Articoli di riviste sul tema "Great Firewall"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Great Firewall".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, n. 1 (aprile 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Testo completoMulvenon, James C., e Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, n. 4 (31 luglio 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Testo completoZhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, n. 3 (agosto 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Testo completoLiu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13 marzo 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Testo completoHughes, Christopher R. "Google and the Great Firewall". Survival 52, n. 2 (25 marzo 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Testo completoScarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1 aprile 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Testo completoManaseer, Saher, Ahmad K. Al Hwaitat e Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n. 10 (9 settembre 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Testo completoTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz e Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, n. 2 (6 aprile 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Testo completoEnsafi, Roya, Philipp Winter, Abdullah Mueen e Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, n. 1 (1 aprile 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Testo completoAnderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, n. 11 (novembre 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Testo completoGu, Grace. "The Great Firewall of China and Marketplace Disintermediation". Academy of Management Proceedings 2019, n. 1 (1 agosto 2019): 14860. http://dx.doi.org/10.5465/ambpp.2019.14860abstract.
Testo completoMathieson, SA. "Researchers find way around Great Firewall of China". Infosecurity Today 3, n. 4 (luglio 2006): 4. http://dx.doi.org/10.1016/s1742-6847(06)70421-9.
Testo completoHuang, Gregory T. "Going online behind the Great Firewall of China". New Scientist 196, n. 2629 (novembre 2007): 66–67. http://dx.doi.org/10.1016/s0262-4079(07)62859-0.
Testo completoAKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n. 28 (13 maggio 2023): 442–69. http://dx.doi.org/10.52096/usbd.7.28.30.
Testo completoAKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n. 28 (9 maggio 2023): 293–319. http://dx.doi.org/10.52096/usbd.7.28.21.
Testo completoLi, Jinying. "Toward a Genealogy of the Wall-Screen". differences 33, n. 1 (1 maggio 2022): 28–59. http://dx.doi.org/10.1215/10407391-9735441.
Testo completoZulfikar, Faisal Mufti. "PEMBATASAN AKSES INTERNET SEBAGAI UPAYA CHINA MENJAGA KEAMANAN NASIONAL: THE GREAT FIREWALL OF CHINA". BHUVANA: Journal of Global Studies 1, n. 1 (17 marzo 2023): 26–38. http://dx.doi.org/10.59408/bjgs.v1i1.54.
Testo completoNormile, Dennis. "Science suffers as China plugs holes in Great Firewall". Science 357, n. 6354 (31 agosto 2017): 856. http://dx.doi.org/10.1126/science.357.6354.856.
Testo completoMarks, Paul. "Will Google's help breach the great firewall of China?" New Scientist 206, n. 2754 (marzo 2010): 17. http://dx.doi.org/10.1016/s0262-4079(10)60777-4.
Testo completoBensen, Tierney, Patrick Henze e Geoff Farnsworth. "The Great Chinese Firewall: A Safeguard or Stop Sign?" Journal of Information Privacy and Security 2, n. 3 (luglio 2006): 42–61. http://dx.doi.org/10.1080/15536548.2006.10855797.
Testo completoHu, Lingyun, Shuai Wen e Hongjun Yuan. "Thinking and Research on the Construction of Web Application Firewall in Smart Campus Environment". International Journal of Education and Humanities 14, n. 2 (30 maggio 2024): 66–69. http://dx.doi.org/10.54097/kzcr2296.
Testo completoStone, R., e H. Xin. "Google Plots Exit Strategy As China Shores Up 'Great Firewall'". Science 327, n. 5964 (21 gennaio 2010): 402–3. http://dx.doi.org/10.1126/science.327.5964.402-a.
Testo completoWowor, Harvardry Gerald Abraham, Arfin Sudirman e Falhan Hakiki. "China’s Great Firewall: Cybersecurity as Strategy for Building World Cyberpower". JISPO Jurnal Ilmu Sosial dan Ilmu Politik 13, n. 2 (22 marzo 2024): 193–232. http://dx.doi.org/10.15575/jispo.v13i2.27713.
Testo completoCurrier, Carrie Liu. "Roberts, Margaret E. Censored: Distraction and Diversion Inside China’s Great Firewall". Journal of Chinese Political Science 24, n. 4 (7 novembre 2019): 713–14. http://dx.doi.org/10.1007/s11366-019-09634-x.
Testo completoRodzvilla, John. "Margaret E. Roberts: Censored: Distraction and Diversion Inside China’s Great Firewall". Publishing Research Quarterly 35, n. 1 (17 gennaio 2019): 185–86. http://dx.doi.org/10.1007/s12109-019-09635-x.
Testo completoSHAN, Wei. "Winning Public Opinion Online: China's Internet Content Control". East Asian Policy 06, n. 03 (luglio 2014): 41–52. http://dx.doi.org/10.1142/s1793930514000257.
Testo completoSundquist, James. "Censored: Distraction and Diversion Inside China's Great Firewall by Margaret E. Roberts". China Review International 23, n. 4 (2016): 405–7. http://dx.doi.org/10.1353/cri.2016.0161.
Testo completoKim, Sung Wook, e Aziz Douai. "Google vs. China’s “Great Firewall”: Ethical implications for free speech and sovereignty". Technology in Society 34, n. 2 (maggio 2012): 174–81. http://dx.doi.org/10.1016/j.techsoc.2012.02.002.
