Found: 54
Select item for more details and to access through your institution.
CIA Agents to Stand Trial for Italy Kidnapping.
- Published in:
- Peace & Conflict Monitor, 2007, p. 2
- By:
- Publication type:
- Article
Update.
- Published in:
- Police Journal, 2015, v. 88, n. 4, p. 339, doi. 10.1177/0032258X15619584
- By:
- Publication type:
- Article
The Vices of Perception*.
- Published in:
- Philosophy & Phenomenological Research, 2020, v. 101, n. 3, p. 727, doi. 10.1111/phpr.12734
- By:
- Publication type:
- Article
Media Events: The Case of International Terrorism.
- Published in:
- Journal of Broadcasting & Electronic Media, 1987, v. 31, n. 1, p. 21, doi. 10.1080/08838158709386643
- By:
- Publication type:
- Article
Research Note on the Energy Infrastructure Attack Database (EIAD).
- Published in:
- Perspectives on Terrorism, 2013, v. 7, n. 6, p. 113
- By:
- Publication type:
- Article
Terrorism & Communication. A Critical Introduction.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
Exploring Support for Terrorism Among Muslims.
- Published in:
- Perspectives on Terrorism, 2013, v. 7, n. 3, p. 5
- By:
- Publication type:
- Article
Somali Piracy Negotiations: Resolving the Paradoxes of Extortionate Transactions.
- Published in:
- Negotiation & Conflict Management Research, 2014, v. 7, n. 3, p. 173, doi. 10.1111/ncmr.12033
- By:
- Publication type:
- Article
Worrying trends: The official 2008/09 South African crime statistics.
- Published in:
- SA Crime Quarterly, 2009, n. 30, p. 3
- By:
- Publication type:
- Article
Cops and robbers: a new approach.
- Published in:
- SA Crime Quarterly, 2009, n. 29, p. 3
- By:
- Publication type:
- Article
THE TIDE IS TURNING: The 2003/04 SAPS crime statistics.
- Published in:
- SA Crime Quarterly, 2005, n. 12, p. 1
- By:
- Publication type:
- Article
CYBER-EXTORTION: DUTIES AND LIABILITIES RELATED TO THE ELEPHANT IN THE SERVER ROOM.
- Published in:
- Journal of Law, Technology & Policy, 2007, v. 2007, n. 1, p. 21
- By:
- Publication type:
- Article
Note on the Hijacker: His Criminal Evolution from Hijinks to Revolution.
- Published in:
- Sociological Inquiry, 1973, v. 43, n. 1, p. 89, doi. 10.1111/j.1475-682X.1973.tb01155.x
- By:
- Publication type:
- Article
The Persuasive Appeal of Mediated Terrorism: The Case of the TWA Flight 847 Hijacking.
- Published in:
- Western Journal of Speech Communication: WJSC, 1990, v. 54, n. 2, p. 219, doi. 10.1080/10570319009374337
- By:
- Publication type:
- Article
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 52, doi. 10.3390/cryptography6040052
- By:
- Publication type:
- Article
Aviation Accident Causation Analysis Based on Complex Network Theory.
- Published in:
- Transactions of Nanjing University of Aeronautics & Astronautics, 2021, v. 38, n. 4, p. 646, doi. 10.16356/j.1005⁃1120.2021.04.011
- By:
- Publication type:
- Article
Hostage Events: Descriptive Profile and Analysis of Outcomes.
- Published in:
- Journal of Applied Social Psychology, 1992, v. 22, n. 2, p. 134, doi. 10.1111/j.1559-1816.1992.tb01526.x
- By:
- Publication type:
- Article
Fast Evolution and Lineage-Specific Gene Family Expansions of Aphid Salivary Effectors Driven by Interactions with Host-Plants.
- Published in:
- Genome Biology & Evolution, 2018, v. 10, n. 6, p. 1554, doi. 10.1093/gbe/evy097
- By:
- Publication type:
- Article
Hijacking of Embryonic Programs by Neural Crest-Derived Neuroblastoma: From Physiological Migration to Metastatic Dissemination.
- Published in:
- Frontiers in Molecular Neuroscience, 2019, p. N.PAG, doi. 10.3389/fnmol.2019.00052
- By:
- Publication type:
- Article
RESOURCE HIJACKING AS A BRICOLAGE TECHNIQUE.
- Published in:
- Economic & Business Review, 2012, v. 14, n. 1, p. 5, doi. 10.15458/2335-4216.1201
- By:
- Publication type:
- Article
Shooting down a hijacked civilian aircraft - criminal law dimensions of the human right to life. Comments on a judicial decision of the German Federal Constitutional Court of 15. 2. 2006 (BVerfG, 1 BvR 357/05).
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2006, v. 57, n. 2, p. 132
- By:
- Publication type:
- Article
WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 12, p. 3401, doi. 10.1007/s00500-015-2017-6
- By:
- Publication type:
- Article
How Effective Is Security Screening of Airline Passengers?
- Published in:
- Interfaces, 2006, v. 36, n. 6, p. 545, doi. 10.1287/inte.1060.0231
- By:
- Publication type:
- Article
LOVE ADDICTION.
- Published in:
- Philosophy, Psychiatry & Psychology, 2017, v. 24, n. 1, p. 101, doi. 10.1353/ppp.2017.0014
- By:
- Publication type:
- Article
HIJACKING ADDICTION.
- Published in:
- Philosophy, Psychiatry & Psychology, 2017, v. 24, n. 1, p. 97, doi. 10.1353/ppp.2017.0013
- By:
- Publication type:
- Article
Hijacked Destination Images? Autonomous Representations of Dubai and Abu Dhabi in The Amazing Race, U.S.A.
