Items where Subject is "T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101 Telecommunications > TK5105.888 World Wide Web (technology of)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Number of items at this level: 8.

Conference or workshop item

Aslan, Ça?r? B., Sa?lam, Rahime Belen, Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. . ACM ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919)
[img]
Preview

Internet publication

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only.
[img]

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only.
[img]

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Targeted ‘malvertising’ reveals move towards more sophisticated hacks. . The Conversation UK Internet only.
[img]

This list was generated on Tue Jul 16 22:03:16 2019 BST.