full text
Abstract:
The article discusses the content and characteristics of information terrorism as a threat to national and international security in contemporary circumstances. The relevance of the topic stems from the fact that information is currently considered a strategic resource, and deliberate manipulation of public opinion and the commission of terrorist acts to that end has become one of the most dangerous manifestations of hybrid confrontation in the contemporary international arena. Due to the impossibility of clear distinction with ordinary computer crimes and domestic manipulation in mass media, the concepts of «information terrorism» and «cyberterrorism» do not have a clear interpretation. Therefore, information terrorism is viewed in a broad sense (manipulation of public consciousness to create tension, instability, chaos aimed at achieving political or economic objectives in the interests of terrorists) and in narrow terms (cyberattacks on critical government infrastructure information systems to disable them, which can lead to economic, environmental and other disasters). The general characteristics of information terrorism (organized form of violence, psychological influence, drawing attention to a particular problem, demonstrative nature) are defined and specific characteristics inherent only in terrorist acts in the information sphere: (secrecy, size, synchrony, remoteness, internationality and publicity) are singled out. The methods of information terrorism are described, which are aimed at influencing people’s consciousness on a large scale and at imposing their will on society and State institutions through the use of disinformation, propaganda, diversification of public opinion, psychological pressure, rumours, manipulation, intimidation. The forms of information terrorism are described: in particular: information-psychological (media-terrorism) and information-technical (cyberterrorism). It is noted that media terrorism / media killer activity involves the organization of special media campaigns to create an atmosphere of civil disobedience, public distrust of the actions and intentions of the government and its law enforcement agencies by using a number of models of communicative influence (nationalist, religious, inciting model). Cyberterrorism is presented as a socially dangerous activity with the use of computers and telecommunication networks to harm or commit actions / threats that threaten society and lead to other serious consequences, through the use of the following methods: APT-attacks, malware, DoS / DDoS-attacks, unauthorized access, ransomware. It is summarized and concluded that today virtual space and mass media are widely used by various terrorist-oriented groups for their own purposes, because accessibility, the absence of censorship, the large potential audience of users, the speed with which information is disseminated and the complexity with which it is presented and received are all contributing to the spread of information terrorism in today’s world. The threat of terrorism through the use of media and cyberspace is a complex challenge of our time. The danger of such terrorism lies in the absence of geographical and national borders, since terrorist acts can be carried out from anywhere in the world, as well as in the difficulty of identifying the identity of the terrorist in the information space and establishing his whereabouts, because cyber and media attacks are carried out by hackers indirectly through the use of computer technology. Therefore, in view of the further development of technology and mass media, the issue of countering information terrorism will be particularly relevant.
APA, Harvard, Vancouver, ISO, and other styles
4

Surma, Ivan V. "The role of information and psychological operations in the escalation of the Ukrainian crisis." Diplomaticheskaja sluzhba (Diplomatic Service), no. 3 (June 7, 2022): 204–9. http://dx.doi.org/10.33920/vne-01-2203-04.

Full text
Abstract:
The article shows the importance and increasing role of the information and psychological warfare factor as the Ukrainian crisis escalates. The role of the Special Operations Forces of Ukraine in the informational and psychological confrontation is noted. The structure and functionality of the 16th, 72nd, 74th and 83rd centers of information and psychological operations of the Special operations Forces of Ukraine are considered. The main functions of these centers are shown, such as intelligence and subversive activities, identification of internal opponents, disinformation of the population, information terrorism, demoralization of citizens of Donbass, etc. The tools used by the centers of information and psychological operations in their activities are considered, in addition to the official media, several thousand Internet resources, information and news sites, coordinated groups of users of social networks and individual "platforms" in social networks are used. The role of the NATO Coordination Center for Responding to Computer Incidents (NCIRC — NATO Computer Incident Response Capability), the NATO Center of Excellence for Joint Cyber Defense (NATO CCD COE — NATO Cooperative Cyber Defense Center of Excellence — Tallinn) and the cyber operations center in Mons (Belgium) is noted.
APA, Harvard, Vancouver, ISO, and other styles
5

Haynes, Steven R., Thomas George Kannampallil, Lawrence L. Larson, and Nitesh Garg. "Optimizing anti-terrorism resource allocation." Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 299–309. http://dx.doi.org/10.1002/asi.20120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Romanov, Rashit. "The Basic Principles of Information Protection in the Russian Federation in the Transition to a Digital Economy." NBI Technologies, no. 3 (January 2019): 13–18. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.2.