Testo completoHaslam, Thomas. "Ubiquitous Learning behind the Great Firewall: Transforming the English Major at Shantou University". Ubiquitous Learning: An International Journal 9, n. 1 (2016): 9–20. http://dx.doi.org/10.18848/1835-9795/cgp/v09i01/9-20.
Testo completoZheng, Yanfeng, e Qinyu (Ryan) Wang. "Shadow of the great firewall: The impact of Google blockade on innovation in China". Strategic Management Journal 41, n. 12 (8 luglio 2020): 2234–60. http://dx.doi.org/10.1002/smj.3179.
Testo completoRahayu, Restu Karlina. "A Critical Analysis On Margaret E. Roberts (2018), Censored: Distraction And Diversion Inside China’s Great Firewall". Journal of Political Issues 1, n. 2 (25 gennaio 2020): 92–102. http://dx.doi.org/10.33019/jpi.v1i2.8.
Testo completoWang, Qi, Ling Li e Shuai Hu. "Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things". Wireless Communications and Mobile Computing 2021 (15 dicembre 2021): 1–10. http://dx.doi.org/10.1155/2021/2297733.
Testo completoWang, Yu Lin, e Jin Heng Wang. "Research on Security Technology of Campus Network". Advanced Materials Research 971-973 (giugno 2014): 1730–34. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1730.
Testo completoDev, Kankan. "A Great Approach for Medium Size Hospital Network Infrastructure Architecture". International Journal for Research in Applied Science and Engineering Technology 9, n. 9 (30 settembre 2021): 1440–43. http://dx.doi.org/10.22214/ijraset.2021.38207.
Testo completoTai, Zixue. "Casting the Ubiquitous Net of Information Control". International Journal of Advanced Pervasive and Ubiquitous Computing 2, n. 1 (gennaio 2010): 53–70. http://dx.doi.org/10.4018/japuc.2010010104.
Testo completoLiu, Hai Yan. "Designed Data Mining System Based on the Distribute Intrusion Detection Designed". Advanced Materials Research 1056 (ottobre 2014): 202–5. http://dx.doi.org/10.4028/www.scientific.net/amr.1056.202.
Testo completoYang, Qinghua, e Yu Liu. "What’s on the other side of the great firewall? Chinese Web users’ motivations for bypassing the Internet censorship". Computers in Human Behavior 37 (agosto 2014): 249–57. http://dx.doi.org/10.1016/j.chb.2014.04.054.
Testo completoLee, Wing Ki. "Network Unavailable". A Peer-Reviewed Journal About 9, n. 1 (4 agosto 2020): 130–41. http://dx.doi.org/10.7146/aprja.v9i1.121495.
Testo completoGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik e Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks". Indonesian Journal of Electrical Engineering and Computer Science 12, n. 2 (1 novembre 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Testo completoTaneja, Harsh, e Angela Xiao Wu. "Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior". Information Society 30, n. 5 (2 ottobre 2014): 297–309. http://dx.doi.org/10.1080/01972243.2014.944728.
Testo completoRomanovsky, Vladislav, e Rifat Kildeev. "Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad". SHS Web of Conferences 134 (2022): 00031. http://dx.doi.org/10.1051/shsconf/202213400031.
Testo completoPATOKINA, E. L. "MARKETING STRATEGIES AND TOOLS FOR ENTERING THE CHINESE MARKET". EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1, n. 7 (2021): 184–88. http://dx.doi.org/10.36871/ek.up.p.r.2021.07.01.023.
Testo completoYao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things". Security and Communication Networks 2022 (10 ottobre 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.
Testo completoDong, Li Na. "Design of Computer Information Network Security System". Applied Mechanics and Materials 539 (luglio 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Testo completoHan, Rongbin. "Censored: Distraction and Diversion Inside China’s Great Firewall. By Margaret E. Roberts. Princeton: Princeton University Press, 2018. 288p. $29.95 cloth." Perspectives on Politics 16, n. 4 (23 novembre 2018): 1134–35. http://dx.doi.org/10.1017/s1537592718002608.
Testo completoTucker, Joshua A. "Censored: Distraction and diversion inside China's great firewall. Roberts, Margaret E.Princeton University Press, Princeton, New Jersey, 2018. 288 pp. $29.95 (cloth)". Governance 32, n. 3 (19 giugno 2019): 586–87. http://dx.doi.org/10.1111/gove.12420.
Testo completoResnick, Marc. "Internet-Based Error Reporting Systems: Usability is Power". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, n. 13 (ottobre 2007): 822–26. http://dx.doi.org/10.1177/154193120705101301.
Testo completoHartley, John, Lucy Montgomery e Henry Siling Li. "A new model for understanding global media and China: ‘Knowledge clubs’ and ‘knowledge commons’". Global Media and China 2, n. 1 (marzo 2017): 8–27. http://dx.doi.org/10.1177/2059436417705919.
Testo completoLi, Gongfa, Jianyi Kong, Guozhang Jiang, Liangxi Xie, Han Xiao, Zehao Wu e Siqiang Xu. "Remote Monitoring and Diagnosis System of Rolling Mill Based on CORBA and SOAP/Web Service Technology". Noise & Vibration Worldwide 42, n. 10 (novembre 2011): 23–27. http://dx.doi.org/10.1260/0957-4565.42.10.23.
Testo completoDouglas, Frederick, Weiyang Pan e Matthew Caesar. "Salmon: Robust Proxy Distribution for Censorship Circumvention". Proceedings on Privacy Enhancing Technologies 2016, n. 4 (1 ottobre 2016): 4–20. http://dx.doi.org/10.1515/popets-2016-0026.
Testo completo