- Published in:
- E-review of Tourism Research, 2018, v. 15, n. 4/5, p. 314
- By:
- Publication type:
- Article
Enhanced P2P Botnets Detection Framework Architecture with Hybrid Analysis Approach.
- Published in:
- Journal of Information Assurance & Security, 2014, v. 9, n. 2, p. 62
- By:
- Publication type:
- Article
Qualitative Analysis of Methods for Circumventing Malicious ISP Blocking.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2012, v. 37, n. 7, p. 1911, doi. 10.1007/s13369-012-0307-1
- By:
- Publication type:
- Article
Voice and Listening in Social Media Facilitated Activist Collectives.
- Published in:
- Canadian Review of Sociology, 2020, v. 57, n. 4, p. 582, doi. 10.1111/cars.12302
- By:
- Publication type:
- Article
Should We Stop Trusting Trust?
- Published in:
- 2008
- By:
- Publication type:
- Editorial
Spaces of Remembrance & Representation in the City.
- Published in:
- Luso-Brazilian Review, 2008, v. 45, n. 2, p. 177, doi. 10.1353/lbr.0.0044
- By:
- Publication type:
- Article
Prevention of Post-Traumatic Stress Disorders.
- Published in:
- Journal of Traumatic Stress, 1989, v. 2, n. 3, p. 335, doi. 10.1002/jts.2490020308
- By:
- Publication type:
- Article
Being Held Hostage in The Netherlands: A Study of Long-term Aftereffects.
- Published in:
- Journal of Traumatic Stress, 1989, v. 2, n. 2, p. 153, doi. 10.1002/jts.2490020204
- By:
- Publication type:
- Article
A Terrorist Hijacking: Victims' Experiences Initially and 9 Years Later.
- Published in:
- Journal of Traumatic Stress, 1989, v. 2, n. 1, p. 49, doi. 10.1002/jts.2490020106
- By:
- Publication type:
- Article
Habermasian utopia or Sunstein's echo chamber? The 'dark side' of hashtag hijacking and feminist activism.
- Published in:
- Legal Studies, 2020, v. 40, n. 3, p. 507, doi. 10.1017/lst.2020.16
- By:
- Publication type:
- Article
'Ours will be a tent': The meaning and symbolism of the early Aboriginal Tent Embassy.
- Published in:
- ANU Historical Journal II, 2019, p. 57, doi. 10.22459/anuhjii.2019.08
- By:
- Publication type:
- Article
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00098-2
- By:
- Publication type:
- Article
We'll always have purgatory: Fan spaces in social media.
- Published in:
- Journal of Fandom Studies, 2017, v. 5, n. 2, p. 175, doi. 10.1386/jfs.5.2.175_1
- By:
- Publication type:
- Article
At least 23 killed in weekend Xinjiang clashes.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2011, v. 46, n. 9, p. 23
- Publication type:
- Article
Launching the Study "Current Challenges in the Field of Cybersecurity".
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 2, p. 55
- By:
- Publication type:
- Article
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2012, v. 9, n. 3, p. 201
- By:
- Publication type:
- Article
Widows and Inheritance Hijacking Practices in Ilara Mokin, Ondo State, Nigeria.
- Published in:
- African Journal of Criminology & Justice Studies, 2016, v. 9, n. 1, p. 116
- By:
- Publication type:
- Article
METODY I ŚRODKI OCHRONY PRZED AKTAMI BEZPRAWNEJ INGERENCJI W LOTNICTWIE CYWILNYM NA PRZYKŁADZIE PORTU LOTNICZEGO WROCŁAW STRACHOWICE.
- Published in:
- Journal of Science of the Gen. Tadeusz Kosiuszko Military Academy of Land Forces, 2013, v. 170, n. 4, p. 48, doi. 10.5604/17318157.1115172
- By:
- Publication type:
- Article
Gulf of Guinea - Recent Attacks.
- Published in:
- Africa Research Bulletin: Political, Social & Cultural Series, 2011, v. 48, n. 10, p. 19030A, doi. 10.1111/j.1467-825X.2011.04151.x
- Publication type:
- Article
Hijackings Will Cause Hunger.
- Published in:
- Africa Research Bulletin: Political, Social & Cultural Series, 2008, v. 45, n. 4, p. 17508
- Publication type:
- Article
You don't have to be perfect.
- Published in:
- ATA News, 2020, v. 55, n. 1, p. 13
- Publication type:
- Article
Understanding the Motivations of "Lone Wolf" Terrorists: The "Bathtub" Model.
- Published in:
- Perspectives on Terrorism, 2021, v. 15, n. 2, p. 23
- By:
- Publication type:
- Article
An Epidemiological Study of Fatal Firearm Cases in Varanasi, UP.
- Published in:
- Indian Journal of Forensic Medicine & Toxicology, 2014, v. 8, n. 2, p. 55, doi. 10.5958/0973-9130.2014.00682.3
- By:
- Publication type:
- Article
Terror(ism).
- Published in:
- Value Inquiry Book Series, 2014, v. 276, p. 457
- By:
- Publication type:
- Article
The Threat of Maritime Terrorism and Responses: The Zone of Threat and the Sea-Lanes in a Global Strategy Map.
- Published in:
- Korean Journal of Defense Analysis, 2006, v. 18, n. 2, p. 55, doi. 10.1080/10163270609464106
- By:
- Publication type:
- Article