Full text
Abstract:
The modern stage of development of society is characterized by the increasing role of the information sphere. The information sphere is a set of information, information infrastructure, entities engaged in the collection, formation, distribution and use of information, as well as a system of regulation of public relations arising in this process. The expansion of the areas of application of information technologies, as a factor of economic development and improvement of the functioning of public and state institutions, at the same time generates new information threats. The situation is significantly complicated by the confrontation between the Russian Federation and the West, which directly affects the sphere of national interests of the Russian Federation and poses a direct threat to the national security of the country, the key element of which is information security. There is a constant growth of computer attacks on Russian information resources, the number of attacks has increased significantly in recent years. At the same time, the methods, means and tactics of such attacks are being improved, and their intensity directly depends on the current international situation. Terrorist and extremist materials are openly distributed in the global network. The number of crimes committed with the use of information technologies, for example, illegal penetrations into the corporate networks of state and credit and financial institutions, has increased. The article analyzes the requirements for the security of important objects of critical information infrastructure of the Russian Federation. It is shown that they should be performed at all stages of the life cycle during the creation (modernization), operation and decommissioning of a significant object.
APA, Harvard, Vancouver, ISO, and other styles
7

Goffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.

Full text
Abstract:
This paper outlines resources for economists on the Internet, the large and very rapidly expanding computer network that is revolutionizing research in many fields. Even at this early stage, there are a number of very useful resources (such as large databases and mailing lists) for economists. Directions are given on how to retrieve the complete and current list of resources for economists, and the paper also contains a minimal set of directions on how to use the Internet. References are also given to more detailed general guides on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
8

Bura, Aman, and Yang Dacheng . "GPRS Network Resources Optimization." Information Technology Journal 5, no. 5 (August 15, 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Full text
Abstract:
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of particular danger. The Russian military in Syria is constantly confronted with terrorist attacks: the Khmeimim aerospace forces base is regularly attacked with unmanned air vehicles - drones. Terrorist acts with the use of computer and network technologies are no less dangerous. The destructive potential of cyberterrorism is determined by the widespread computerization of state and public life, the implementation of projects to create smart cities, including smart transportation, as well as the intensive development of the Internet of things. The purpose of the article is to analyze new criminal threats to state and public security, as well as to study high-tech ways of committing crimes such as sabotage, terrorist acts, and other crimes of a terrorist nature. The cost of their consequences for society is very high, and criminals do not always need to attack social objects directly - it is enough to spread panic among the population using online media, social networks and websites of authorities of various levels, after obtaining illegal access to them. The article describes some of the techniques already used to commit crimes of sabotage and terrorism. The authors draw attention to the priority of cybersecurity both for engineers of devices with elements of artificial intelligence, and for lawmakers who should pay attention to methods of technical forecasting when developing legal norms aimed at prevention of new ways of committing such crimes. When writing the article, the authors used a wide range of Russian and foreign sources of legal, statistical, sociological and other information. The authors used such research methods as analysis, synthesis, deduction, induction, formal legal method as well as comparative legal method.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Yaojie, Xiaolong Cui, and Peiyong He. "Winning the War on Terror." International Journal of Information Technology and Web Engineering 17, no. 1 (January 2022): 1–15. http://dx.doi.org/10.4018/ijitwe.288038.

