Search

Your search keyword '"hijacking"' showing total 1,182 results

Search Constraints

Start Over You searched for: Descriptor "hijacking" Remove constraint Descriptor: "hijacking"
1,182 results on '"hijacking"'

Search Results

1. Hijacking autophagy for infection by flaviviruses

2. Enhancer hijacking: Innovative ways of carcinogenesis

3. TERRORISM: THE CHALLENGE OF AVIATION SECURITY.

5. حادثة اختطاف الطائ ا رت ايلول 0771)في ضوء الوثائق الامريكية(

6. Unregulated Journal Publishing Industry: Academia Driven to Consensual Intellectual Theft.

7. CYBERSECURITY: BOTNET THREAT DETECTION ACROSS THE SEVEN-LAYER ISO-OSI MODEL USING MACHINE LEARNING TECHNIQUES.

8. Bad boys.

9. Flying While Palestinian: A Critical Analysis of Palestinian Aviation Diplomacy.

10. The SARS-CoV-2 Spike Protein Activates the Epidermal Growth Factor Receptor-Mediated Signaling.

11. Getting on the right track: Interactions between viruses and the cytoskeletal motor proteins.

12. أحكام حوادث الطائرات في الفقه الاسلامي.

13. ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol.

14. Exploring Care Robots' Cybersecurity Threats From Care Robotics Specialists' Point of View.

15. Hijacking autophagy for infection by flaviviruses.

17. Sleepwalking to Solidarity? Russia, Ukraine and the European Dream.

18. The SARS-CoV-2 Spike Protein Activates the Epidermal Growth Factor Receptor-Mediated Signaling

19. Feminist Translation of Six Records of a Floating Life.

20. Formulas for counteracting cyber threats in regards to computer products supply chains.

22. Some Issues of Qualification of the Hijacking of an Aircraft, a Sea-Going Ship, or a Railway Train (Article 211 of the Criminal Code of the Russian Federation)

23. DEADLY L.A. BUS HIJACKING.

24. The Danger of using Artificial Intelligence by Development of Autonomous Vehicles

26. Les virus : des dompteurs de vésicules.

27. On the Security of Governmental Hashtags Against Hijacking. A Case Study of # توكلنا Hashtag.

28. Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.

29. ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol

30. Aviation Accident Causation Analysis Based on Complex Network Theory.

31. Forensic mapping in a civil proceeding in South Africa.

32. Cloud Computing: Technologies, Services and Security Issues.

33. Practical Mitigations Against Memory Corruption and Transient Execution Attacks

34. Understanding the Motivations of "Lone Wolf" Terrorists: The "Bathtub" Model.

35. Remembering Flight 93: "Okay. Let's Roll!" On that fateful flight, American heroes and the accidents of history combined to save the US Capitol from likely total destruction.

36. Ivan Juritz Prize 2021.

37. Nick Makoha's – a low pressure system.

39. Biopiracy: Abolish Corporate Hijacking of Indigenous Medicinal Entities.

40. DEADLY BUS HIJACKING TWIST.

41. NEWS HEADLINES.

42. INSIDE THE ATLANTA BUS HIJACKING.

43. BUS HIJACKING LEAVES ONE PERSON DEAD.

44. The Vices of Perception*.

45. Voice and Listening in Social Media Facilitated Activist Collectives.

46. Habermasian utopia or Sunstein's echo chamber? The 'dark side' of hashtag hijacking and feminist activism.

47. Hijacking Unmanned Aerial Vehicle by Exploiting Civil GPS Vulnerabilities Using Software-defined Radio.

48. εἰ δή τις ... συκοφαντοίη: Impiety and the fiscus Iudaicus in Josephus, War 1.11.

50. ESCRT machinery and virus infection.

Catalog

Books, media, physical & digital resources