Countering Islamic State Messaging Through “Linkage-Based” Analysis
نویسندگان
چکیده
منابع مشابه
Countering Trusting Trust through Diverse Double-Compiling
• Huge benefits – Controlling a compiler controls everything it compiles – Controlling 2-3 compilers would control almost every computer worldwide • Risks low – no viable detection technique • Costs low...medium – Requires one-time write of trusted binary • Not necessarily easy, but someone can, one-time, & not designed to withstand determined attack – Even if costs were high, the power to cont...
متن کاملScent Trails: Countering Terrorism through Informed Surveillance
This paper reports the DScenT (Detecting Scent Trails) project, which brought together technologists and behavioural scientists to design and evaluate novel methods for countering terrorism in public places. Through a mixture of prototyping and empirical evaluations, we developed and assessed an immersive environment for detecting and investigating deceptive behaviours indicative of terrorist a...
متن کاملconstructing gender identity through narratives based on hallidays metafunctions
هویت, شکل دادن و بازنمایی آن در گفتمان, توجه بسیاری از محققان این رشته را به خود جلب کرده است. تحقیق حاضر بر شکل دادن به هویت جنسیتی هشت تن از دانشجویان ایرانی مشغول به تحصیل در دوره کارشناسی ارشد از طریق بررسی روایات آنان از تجربیات شخصی, متمرکز شده است. تحلیل داده ها در این تحقیق مشتمل بر سه بخش است: بخش اول شامل کدگذاری موضوعی روایات است که بر اساس آن هویت جنسیتی شرکت کنندگان در تحقیق بر اسا...
15 صفحه اولExploring Awareness Related Messaging Through Two Situated-Display-Based Systems
This article focuses on our exploration of awareness issues through the design and long-term deployment of two systems: the Hermes office door display system (which enabled staff in a university department to post awareness messages to their door displays) and SPAM (a messaging system for supporting coordination HUMAN–COMPUTER INTERACTION, 2007, Volume 22, pp. 173–220 Copyright © 2007, Lawrence...
متن کاملCovert Messaging through TCP Timestamps
We present a protocol for sending data over a common class of low-bandwidth covert channels. Covert channels exist in most communications systems and allow individuals to communicate truly undetectably. However, covert channels are seldom used due to their complexity. Our protocol is both practical and secure against attack by powerful adversaries. We implement our protocol on a standard platfo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Terrorism and Counter-Terrorism Studies
سال: 2017
ISSN: 2468-0486
DOI: 10.19165/2017.2.02