Full text
Abstract:
From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a quantitative analysis method of active risk assessment method with terrorists as the research object is proposed. This assessment method introduces deep learning algorithms into social computing problems on the basis of information coding technology. We design a special "Top-k" algorithm to screen the terrorism related features, and optimize the evaluation model through convolution neural network, so as to determine the risk level of terrorist suspects. This study provides important research ideas for counter-terrorism assessment, and verifies the feasibility and accuracy of the proposed scheme through a number of experiments, which greatly improves the efficiency of counter-terrorism early warning.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Terrorism – Computer network resources"

1

Daniels, Minji. "Online Islamic organizations and measuring Web effectiveness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDaniels.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, Dec. 2004.
Thesis Advisor(s): James Ehlert, Raymond Buettner. Includes bibliographical references (p. 55-58). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Spinks, Brandon Todd. "Assessing Perceived Credibility of Web Sites in a Terrorism Context: The PFLP, Tamil Tigers, Hamas, and Hezbollah." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc10980/.

Full text
Abstract:
The purpose of the study was to contribute to the overall understanding of terrorist organizations' use of the Internet and to increase researchers' knowledge of Web site effectiveness. The methodological approach was evaluation of the perceived credibility of Web sites based on existing criteria derived from information users. The Web sites of four terrorist organizations were assessed: two secular nationalist groups, the People's Front for the Liberation of Palestine (PFLP) and Liberation Tigers of Tamil Elam (LTTE or Tamil Tigers); and two religious nationalist groups, Hamas and Hezbollah. The findings of this analysis showed differences in perceived credibility factors among terrorist organizations' Web sites and positive levels of perceived credibility for the Web sites. These findings indicate the potential for positive impressions of the organizations' Web sites by information users, which would help empower the organizations with the capacity to reach their objectives. By using Web sites, these groups can effectively increase their support base through disseminating information, improving recruiting, and attracting monetary contributions, and can establish themselves as legitimate components of society.
APA, Harvard, Vancouver, ISO, and other styles
3

Crause, Ewald. "The effect of using a computer-based exploration tool on children's career development learning." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1015020.

Full text
Abstract:
Historically the process of career development was thought of as occurring in adolescence and adulthood; however, the renewed emphasis on lifelong career development has led to a greater focus on the career developmental stage of childhood. The present research focused on the development and trialling of a research-based computerised career exploration tool, Growing-up: Children Building Careers™ (GCBC™) that can be used for early intervention in children‘s career development. The integration of developmental considerations within a career developmental context is of paramount importance, considering that child and career developmental theories share certain basic foundational principles such as the dual recognition of identifiable life stages and the resolution or accomplishment of associated tasks. The focus of the research is to provide access to a research-based tool that can assist learners with developing age appropriate career developmental skills. As the overview of education policy and existing programs will show, there are challenges in providing access to and improving the nature, level, and quality of career development services. Gaps in access to career development learning are particularly evident at the elementary education level. Furthermore it is clear that learners need to be at the centre of a radical rethink of careers services within a lifelong learning framework in order to ensure access to navigational tools throughout a lifetime of work and study transitions. Digital environments, such as the GCBC™, are tools that broaden and extend learning possibilities for children and appropriately designed digital environments can provide a vehicle that can take children further than they might travel unassisted. The research is divided into five phases and includes eight to ten year old children as participants. Phase one focused on the program design and pilot study (ensuring content validity and age-appropriate language use), while phases two to five focused on the fieldwork (i.e., pre –test, program exposure, post-test, and focus group discussions). The researcher made use of a mixed research design that combines both quantitative and qualitative research methods. The total sample consisted of 146 children between the ages of eight to ten years old. The control group had 72 children and the experimental group 74 children with a mean age of 8.74 years (SD = 0.63) for the total sample. The quantitative data collection entailed a pre-and post-test design with learners‘ career development measured with the Childhood Career Development Scale (CCDS) and their career awareness with the Revised Career Awareness Survey (RCAS). Qualitative data was collected in the form of two focus group discussions, which included a small sample of children from the experimental group, as well as insights gained from educators following the GCBC™ fieldwork. The quantitative statistical analysis included descriptive and inferential statistics which allowed the researcher to not only describe the research findings, but to confirm the effectiveness of the GCBC™ as an intentional career development learning program. Furthermore, the responses of the children and educators who participated in or witnessed the facilitation of the GCBC™ provided support for the GCBC™ as a meaningful career learning experience which can be successfully implemented in educational settings.
APA, Harvard, Vancouver, ISO, and other styles
4

Bailey, Charles W. "Intelligent Multimedia Computer Systems: Emerging Information Resources in the Network Environment." Pierian Press, 1990. http://hdl.handle.net/10150/105658.

