Artículos de revistas sobre el tema "Great Firewall"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Great Firewall".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, n.º 1 (abril de 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Texto completoMulvenon, James C. y Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, n.º 4 (31 de julio de 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Texto completoZhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, n.º 3 (agosto de 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Texto completoLiu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13 de marzo de 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Texto completoHughes, Christopher R. "Google and the Great Firewall". Survival 52, n.º 2 (25 de marzo de 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Texto completoScarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1 de abril de 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Texto completoManaseer, Saher, Ahmad K. Al Hwaitat y Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de septiembre de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Texto completoTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz y Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, n.º 2 (6 de abril de 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Texto completoEnsafi, Roya, Philipp Winter, Abdullah Mueen y Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, n.º 1 (1 de abril de 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Texto completoAnderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, n.º 11 (noviembre de 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Texto completoGu, Grace. "The Great Firewall of China and Marketplace Disintermediation". Academy of Management Proceedings 2019, n.º 1 (1 de agosto de 2019): 14860. http://dx.doi.org/10.5465/ambpp.2019.14860abstract.
Texto completoMathieson, SA. "Researchers find way around Great Firewall of China". Infosecurity Today 3, n.º 4 (julio de 2006): 4. http://dx.doi.org/10.1016/s1742-6847(06)70421-9.
Texto completoHuang, Gregory T. "Going online behind the Great Firewall of China". New Scientist 196, n.º 2629 (noviembre de 2007): 66–67. http://dx.doi.org/10.1016/s0262-4079(07)62859-0.
Texto completoAKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n.º 28 (13 de mayo de 2023): 442–69. http://dx.doi.org/10.52096/usbd.7.28.30.
Texto completoAKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n.º 28 (9 de mayo de 2023): 293–319. http://dx.doi.org/10.52096/usbd.7.28.21.
Texto completoLi, Jinying. "Toward a Genealogy of the Wall-Screen". differences 33, n.º 1 (1 de mayo de 2022): 28–59. http://dx.doi.org/10.1215/10407391-9735441.
Texto completoZulfikar, Faisal Mufti. "PEMBATASAN AKSES INTERNET SEBAGAI UPAYA CHINA MENJAGA KEAMANAN NASIONAL: THE GREAT FIREWALL OF CHINA". BHUVANA: Journal of Global Studies 1, n.º 1 (17 de marzo de 2023): 26–38. http://dx.doi.org/10.59408/bjgs.v1i1.54.
Texto completoNormile, Dennis. "Science suffers as China plugs holes in Great Firewall". Science 357, n.º 6354 (31 de agosto de 2017): 856. http://dx.doi.org/10.1126/science.357.6354.856.
Texto completoMarks, Paul. "Will Google's help breach the great firewall of China?" New Scientist 206, n.º 2754 (marzo de 2010): 17. http://dx.doi.org/10.1016/s0262-4079(10)60777-4.
Texto completoBensen, Tierney, Patrick Henze y Geoff Farnsworth. "The Great Chinese Firewall: A Safeguard or Stop Sign?" Journal of Information Privacy and Security 2, n.º 3 (julio de 2006): 42–61. http://dx.doi.org/10.1080/15536548.2006.10855797.
Texto completoHu, Lingyun, Shuai Wen y Hongjun Yuan. "Thinking and Research on the Construction of Web Application Firewall in Smart Campus Environment". International Journal of Education and Humanities 14, n.º 2 (30 de mayo de 2024): 66–69. http://dx.doi.org/10.54097/kzcr2296.
Texto completoStone, R. y H. Xin. "Google Plots Exit Strategy As China Shores Up 'Great Firewall'". Science 327, n.º 5964 (21 de enero de 2010): 402–3. http://dx.doi.org/10.1126/science.327.5964.402-a.
Texto completoWowor, Harvardry Gerald Abraham, Arfin Sudirman y Falhan Hakiki. "China’s Great Firewall: Cybersecurity as Strategy for Building World Cyberpower". JISPO Jurnal Ilmu Sosial dan Ilmu Politik 13, n.º 2 (22 de marzo de 2024): 193–232. http://dx.doi.org/10.15575/jispo.v13i2.27713.
Texto completoCurrier, Carrie Liu. "Roberts, Margaret E. Censored: Distraction and Diversion Inside China’s Great Firewall". Journal of Chinese Political Science 24, n.º 4 (7 de noviembre de 2019): 713–14. http://dx.doi.org/10.1007/s11366-019-09634-x.
Texto completoRodzvilla, John. "Margaret E. Roberts: Censored: Distraction and Diversion Inside China’s Great Firewall". Publishing Research Quarterly 35, n.º 1 (17 de enero de 2019): 185–86. http://dx.doi.org/10.1007/s12109-019-09635-x.
Texto completoSHAN, Wei. "Winning Public Opinion Online: China's Internet Content Control". East Asian Policy 06, n.º 03 (julio de 2014): 41–52. http://dx.doi.org/10.1142/s1793930514000257.
Texto completoSundquist, James. "Censored: Distraction and Diversion Inside China's Great Firewall by Margaret E. Roberts". China Review International 23, n.º 4 (2016): 405–7. http://dx.doi.org/10.1353/cri.2016.0161.
Texto completoKim, Sung Wook y Aziz Douai. "Google vs. China’s “Great Firewall”: Ethical implications for free speech and sovereignty". Technology in Society 34, n.º 2 (mayo de 2012): 174–81. http://dx.doi.org/10.1016/j.techsoc.2012.02.002.
