Skip to main content

Items where Subject is "T Technology > TK Electrical engineering. Electronics. Nuclear engineering > TK5101 Telecommunications > TK5105.888 World Wide Web"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B
Number of items at this level: 8.

A

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919)
[img]
Preview

B

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only.
[img]

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only.
[img]

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Targeted ‘malvertising’ reveals move towards more sophisticated hacks. . The Conversation UK Internet only.
[img]

This list was generated on Tue Nov 12 22:14:50 2019 GMT.