Full text
Abstract:
A multimedia computer system is one that can create, import, integrate, store, retrieve, edit, and delete two or more types of media materials in digital form, such as audio, image, full-motion video, and text information. This paper surveys four possible types of multimedia computer systems: hypermedia, multimedia database, multimedia message, and virtual reality systems. The primary focus is on advanced multimedia systems development projects and theoretical efforts that suggest long-term trends in this increasingly important area.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.

Full text
Abstract:
We developed a price-based resource allocation scheme for Differentiated Service (DiffServ) data networks. The DiffServ framework was proposed to provide multiple QoS classes over IP networks. Since the provider supports multiple service classes, we need a differentiated pricing scheme, as supposed to the flat-rate scheme employed by the Internet service providers of today. Charging efficiently is a big issue. The utility of a client correlates to the amount of bandwidth allocated. One difficulty we face is that determining the appropriate amount of bandwidth to provision and allocate is problematic due to different time scales, multiple QoS classes and the unpredictable nature of users. To approach this problem, we designed a pricing strategy for Admission Control and bandwidth assignment. Despite the variety of existing pricing strategies, the common theme is that the appropriate pricing policy rewards users for behaving in ways to improve the overall utilization and performance of the network. Among existing schemes, we chose auction because it is scalable, and efficiently and fairly shares resources. Our pricing model takes the system's availability and each customer's requirements as inputs and outputs the set of clients who are admitted into the network and their allocated resource. Each client proposes a desired bandwidth and a price that they are willing to pay for it. The service provider collects this information and produces parameters for each class of service they provide. This information is used to decide which customers to admit. We proposed an optimal solution to the problem of maximizing the provider's revenue for the special case where there is only one bottleneck link in the network. Then for the generalized network, we resort to a simple but effective heuristic method. We validate both the optimal solution and the heuristic algorithm with simulations driven by a real traffic scenario. Finally, we allow customers to bid on the duration for which the service is needed. Then we study the performance of those heuristic algorithms in this new setting and propose possible improvements.
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen, Thanh Vinh. "Content distribution networks over shared infrastructure a paradigm for future content network deployment /." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.094632/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Poon, Auliana. "Information technology and innovation in international tourism Implications for the Caribbean tourist industry /." Online version, 1987. http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.383578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Full text
Abstract:
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater for the majority of their simulation's requirements. In this work, a system is proposed for the creation of a scalable, dynamic-resolution network simulation framework that provides scalable scope for researchers, using modern technologies and languages. This framework should allow researchers to rapidly develop a broad range of semantically-rich simulations, without the necessity of superor grid-computers or clusters. Design and implementation are discussed and alternative network simulations are compared to the proposed framework. A series of simulations, focusing on malware, is run on an implementation of this framework, and the results are compared to expectations for the outcomes of those simulations. In conclusion, a critical review of the simulator is made, considering any extensions or shortcomings that need to be addressed.
APA, Harvard, Vancouver, ISO, and other styles
9

Mainville, Sylvie. "Investigating the Delivery of Therapeutic Recreation Services on the Internet: a Pilot Study Using Leisure Education for the Prevention of Alcohol Abuse." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278246/.

Full text
Abstract:
This pilot study, grounded in social learning theory, demonstrated that leisure education services can be delivered on the Internet. Participants (n=40) successfully accessed the Web page program and responded to instruments and surveys. The treatment group (n=16) effectively completed four leisure education sessions on-line. Confidentiality, privacy, and anonymity issues were controlled. Responses were monitored and feedback provided as to the complexity of the program and comprehension of the participants. The leisure education program had no significant effect on posttest measures of alcohol expectancies and leisure motivations. Mean changes frompretest to posttest may indicate trends. The small n and convenience sample may have introduced many extraneous variables. Professional implications include compliance issues (57% experimental mortality rate), technology-related anxiety, and limited professional competency to work in this environment. Future research which examines the provision of leisure education and other components of therapeutic recreation service on-line is warranted.
APA, Harvard, Vancouver, ISO, and other styles
10

Jahani, Masoumeh. "Computer simulation of the osteocyte and bone lining cell network and the effect of normal physiological changes in cellular functions on that network." Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:7112.

