Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
28,192 result(s) for "Hijacking"
Sort by:
Captured at sea : piracy and protection in the Indian Ocean
\"How is it possible for six men to take a Liberian-flagged oil tanker hostage and negotiate a huge pay out for the return of its crew and 2.2 million barrels of crude oil? In his gripping new book, Jatin Dua answers this question by exploring the unprecedented upsurge in maritime piracy off the coast of Somalia in the twenty-first century. Taking the reader inside pirate communities in Somalia, onboard multinational container ships, and within insurance offices in London, Dua connects modern day pirates to longer histories of trade and disputes over protection. In our increasingly technological world, maritime piracy represents not only an interruption, but an attempt to insert oneself within the world of oceanic trade. Captured at Sea moves beyond the binaries of legal and illegal to illustrate how the seas continue to be key sites of global regulation, connectivity, and commerce today\"--Provided by publisher.
Hostage : a novel
\"Shortly after a crowded New York-bound Boeing 747 takes off from Stockholm, a bomb threat is found in one of the aircraft's lavatories. The demands are directed at both the Swedish and US governments. Police superintendent Alex Recht teams up with the energetic and often abrasive Eden Lundell from the security service's counter-terrorism unit to deal with the hijacking. Fredrika Bergman, who is currently working at the Justice Department, returns to the police force to act as a liaison between the government and the police\"--Page 4 of cover.
The International Response to Somali Piracy
The recent surge in piracy attacks off the coast of Somalia has triggered an international response which is unprecedented in terms of the number of actors involved.The International Response to Somali Piracy presents a comprehensive treatment of the international response to Somali piracy, exploring current initiatives to counter the piracy.
Computational analysis of delivery targets and trafficking at the blood‐brain barrier: toward the design of brain‐penetrant therapeutics for Alzheimer's disease
Background One approach to brain delivery relies on receptor‐mediated transcytosis (RMT). Multi‐organ atlases allow searching for RMT targets by comparing brain capillary endothelial cells (BCEC) with biodistribution‐relevant peripheral cells. I sought to create a proteomics atlas of these cells. I also analyzed protein turnover, deeming it crucial for all targets and especially those that do not transport large ligands natively and whose use in RMT may thus rely on hijacking their recycling. I then hypothesized that for targets with slow internalization, one could induce endocytosis by binding extracellular regions where conformational changes would expose possibly inactive endocytic motifs in the cytosolic tails, and sought to identify targets suitable for such triggered endocytosis and to design constructs enabling it. Finally, I reasoned that after intracellular dissociation, binding endosomal proteins may be the only way to enable faster‐than‐diffusional cargo movement, ideally abluminal, and sought to identify proteins that could intercept cargo in the endosome. Method To create atlases, I processed the spectra of cell type‐resolved proteomics datasets and supplemented this with a transcriptomics‐based analysis. To analyze isoforms, I used peptide‐level proteomics, long‐read transcriptomics, and short‐read transcriptomics data with sufficient depth. To analyze turnover and trafficking, but also identify intracellular targets that could intercept cargo in the endosome, I used in vivo proteomics data and in vitro protein‐protein interactions and organelle fractionation datasets. To design endocytosis‐triggering constructs, I mined targets for conserved cytosolic endocytic motifs, then built allostery maps to locate suitable extracellular regions, and finally modeled binders targeting those regions. Result Despite shallower coverage and integration challenges, the proteomics atlas allows target identification, with some deviations from transcriptomics results. Turnover data can inform target choice. Isoforms of several hits increase their specificity to BCEC or, conversely, may complicate their use. Several targets are parts of heterodimers; targeting their interface could improve specificity. The constructs designed to trigger endocytosis show high confidence scores yet require validation. Analysis of protein‐protein interactions and subcellular fractionation helps predict endosomal targets that could intercept constructs and, unlike surface proteins, would ideally be bound at acidic pH. Conclusion These results may inform target selection and help refine constructs for better trans‐BBB delivery.
Realization of GPS Dynamic Hijacking Based on Software Radio
GPS positioning technology has a wide range of use scenarios, but due to the known characteristics of GPS signal open reception and modulation methods, many solutions can easily deceive GPS signals. Once this technology is abused in violation of regulations, it may cause major safety and property losses. In order to better study the anti-hijacking technology of PGS signals, this article starts with the generative dynamic hijacking of PGS, gives the implementation method based on software radio, and further learns the code phase and dopper between asynchronous hijacking and synchronous hijacking through software radio. The compensation calculation method of Leer frequency shift parameters, and verified the effect of the software radio’s GPS dynamic hijacking implementation method through examples, and provide theoretical support for the design and improvement of future anti-hijacking systems.
The Penguin's crime wave
The Penguin hijacks a luxury yacht with his penguin-shaped submarine and it is up to Batman to stop him and rescue the passengers and crew.
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different domains such as agricultural, medical, industrial, military, police (law enforcement), and logistics. Robots are devoted to serve, facilitate, and enhance the human life. However, many incidents have been occurring, leading to serious injuries and devastating impacts such as the unnecessary loss of human lives. Unintended accidents will always take place, but the ones caused by malicious attacks represent a very challenging issue. This includes maliciously hijacking and controlling robots and causing serious economic and financial losses. This paper reviews the main security vulnerabilities, threats, risks, and their impacts, and the main security attacks within the robotics domain. In this context, different approaches and recommendations are presented in order to enhance and improve the security level of robotic systems such as multi-factor device/user authentication schemes, in addition to multi-factor cryptographic algorithms. We also review the recently presented security solutions for robotic systems.