Добірка наукової літератури з теми "Terrorism – Computer network resources"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Terrorism – Computer network resources".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Terrorism – Computer network resources"
Baranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.
Повний текст джерелаChernova, E. V., P. N. Polezhaev, A. E. Shukhman, Yu A. Ushakov, I. P. Bolodurina, and N. F. Bakhareva. "Security event data collection and analysis in large corporate networks." Information Technology and Nanotechnology, no. 2416 (2019): 233–41. http://dx.doi.org/10.18287/1613-0073-2019-2416-233-241.
Повний текст джерелаAndrusyshyn, Julia, and Valeria Barannik. "INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 6–15. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-1.
Повний текст джерелаSurma, Ivan V. "The role of information and psychological operations in the escalation of the Ukrainian crisis." Diplomaticheskaja sluzhba (Diplomatic Service), no. 3 (June 7, 2022): 204–9. http://dx.doi.org/10.33920/vne-01-2203-04.
Повний текст джерелаHaynes, Steven R., Thomas George Kannampallil, Lawrence L. Larson, and Nitesh Garg. "Optimizing anti-terrorism resource allocation." Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 299–309. http://dx.doi.org/10.1002/asi.20120.
Повний текст джерелаRomanov, Rashit. "The Basic Principles of Information Protection in the Russian Federation in the Transition to a Digital Economy." NBI Technologies, no. 3 (January 2019): 13–18. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.2.
Повний текст джерелаGoffe, William L. "Computer Network Resources for Economists." Journal of Economic Perspectives 8, no. 3 (August 1, 1994): 97–119. http://dx.doi.org/10.1257/jep.8.3.97.
Повний текст джерелаBura, Aman, and Yang Dacheng . "GPRS Network Resources Optimization." Information Technology Journal 5, no. 5 (August 15, 2006): 970–75. http://dx.doi.org/10.3923/itj.2006.970.975.
Повний текст джерелаKlebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Повний текст джерелаWang, Yaojie, Xiaolong Cui, and Peiyong He. "Winning the War on Terror." International Journal of Information Technology and Web Engineering 17, no. 1 (January 2022): 1–15. http://dx.doi.org/10.4018/ijitwe.288038.
Повний текст джерелаДисертації з теми "Terrorism – Computer network resources"
Daniels, Minji. "Online Islamic organizations and measuring Web effectiveness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FDaniels.pdf.
Повний текст джерелаThesis Advisor(s): James Ehlert, Raymond Buettner. Includes bibliographical references (p. 55-58). Also available online.
Spinks, Brandon Todd. "Assessing Perceived Credibility of Web Sites in a Terrorism Context: The PFLP, Tamil Tigers, Hamas, and Hezbollah." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc10980/.
Повний текст джерелаCrause, Ewald. "The effect of using a computer-based exploration tool on children's career development learning." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1015020.
Повний текст джерелаBailey, Charles W. "Intelligent Multimedia Computer Systems: Emerging Information Resources in the Network Environment." Pierian Press, 1990. http://hdl.handle.net/10150/105658.
Повний текст джерелаYang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.
Повний текст джерелаNguyen, Thanh Vinh. "Content distribution networks over shared infrastructure a paradigm for future content network deployment /." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.094632/index.html.
Повний текст джерелаPoon, Auliana. "Information technology and innovation in international tourism Implications for the Caribbean tourist industry /." Online version, 1987. http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.383578.
Повний текст джерелаRichter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.
Повний текст джерелаMainville, Sylvie. "Investigating the Delivery of Therapeutic Recreation Services on the Internet: a Pilot Study Using Leisure Education for the Prevention of Alcohol Abuse." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278246/.
Повний текст джерелаJahani, Masoumeh. "Computer simulation of the osteocyte and bone lining cell network and the effect of normal physiological changes in cellular functions on that network." Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:7112.
Повний текст джерелаКниги з теми "Terrorism – Computer network resources"
Brandon, James. Virtual Caliphate: Islamic extremists and their websites. London: Centre for Social Cohesion, 2008.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. Washington: U.S. G.P.O., 2009.
Знайти повний текст джерелаUsing the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, November 6, 2007. Washington: U.S. G.P.O., 2009.
Знайти повний текст джерелаThe making of a homegrown terrorist: Brainwashing rebels in search of a cause. Santa Barbara: Praeger, An imprint of ABC-CLIO, LLC, 2014.
Знайти повний текст джерелаVirtual caliphate: Exposing the Islamist state on the internet. Dulles, Va: Potomac Books, 2010.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Foreign Affairs. Subcommittee on Terrorism, Nonproliferation, and Trade. ISIS: defining the enemy: Hearing before the Subcommittee on Terrorism, Nonproliferation, and Trade of the Committee on Foreign Affairs, House of Representatives, One Hundred Fourteenth Congress, first session, April 29, 2015. Washington: U.S. Government Publishing Office, 2015.
Знайти повний текст джерелаPortals to the world: Selected Internet resources : Terrorism : links to electronic resources selected by Library of Congress subject experts. Washington, DC: Library of Congress, 2002.
Знайти повний текст джерелаIsis ®: Il marketing dell'Apocalisse. Milano: Baldini&Castoldi, 2015.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Counterterrorism and Intelligence. Jihadist use of social media: How to prevent terrorism and preserve innovation : hearing before the Subcommittee on Counterterrorism and Intelligence of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, December 6, 2011. Washington: U.S. Government Printing Office, 2012.
Знайти повний текст джерелаTerror on the internet: The new arena, the new challenges. Washington, DC: United States Institute of Peace Press, 2006.
Знайти повний текст джерелаЧастини книг з теми "Terrorism – Computer network resources"
Sallabi, Farag, and Ahmed Karmouch. "Mobile Network Domain Agency for Managing Network Resources." In Lecture Notes in Computer Science, 67–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-45391-1_5.
Повний текст джерелаNowicki, Krzysztof, Aleksander Malinowski, and Marcin Sikorski. "More Just Measure of Fairness for Sharing Network Resources." In Computer Networks, 52–58. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39207-3_5.
Повний текст джерелаReinhardt, Wilko. "Advance reservation of network resources for multimedia applications." In Lecture Notes in Computer Science, 23–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58494-3_3.
Повний текст джерелаReilly, James, and Maurizio Abate. "Scheduled connections: Managing temporal constraints on broadband network resources." In Lecture Notes in Computer Science, 425–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0056987.
Повний текст джерелаZhang, Haiqing, Lei Huang, Jianjun Zhou, Haifei Xu, and Yintian Liu. "A Novel Personalized Recommendation for Intelligent Sharing of Network Resources." In Communications in Computer and Information Science, 227–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23226-8_30.
Повний текст джерелаIsmail, Ziad, Christophe Kiennert, Jean Leneutre, and Lin Chen. "A Game Theoretical Model for Optimal Distribution of Network Security Resources." In Lecture Notes in Computer Science, 234–55. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68711-7_13.
Повний текст джерелаMatsumoto, Nobutaka, Takahiro Miyamoto, Michiaki Hayashi, and Hideaki Tanaka. "BPEL Driven Policy Management of Virtualized Network Resources for IMS Environments." In Lecture Notes in Computer Science, 317–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88623-5_32.
Повний текст джерелаKuchař, Štěpán, Jan Martinovič, Pavla Dráždilová, and Kateřina Slaninová. "Synthetic Social Network Based on Competency-Based Description of Human Resources." In Computer Information Systems and Industrial Management, 313–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_29.
Повний текст джерелаYin, Zhixiang, and Hua Chen. "Impact of Network Information on the Management of Library E-Resources." In Communications in Computer and Information Science, 234–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16397-5_21.
Повний текст джерелаZhang, Hongyan, Bo Liu, Long Qin, Jing Zhang, and Weichao Gong. "Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain." In Lecture Notes in Computer Science, 135–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78612-0_11.
Повний текст джерелаТези доповідей конференцій з теми "Terrorism – Computer network resources"
Zhang, Youzhi, Bo An, Long Tran-Thanh, Zhen Wang, Jiarui Gan, and Nicholas R. Jennings. "Optimal Escape Interdiction on Transportation Networks." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/550.
Повний текст джерелаFife, Leslie D., and Kevin I. Frost. "Cost Savings through Effective Use of Network Resources." In Petroleum Computer Conference. Society of Petroleum Engineers, 1994. http://dx.doi.org/10.2118/28268-ms.
Повний текст джерелаLuan, Meng, Duoyong Sun, and Zhanfeng Li. "Terrorism Risk Prediction Model Based on Support Vector Machine Optimized by Whale Algorithm." In 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2019. http://dx.doi.org/10.1109/iccsnt47585.2019.8962435.
Повний текст джерелаKim, M., M. Medard, V. Aggarwal, U. M. O�Reilly, W. Kim, C. W. Ahn, and M. Effros. "Evolutionary Approaches To Minimizing Network Coding Resources." In IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. IEEE, 2007. http://dx.doi.org/10.1109/infcom.2007.231.
Повний текст джерелаLiu, Xiaodong, and Huating Xu. "A Network Resources Scheduling Method for Virtual Machine." In Next Generation Computer and Information Technology 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.63.07.
Повний текст джерелаZhu, Y., and M. Ammar. "Algorithms for Assigning Substrate Network Resources to Virtual Network Components." In Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. IEEE, 2006. http://dx.doi.org/10.1109/infocom.2006.322.
Повний текст джерелаBalan, T. C., D. N. Robu, and F. Sandu. "Ad-hoc lab computer network configuration using remote resources." In 2015 IEEE 21st International Symposium for Design and Technology in Electronic Packaging (SIITME). IEEE, 2015. http://dx.doi.org/10.1109/siitme.2015.7342360.
Повний текст джерелаBaxley, Stuart, Deniz Gurkan, Hamidreza Validi, and Illya Hicks. "Graph Representation of Computer Network Resources for Precise Allocations." In 2022 International Conference on Computer Communications and Networks (ICCCN). IEEE, 2022. http://dx.doi.org/10.1109/icccn54977.2022.9868852.
Повний текст джерела"Application of Computer Network Information Resources in Physical Education." In 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science. Francis Academic Press, 2018. http://dx.doi.org/10.25236/iceeecs.2018.042.
Повний текст джерелаHuang, Pengda, Matthew Jordan Tonnemacher, Yongjiu Du, Dinesh Rajan, and Joseph Camp. "Towards scalable network emulation: Channel accuracy versus implementation resources." In IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. IEEE, 2013. http://dx.doi.org/10.1109/infcom.2013.6566996.
Повний текст джерела