Full text
Abstract:
Osteocytes play a critical role in the regulation of bone remodelling by translating strain due to mechanical loading into biochemical signals transmitted through the interconnecting lacuno-canalicular network to bone lining cells (BLCs) on the bone surface. This work aims to examine the effects of disruption of that intercellular communication by simulation of osteocyte apoptosis and microcrack in the bone matrix. A model of a uniformly distributed osteocyte network has been developed that stimulates the signalling through the network to the BLCs based on strain level. Bi-directional and asymmetric communication between neighbouring osteocytes and BLCs is included; with propagation of the signal through the network gradually decreasing by a calcium decay factor. The effect of osteocyte apoptosis and microcracks are then examined by preventing signalling at and through the affected cells. It is found that a small percentage of apoptotic cells and tiny microcracks both lead to a significant reduction in the peak signal at the BLCs. The simulation shows that either apoptosis of only 3% of the osteocyte cells or tiny microcrack of 42μm, 42μm below the surface leads to a significant reduction in the peak signal at the BLCs. Furthermore, experiments with the model confirm how important the location and density of the apoptotic osteocytes are to the signalling received at the bone surface. The result also shows the importance of the location and length of microcrack on the signalling of BLC. The first may explain a possible mechanism leading to increased remodelling activity observed with osteoporosis, and the second, the mechanism driving normal bone remodelling and maintenance.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Terrorism – Computer network resources"

1

Brandon, James. Virtual Caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The making of a homegrown terrorist: Brainwashing rebels in search of a cause. Santa Barbara: Praeger, An imprint of ABC-CLIO, LLC, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Virtual caliphate: Exposing the Islamist state on the internet. Dulles, Va: Potomac Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Terrorism, Nonproliferation, and Trade. ISIS: defining the enemy: Hearing before the Subcommittee on Terrorism, Nonproliferation, and Trade of the Committee on Foreign Affairs, House of Representatives, One Hundred Fourteenth Congress, first session, April 29, 2015. Washington: U.S. Government Publishing Office, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Portals to the world: Selected Internet resources : Terrorism : links to electronic resources selected by Library of Congress subject experts. Washington, DC: Library of Congress, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Isis ®: Il marketing dell'Apocalisse. Milano: Baldini&Castoldi, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Homeland Security. Subcommittee on Counterterrorism and Intelligence. Jihadist use of social media: How to prevent terrorism and preserve innovation : hearing before the Subcommittee on Counterterrorism and Intelligence of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, December 6, 2011. Washington: U.S. Government Printing Office, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Terror on the internet: The new arena, the new challenges. Washington, DC: United States Institute of Peace Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Terrorism – Computer network resources"

1

Sallabi, Farag, and Ahmed Karmouch. "Mobile Network Domain Agency for Managing Network Resources." In Lecture Notes in Computer Science, 67–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45391-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nowicki, Krzysztof, Aleksander Malinowski, and Marcin Sikorski. "More Just Measure of Fairness for Sharing Network Resources." In Computer Networks, 52–58. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39207-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reinhardt, Wilko. "Advance reservation of network resources for multimedia applications." In Lecture Notes in Computer Science, 23–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58494-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reilly, James, and Maurizio Abate. "Scheduled connections: Managing temporal constraints on broadband network resources." In Lecture Notes in Computer Science, 425–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0056987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Haiqing, Lei Huang, Jianjun Zhou, Haifei Xu, and Yintian Liu. "A Novel Personalized Recommendation for Intelligent Sharing of Network Resources." In Communications in Computer and Information Science, 227–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23226-8_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ismail, Ziad, Christophe Kiennert, Jean Leneutre, and Lin Chen. "A Game Theoretical Model for Optimal Distribution of Network Security Resources." In Lecture Notes in Computer Science, 234–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68711-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Matsumoto, Nobutaka, Takahiro Miyamoto, Michiaki Hayashi, and Hideaki Tanaka. "BPEL Driven Policy Management of Virtualized Network Resources for IMS Environments." In Lecture Notes in Computer Science, 317–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88623-5_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuchař, Štěpán, Jan Martinovič, Pavla Dráždilová, and Kateřina Slaninová. "Synthetic Social Network Based on Competency-Based Description of Human Resources." In Computer Information Systems and Industrial Management, 313–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yin, Zhixiang, and Hua Chen. "Impact of Network Information on the Management of Library E-Resources." In Communications in Computer and Information Science, 234–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16397-5_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Hongyan, Bo Liu, Long Qin, Jing Zhang, and Weichao Gong. "Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain." In Lecture Notes in Computer Science, 135–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78612-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Terrorism – Computer network resources"

