X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (54) 54
Conference Proceeding (35) 35
Book / eBook (3) 3
Book Chapter (3) 3
Book Review (3) 3
Magazine Article (3) 3
Publication (3) 3
Dissertation (2) 2
Newspaper Article (2) 2
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
hijack (38) 38
security (13) 13
bgp (12) 12
internet (8) 8
ip networks (8) 8
schmitz, oliver (6) 6
authentication (5) 5
monitoring (5) 5
prefix hijack (5) 5
routing (5) 5
servers (5) 5
构词方式 (5) 5
类比词 (5) 5
联想类比 (5) 5
英语 (5) 5
cryptography (4) 4
databases (4) 4
malware (4) 4
route (4) 4
route hijack (4) 4
session hijack (4) 4
terrorism (4) 4
wireless networks (4) 4
ハイジャック (4) 4
构词特点 (4) 4
类比构词 (4) 4
経路 (4) 4
语义 (4) 4
algorithms (3) 3
analytical models (3) 3
border gateway protocol (3) 3
computer science, hardware & architecture (3) 3
computer science, information systems (3) 3
dramatic arts (3) 3
entebbe airport raid, 1976 (3) 3
feature films (3) 3
film (3) 3
film-productions (3) 3
hardware (3) 3
hijack stories (3) 3
hijack stories, oliver schmitz (3) 3
index medicus (3) 3
jonathan operation, 1976 (3) 3
management (3) 3
operation jonathan, 1976 (3) 3
rescue of hijack victims at entebbe airport, 1976 (3) 3
robbery (3) 3
sensors (3) 3
study (3) 3
transport chain (3) 3
transport systems and logistics (3) 3
transportteknik och logistik (3) 3
violence in cargo theft (3) 3
vulnerability (3) 3
経路 ハイジャック (3) 3
analysis (2) 2
android malware (2) 2
androids (2) 2
animals (2) 2
armed forces (2) 2
arp spoofing (2) 2
asn (2) 2
behavioural (2) 2
bgp4 (2) 2
bitcoin (2) 2
browsers (2) 2
business and management (2) 2
canada (2) 2
cancer (2) 2
cargo (2) 2
civil engineering (2) 2
collaboration (2) 2
computer hacking (2) 2
computer information security (2) 2
crime films (2) 2
data privacy (2) 2
data security (2) 2
devices (2) 2
drone communication protocols (2) 2
drone countermeasures (2) 2
earphone (2) 2
electronics (2) 2
engineering and technology (2) 2
engineering, electrical & electronic (2) 2
feature extraction (2) 2
film festivals (2) 2
foreign relations (2) 2
hijacking (2) 2
hijacking of aircraft (2) 2
hostages (2) 2
humans (2) 2
hybridity (2) 2
information security (2) 2
innovation/technology management (2) 2
integrity (2) 2
ip hijack (2) 2
kidnapping (2) 2
law of the sea, air and outer space (2) 2
logic gates (2) 2
logistics (2) 2
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journalism, ISSN 1464-8849, 2018, p. 146488491880252
Journal Article
2017 IEEE Symposium on Security and Privacy (SP), ISSN 1081-6011, 05/2017, pp. 375 - 392
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one... 
cryptocurrency | BGP hijack | Bitcoin | Routing | Routing protocols | BGP | Peer-to-peer computing | Internet | Delays | IP networks | P2P networks | Cryptocurrency
Conference Proceeding
Dental Hypotheses, ISSN 2155-8213, 01/2015, Volume 6, Issue 1, pp. 3 - 5
  Researchers and scientific communities have encountered a horrible event named journal hijacking. In this paper, we present the unethical and criminal... 
Hijack | scientific community | journal
Journal Article
Ruan Jian Xue Bao/Journal of Software, ISSN 1000-9825, 03/2014, Volume 25, Issue 3, pp. 642 - 661
Journal Article
1976, ISBN 9780002161381, 184
Book
Indian Journal of Forensic Medicine and Toxicology, ISSN 0973-9122, 01/2012, Volume 6, Issue 1, pp. 43 - 44
Journal Article
Book
Proceedings on Privacy Enhancing Technologies, ISSN 2299-0984, 04/2019, Volume 2019, Issue 2, pp. 166 - 186
Recent work has shown that Tor is vulnerable to attacks that manipulate inter-domain routing to compromise user privacy. Proposed solutions such as... 
Differential Privacy | Max-Divergence | BGP Hijack Attacks
Journal Article
1976, ISBN 9780553104820, 216 p., [8] leaves of plates
Book
Applied Mechanics and Materials, ISSN 1660-9336, 12/2012, Volume 263-266, Issue 1, pp. 207 - 210
Data capture system gathers network packets, documents and operation records generated in training and experimental process of information system, which... 
API hijack | Information system | Data capture
Journal Article
IEEE Access, ISSN 2169-3536, 2019, Volume 7, pp. 51782 - 51789
At present, the boom in unmanned aerial vehicles (UAV) has been increasing in recent years, placing them in an important way in the commercial market. The use... 
hijack | Companies | Maldrone | vulnerabilities | UAV | GPS | Security | Aircraft | Robots | GPS spoofing | Drones | Global Positioning System | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2016, Volume 78, pp. 587 - 594
According to studies, Android is having the highest market share in smartphone operating systems. The number of Android apps (i.e. applications) are increasing... 
security | smartphone | honey-pot | Anti-Hijack | Android malware | vulnerabilities | intent
Journal Article
International Journal of Advanced Computer Science and Applications, ISSN 2158-107X, 2019, Volume 10, Issue 1, pp. 32 - 36
Journal Article
Journal of Marketing Management, ISSN 0267-257X, 06/2016, Volume 32, Issue 9-10, pp. 1033 - 1058
This ethnography outlines experiences of the marketer-facilitated World Series of Beer Pong. Consumers, in carnival spirit, augment marketer-facilitated... 
consumer excitement | brand community | Brandfest | carnival | marketplace tension | brand hijack | experiential marketing | MARKET | MANAGEMENT | POLITICS | BUSINESS | COMMUNITY | PRODUCTS | EXPERIENCE | EDGEWORK | CONSUMPTION | Analysis | Consumer culture | Marketing
Journal Article
Journal of Advanced Research in Dynamical and Control Systems, 09/2017, Volume 2017, Issue 13, pp. 574 - 582
Journal Article
2012 IEEE Symposium on Security and Privacy, ISSN 1081-6011, 05/2012, pp. 347 - 361
In this paper, we report a newly discovered "off-path TCP sequence number inference" attack enabled by firewall middle boxes. It allows an off-path (i.e., not... 
Radiation detectors | TCP connection hijack | TCP sequence number inference | Middleboxes | Malware | Firewall middleboxes | Servers | IP networks
Conference Proceeding
2016 IEEE International Carnahan Conference on Security Technology (ICCST), ISSN 1071-6572, 10/2016, pp. 1 - 8
Detection of potential hijackings of Unmanned Aerial Vehicles (UAVs) is an important capability to have for the safety of the future airspace and prevention of... 
hijack | security | Terrorism | Aggregates | variance | Unmanned aerial vehicles | Hardware | Software | UAV | Standards | statistics | sensor malfunction
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.