Countering Islamic State Messaging Through “Linkage-Based” Analysis

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Countering Trusting Trust through Diverse Double-Compiling

• Huge benefits – Controlling a compiler controls everything it compiles – Controlling 2-3 compilers would control almost every computer worldwide • Risks low – no viable detection technique • Costs low...medium – Requires one-time write of trusted binary • Not necessarily easy, but someone can, one-time, & not designed to withstand determined attack – Even if costs were high, the power to cont...

متن کامل

Scent Trails: Countering Terrorism through Informed Surveillance

This paper reports the DScenT (Detecting Scent Trails) project, which brought together technologists and behavioural scientists to design and evaluate novel methods for countering terrorism in public places. Through a mixture of prototyping and empirical evaluations, we developed and assessed an immersive environment for detecting and investigating deceptive behaviours indicative of terrorist a...

متن کامل

constructing gender identity through narratives based on hallidays metafunctions

هویت, شکل دادن و بازنمایی آن در گفتمان, توجه بسیاری از محققان این رشته را به خود جلب کرده است. تحقیق حاضر بر شکل دادن به هویت جنسیتی هشت تن از دانشجویان ایرانی مشغول به تحصیل در دوره کارشناسی ارشد از طریق بررسی روایات آنان از تجربیات شخصی, متمرکز شده است. تحلیل داده ها در این تحقیق مشتمل بر سه بخش است: بخش اول شامل کدگذاری موضوعی روایات است که بر اساس آن هویت جنسیتی شرکت کنندگان در تحقیق بر اسا...

15 صفحه اول

Exploring Awareness Related Messaging Through Two Situated-Display-Based Systems

This article focuses on our exploration of awareness issues through the design and long-term deployment of two systems: the Hermes office door display system (which enabled staff in a university department to post awareness messages to their door displays) and SPAM (a messaging system for supporting coordination HUMAN–COMPUTER INTERACTION, 2007, Volume 22, pp. 173–220 Copyright © 2007, Lawrence...

متن کامل

Covert Messaging through TCP Timestamps

We present a protocol for sending data over a common class of low-bandwidth covert channels. Covert channels exist in most communications systems and allow individuals to communicate truly undetectably. However, covert channels are seldom used due to their complexity. Our protocol is both practical and secure against attack by powerful adversaries. We implement our protocol on a standard platfo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Terrorism and Counter-Terrorism Studies

سال: 2017

ISSN: 2468-0486

DOI: 10.19165/2017.2.02