1

Zhang, Youzhi, Bo An, Long Tran-Thanh, Zhen Wang, Jiarui Gan, and Nicholas R. Jennings. "Optimal Escape Interdiction on Transportation Networks." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/550.

Full text
Abstract:
Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need to respond quickly to catch the attacker on his escape route, which is subject to time-dependent traffic conditions on transportation networks. The attacker can strategically choose his escape path and driving speed to avoid being captured. Existing work on security resource allocation has not considered such scenarios with time-dependent strategies for both players. Therefore, in this paper, we study the problem of efficiently scheduling security resources for interdicting the escaping attacker. We propose: 1) a new defender-attacker security game model for escape interdiction on transportation networks; and 2) an efficient double oracle algorithm to compute the optimal defender strategy, which combines mixed-integer linear programming formulations for best response problems and effective approximation algorithms for improving the scalability of the algorithms. Experimental evaluation shows that our approach significantly outperforms baselines in solution quality and scales up to realistic-sized transportation networks with hundreds of intersections.
APA, Harvard, Vancouver, ISO, and other styles
2

Fife, Leslie D., and Kevin I. Frost. "Cost Savings through Effective Use of Network Resources." In Petroleum Computer Conference. Society of Petroleum Engineers, 1994. http://dx.doi.org/10.2118/28268-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luan, Meng, Duoyong Sun, and Zhanfeng Li. "Terrorism Risk Prediction Model Based on Support Vector Machine Optimized by Whale Algorithm." In 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2019. http://dx.doi.org/10.1109/iccsnt47585.2019.8962435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, M., M. Medard, V. Aggarwal, U. M. O�Reilly, W. Kim, C. W. Ahn, and M. Effros. "Evolutionary Approaches To Minimizing Network Coding Resources." In IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. IEEE, 2007. http://dx.doi.org/10.1109/infcom.2007.231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Xiaodong, and Huating Xu. "A Network Resources Scheduling Method for Virtual Machine." In Next Generation Computer and Information Technology 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.63.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Y., and M. Ammar. "Algorithms for Assigning Substrate Network Resources to Virtual Network Components." In Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. IEEE, 2006. http://dx.doi.org/10.1109/infocom.2006.322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Balan, T. C., D. N. Robu, and F. Sandu. "Ad-hoc lab computer network configuration using remote resources." In 2015 IEEE 21st International Symposium for Design and Technology in Electronic Packaging (SIITME). IEEE, 2015. http://dx.doi.org/10.1109/siitme.2015.7342360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Baxley, Stuart, Deniz Gurkan, Hamidreza Validi, and Illya Hicks. "Graph Representation of Computer Network Resources for Precise Allocations." In 2022 International Conference on Computer Communications and Networks (ICCCN). IEEE, 2022. http://dx.doi.org/10.1109/icccn54977.2022.9868852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Application of Computer Network Information Resources in Physical Education." In 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science. Francis Academic Press, 2018. http://dx.doi.org/10.25236/iceeecs.2018.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Pengda, Matthew Jordan Tonnemacher, Yongjiu Du, Dinesh Rajan, and Joseph Camp. "Towards scalable network emulation: Channel accuracy versus implementation resources." In IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. IEEE, 2013. http://dx.doi.org/10.1109/infcom.2013.6566996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography