Works matching Hijacking
1
- JQ: Justice Quarterly, 2012, v. 29, n. 4, p. 573, doi. 10.1080/07418825.2011.583265
- Fahey, Susan;
- LaFree, Gary;
- Dugan, Laura;
- Piquero, AlexR.
- Article
2
- African Journal of Criminology & Justice Studies, 2016, v. 9, n. 1, p. 116
- Article
3
- Western Journal of Speech Communication: WJSC, 1990, v. 54, n. 2, p. 219, doi. 10.1080/10570319009374337
- Article
4
- Criminology, 2005, v. 43, n. 4, p. 1031, doi. 10.1111/j.1745-9125.2005.00032.x
- Dugan, Laura;
- Lafree, Gary;
- Piquero, Alex R.
- Article
5
- Journal of Criminal Law, Criminology & Police Science, 1972, v. 63, n. 3, p. 356, doi. 10.2307/1142058
- Article
6
- Legal Studies, 2020, v. 40, n. 3, p. 507, doi. 10.1017/lst.2020.16
- Dempsey Willis, Reilly Anne
- Article
7
- Journal of Broadcasting & Electronic Media, 1989, v. 33, n. 3, p. 293, doi. 10.1080/08838158909364082
- Article
9
- Past & Present, 2019, v. 243, n. 1, p. 213, doi. 10.1093/pastj/gty044
- Article
10
- Vierteljahrshefte für Zeitgeschichte, 2023, v. 71, n. 3, p. 525, doi. 10.1515/vfzg-2023-0026
- Article
11
- Journal of Religion & Psychical Research, 2000, v. 23, n. 2, p. 63
- Article
12
- Economic & Business Review, 2012, v. 14, n. 1, p. 5, doi. 10.15458/2335-4216.1201
- Article
13
- Monthly Labor Review, 1972, v. 95, n. 8, p. 62
- Article
14
- Collegiate Aviation Review International, 2017, v. 35, n. 1, p. 13, doi. 10.22488/okstate.18.100472
- Mehta, Rian;
- Rice, Stephen;
- Winter, Scott R.;
- Buza, Paul
- Article
15
- Journal of Maritime Law & Commerce, 2011, v. 42, n. 4, p. 569
- Dubner, Barry Hart;
- Henn, Joseph P.
- Article
16
- Journal of Airport Management, 2015, v. 9, n. 4, p. 310, doi. 10.69554/zyjg6270
- Article
17
- Journal of Social Psychology, 1963, v. 60, n. 2, p. 289, doi. 10.1080/00224545.1963.9922199
- Article
19
- Africa Research Bulletin: Political, Social & Cultural Series, 2010, v. 47, n. 10, p. 18596A, doi. 10.1111/j.1467-825X.2010.03536.x
- Article
20
- Africa Research Bulletin: Political, Social & Cultural Series, 2010, v. 47, n. 10, p. 18596A, doi. 10.1111/j.1467-825X.2010.03536.x
- Article
21
- Africa Research Bulletin: Political, Social & Cultural Series, 2008, v. 45, n. 4, p. 17508
- Article
22
- American Statistician, 1970, v. 24, n. 1, p. 41, doi. 10.2307/2682296
- Article
25
- CyberPsychology & Behavior, 2001, v. 4, n. 3, p. 355, doi. 10.1089/109493101300210259
- Ichimura, Atsushi;
- Nakajima, Isao;
- Juzoji, Hiroshi
- Article
26
- Obsidian, 2020, v. 46, n. 1, p. 131
- Bekkal, Selma;
- Benkechida, Saliha
- Article
27
- Philosophy, Psychiatry & Psychology, 2017, v. 24, n. 1, p. 97, doi. 10.1353/ppp.2017.0013
- Article
28
- Leisure Studies, 2013, v. 32, n. 1, p. 49, doi. 10.1080/02614367.2012.680069
- Gilchrist, Paul;
- Ravenscroft, Neil
- Article
29
- Frontiers in Molecular Neuroscience, 2019, p. N.PAG, doi. 10.3389/fnmol.2019.00052
- Delloye-Bourgeois, Céline;
- Castellani, Valérie