Texto completoHaslam, Thomas. "Ubiquitous Learning behind the Great Firewall: Transforming the English Major at Shantou University". Ubiquitous Learning: An International Journal 9, n.º 1 (2016): 9–20. http://dx.doi.org/10.18848/1835-9795/cgp/v09i01/9-20.
Texto completoZheng, Yanfeng y Qinyu (Ryan) Wang. "Shadow of the great firewall: The impact of Google blockade on innovation in China". Strategic Management Journal 41, n.º 12 (8 de julio de 2020): 2234–60. http://dx.doi.org/10.1002/smj.3179.
Texto completoRahayu, Restu Karlina. "A Critical Analysis On Margaret E. Roberts (2018), Censored: Distraction And Diversion Inside China’s Great Firewall". Journal of Political Issues 1, n.º 2 (25 de enero de 2020): 92–102. http://dx.doi.org/10.33019/jpi.v1i2.8.
Texto completoWang, Qi, Ling Li y Shuai Hu. "Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things". Wireless Communications and Mobile Computing 2021 (15 de diciembre de 2021): 1–10. http://dx.doi.org/10.1155/2021/2297733.
Texto completoWang, Yu Lin y Jin Heng Wang. "Research on Security Technology of Campus Network". Advanced Materials Research 971-973 (junio de 2014): 1730–34. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1730.
Texto completoDev, Kankan. "A Great Approach for Medium Size Hospital Network Infrastructure Architecture". International Journal for Research in Applied Science and Engineering Technology 9, n.º 9 (30 de septiembre de 2021): 1440–43. http://dx.doi.org/10.22214/ijraset.2021.38207.
Texto completoTai, Zixue. "Casting the Ubiquitous Net of Information Control". International Journal of Advanced Pervasive and Ubiquitous Computing 2, n.º 1 (enero de 2010): 53–70. http://dx.doi.org/10.4018/japuc.2010010104.
Texto completoLiu, Hai Yan. "Designed Data Mining System Based on the Distribute Intrusion Detection Designed". Advanced Materials Research 1056 (octubre de 2014): 202–5. http://dx.doi.org/10.4028/www.scientific.net/amr.1056.202.
Texto completoYang, Qinghua y Yu Liu. "What’s on the other side of the great firewall? Chinese Web users’ motivations for bypassing the Internet censorship". Computers in Human Behavior 37 (agosto de 2014): 249–57. http://dx.doi.org/10.1016/j.chb.2014.04.054.
Texto completoLee, Wing Ki. "Network Unavailable". A Peer-Reviewed Journal About 9, n.º 1 (4 de agosto de 2020): 130–41. http://dx.doi.org/10.7146/aprja.v9i1.121495.
Texto completoGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik y Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks". Indonesian Journal of Electrical Engineering and Computer Science 12, n.º 2 (1 de noviembre de 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Texto completoTaneja, Harsh y Angela Xiao Wu. "Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior". Information Society 30, n.º 5 (2 de octubre de 2014): 297–309. http://dx.doi.org/10.1080/01972243.2014.944728.
Texto completoRomanovsky, Vladislav y Rifat Kildeev. "Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad". SHS Web of Conferences 134 (2022): 00031. http://dx.doi.org/10.1051/shsconf/202213400031.
Texto completoPATOKINA, E. L. "MARKETING STRATEGIES AND TOOLS FOR ENTERING THE CHINESE MARKET". EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1, n.º 7 (2021): 184–88. http://dx.doi.org/10.36871/ek.up.p.r.2021.07.01.023.
Texto completoYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things". Security and Communication Networks 2022 (10 de octubre de 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Texto completoDong, Li Na. "Design of Computer Information Network Security System". Applied Mechanics and Materials 539 (julio de 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Texto completoHan, Rongbin. "Censored: Distraction and Diversion Inside China’s Great Firewall. By Margaret E. Roberts. Princeton: Princeton University Press, 2018. 288p. $29.95 cloth." Perspectives on Politics 16, n.º 4 (23 de noviembre de 2018): 1134–35. http://dx.doi.org/10.1017/s1537592718002608.
Texto completoTucker, Joshua A. "Censored: Distraction and diversion inside China's great firewall. Roberts, Margaret E.Princeton University Press, Princeton, New Jersey, 2018. 288 pp. $29.95 (cloth)". Governance 32, n.º 3 (19 de junio de 2019): 586–87. http://dx.doi.org/10.1111/gove.12420.
Texto completoResnick, Marc. "Internet-Based Error Reporting Systems: Usability is Power". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, n.º 13 (octubre de 2007): 822–26. http://dx.doi.org/10.1177/154193120705101301.
Texto completoHartley, John, Lucy Montgomery y Henry Siling Li. "A new model for understanding global media and China: ‘Knowledge clubs’ and ‘knowledge commons’". Global Media and China 2, n.º 1 (marzo de 2017): 8–27. http://dx.doi.org/10.1177/2059436417705919.
Texto completoLi, Gongfa, Jianyi Kong, Guozhang Jiang, Liangxi Xie, Han Xiao, Zehao Wu y Siqiang Xu. "Remote Monitoring and Diagnosis System of Rolling Mill Based on CORBA and SOAP/Web Service Technology". Noise & Vibration Worldwide 42, n.º 10 (noviembre de 2011): 23–27. http://dx.doi.org/10.1260/0957-4565.42.10.23.
Texto completoDouglas, Frederick, Weiyang Pan y Matthew Caesar. "Salmon: Robust Proxy Distribution for Censorship Circumvention". Proceedings on Privacy Enhancing Technologies 2016, n.º 4 (1 de octubre de 2016): 4–20. http://dx.doi.org/10.1515/popets-2016-0026.
Texto completo