- Article
30
- Journal of Traumatic Stress, 1989, v. 2, n. 1, p. 49, doi. 10.1002/jts.2490020106
- Article
31
- Journalism Quarterly, 1993, v. 70, n. 1, p. 26, doi. 10.1177/107769909307000104
- Article
32
- Journal Of Sichuan University (Natural Sciences Division) / Sichuan Daxue Xuebao-Ziran Kexueban, 2021, v. 58, n. 3, p. 1, doi. 10.19907/j.0490-6756.2021.032004
- Article
33
- Cyber Security & Data Governance, 2025, v. 44, n. 3, p. 89, doi. 10.19358/1issn.2097-1788.2025.03.015
- Article
34
- Cyber Security & Data Governance, 2024, v. 43, n. 3, p. 49, doi. 10.19358/j.issn.2097-1788.2024.03.008
- Article
35
- Journal on Communication / Tongxin Xuebao, 2021, v. 42, n. 1, p. 37, doi. 10.11959/j.issn.1000-436x.2021013
- PAN Chuanxing;
- ZHANG Zheng;
- MA Bolin;
- YAO Yuan;
- JI Xinsheng
- Article
36
- Informatica (03505596), 2025, v. 49, n. 2, p. 333, doi. 10.31449/inf.v49i2.6956
- Rawat, Romil;
- Borana, Kamal;
- Gupta, Shweta;
- Ingle, Mandakini;
- Dibouliya, Ashish;
- Bhardwaj, Purvee;
- Rawat, Anjali
- Article
37
- International Journal of Network Management, 2013, v. 23, n. 1, p. 1, doi. 10.1002/nem.1805
- Hong, Seong‐Cheol;
- Ju, Hongtaek;
- Hong, James Won‐Ki
- Article
38
- Journal of the Korea Institute of Information & Communication Engineering, 2022, v. 26, n. 10, p. 1525, doi. 10.6109/jkiice.2022.26.10.1525
- Article
39
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 104
- Bharti, Abhishek Kumar;
- Goyal, Maggi;
- Chaudhary, Manoj
- Article
40
- Computer Engineering & Science / Jisuanji Gongcheng yu Kexue, 2020, v. 42, n. 7, p. 1184, doi. 10.3969/j.issn.1007-130X.2020.07.006
- Article
41
- ICTACT Journal on Communication Technology, 2016, v. 7, n. 4, p. 1408, doi. 10.21917/ijct.2016.0208
- Article
42
- Information Systems Journal, 2024, v. 34, n. 2, p. 364, doi. 10.1111/isj.12481
- Müller, Sune Dueholm;
- Sæbø, Johan Ivar
- Article
43
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 52, doi. 10.3390/cryptography6040052
- Arfaoui, Ghada;
- Avoine, Gildas;
- Gimenez, Olivier;
- Traoré, Jacques
- Article
44
- Journal on Communication / Tongxin Xuebao, 2019, v. 40, n. 6, p. 40, doi. 10.11959/j.issn.1000−436x.2019144
- Article
45
- Neuroscientist, 2013, v. 19, n. 5, p. 434, doi. 10.1177/1073858412458368
- Cheney, P. D.;
- Griffin, D. M.;
- Van Acker, G. M.
- Article
46
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2201, doi. 10.1002/sec.738
- Liu, Yujing;
- Peng, Wei;
- Su, Jinshu
- Article
47
- International Review on Computers & Software, 2012, v. 7, n. 5, p. 2088
- Article
48
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 2, p. 55, doi. 10.1080/19393555.2013.783952
- Wedman, Shellie;
- Tetmeyer, Annette;
- Saiedian, Hossein
- Article
49
- Technical Gazette / Tehnički Vjesnik, 2016, v. 23, n. 4, p. 985, doi. 10.17559/TV-20150314133532
- Article
50
- Agriculture & Human Values, 2020, v. 37, n. 2, p. 281, doi. 10.1007/s10460-019-09984-5
- Article