Works matching DE "COMPUTER hacking"
Results: 872
Hacking Hacked! The Life Cycles of Digital Innovation.
- Published in:
- Science, Technology & Human Values, 2015, v. 40, n. 5, p. 793, doi. 10.1177/0162243915595091
- By:
- Publication type:
- Article
Public Engagement Through the Development of Science-Based Computer Games: The Wellcome Trust’s “Gamify Your PhD” Initiative.
- Published in:
- Science Communication, 2014, v. 36, n. 3, p. 379, doi. 10.1177/1075547013492436
- By:
- Publication type:
- Article
Circumvention of Nascent and Potential Wi-Fi Phishing Threat Using Association Rule Mining.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2331, doi. 10.1007/s11277-016-3451-1
- By:
- Publication type:
- Article
Performance Comparison and Detection Analysis in Snort and Suricata Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 2, p. 241, doi. 10.1007/s11277-016-3209-9
- By:
- Publication type:
- Article
Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 2, p. 319, doi. 10.1007/s11277-013-1240-7
- By:
- Publication type:
- Article
Cybercrime fighters target human error.
- Published in:
- Nature, 2015, v. 518, n. 7539, p. 282, doi. 10.1038/518282a
- By:
- Publication type:
- Article
Cities: Metropolitan mash-up.
- Published in:
- Nature, 2012, v. 486, n. 7404, p. 470, doi. 10.1038/486470a
- By:
- Publication type:
- Article
القرصنة الإلكترونية على مواقع الإنترنت دراسة تطبيقية على عينة من مواقع مرافق المعلومات المصرية.
- Published in:
- Egyptian Journal of Information Sciences, 2023, v. 10, n. 2, p. 32
- By:
- Publication type:
- Article
SOFT BIOMETRIC AUTHENTICATION.
- Published in:
- Knowledge: International Journal, 2023, v. 58, n. 3, p. 481
- By:
- Publication type:
- Article
Cannibal Cop Out: WHY LENITY IS A NECESSARY, YET UNWORKABLE SOLUTION IN INTERPRETING THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Brooklyn Law Review, 2017, v. 82, n. 4, p. 1849
- By:
- Publication type:
- Article
Reevaluating Attorney-Client Privilege in the Age of Hackers.
- Published in:
- Brooklyn Law Review, 2017, v. 82, n. 4, p. 1817
- By:
- Publication type:
- Article
MR ROBOT: Hacking the Apocalypse.
- Published in:
- Journal for Religion, Film & Media, 2019, v. 5, n. 2, p. 15, doi. 10.25364/05.052019.2.2
- By:
- Publication type:
- Article
Periodical Topics.
- Published in:
- Journal: American Water Works Association, 2021, v. 113, n. 3, p. 1, doi. 10.1002/awwa.1684
- By:
- Publication type:
- Article
Improving Security for SCADA and Administrative Networks With Limited Financial Resources.
- Published in:
- Journal: American Water Works Association, 2019, v. 111, n. 6, p. 52, doi. 10.1002/awwa.1307
- By:
- Publication type:
- Article
Advances in device-independent quantum key distribution.
- Published in:
- NPJ Quantum Information, 2023, v. 9, n. 1, p. 1, doi. 10.1038/s41534-023-00684-x
- By:
- Publication type:
- Article
Defense against Artificial Intelligence Hacking.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4177
- By:
- Publication type:
- Article
Hacking the Human Vasculature.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 3053
- By:
- Publication type:
- Article
Secure Messaging using Blockchain Technology.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1372
- By:
- Publication type:
- Article
Research on Ethical Hacking.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 154
- By:
- Publication type:
- Article
The Danger of Runaway AI.
- Published in:
- Journal of Democracy, 2023, v. 34, n. 4, p. 132, doi. 10.1353/jod.2023.a907694
- By:
- Publication type:
- Article
The Bipolar II construct from the perspective of hacking's historical ontology framework.
- Published in:
- European Psychiatry, 2016, v. 33, p. S634, doi. 10.1016/j.eurpsy.2016.01.1878
- By:
- Publication type:
- Article
Visceral Hacking or Packet Wanking? The Ethics of Digital Code.
- Published in:
- Culture, Theory & Critique, 2006, v. 47, n. 2, p. 213, doi. 10.1080/14735780600961809
- By:
- Publication type:
- Article
Futuring as Part to Design Education: Hacking for a Sustainable Campus Environment.
- Published in:
- Journal of Futures Studies, 2024, v. 28, n. 4, p. 17, doi. 10.6531/JFS.202406_28(4).0003
- By:
- Publication type:
- Article
Developing A Security Model for Enterprise Networks (SMEN).
- Published in:
- Journal of Engineering Research & Technology, 2017, v. 4, n. 1, p. 16
- By:
- Publication type:
- Article
The Behavioral Intelligence Paradigm Shift in Fighting Cyber-Crime: Counter-Measures, Innovation, and Regulation Issues.
- Published in:
- International Journal on Criminology, 2014, v. 2, n. 1, p. 11
- By:
- Publication type:
- Article
When the blockchain does not block: on hackings and uncertainty in the cryptocurrency market.
- Published in:
- Quantitative Finance, 2021, v. 21, n. 8, p. 1267, doi. 10.1080/14697688.2020.1849779
- By:
- Publication type:
- Article
АНАЛІЗ ЗАСТОСУВАННЯ ГІБРИДНИХ КРИПТО-КОДОВИХ КОНСТРУКЦІЙ ДЛЯ ПІДВИЩЕННЯ РІВНЯ СТІЙКОСТІ ГЕШ-КОДІВ ДО ЗЛАМУ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2022, v. 28, n. 2, p. 87, doi. 10.18372/2225-5036.28.16953
- By:
- Publication type:
- Article
Simulation of hacking and operation condition analysis for technical information security.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 26, doi. 10.18372/2225-5036.22.10450
- By:
- Publication type:
- Article
Challenges and solutions in the development of blockchain applications: Extraction from SLR and empirical study.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 8, p. 1, doi. 10.1002/smr.2651
- By:
- Publication type:
- Article
We build this city on rocks and (feminist) code: hacking corporate computational designs of cities to come.
- Published in:
- Digital Creativity, 2023, v. 34, n. 2, p. 162, doi. 10.1080/14626268.2023.2205406
- By:
- Publication type:
- Article
‘You can dance your prototype if you like’: independent filmmakers adapting the hackathon.
- Published in:
- Digital Creativity, 2017, v. 28, n. 3, p. 224, doi. 10.1080/14626268.2017.1351992
- By:
- Publication type:
- Article
The folly and the glory: America, Russia, and political warfare 1945–2020, by Tim Weiner: New York, Henry Holt and Company, 2020), 336 pp.
- Published in:
- 2021
- By:
- Publication type:
- Book Review
CRAFT(Y)NESS.
- Published in:
- British Journal of Criminology, 2015, v. 55, n. 1, p. 125, doi. 10.1093/bjc/azu061
- By:
- Publication type:
- Article
Humanitarian hacking: Merging refugee aid and digital capitalism.
- Published in:
- Journal of Refugee Studies, 2024, v. 37, n. 2, p. 267, doi. 10.1093/jrs/feae017
- By:
- Publication type:
- Article
Blockchain-based System Towards Data Security Against Smart Contract Vulnerabilities: Electronic Toll Collection Context.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 1524, doi. 10.14569/ijacsa.2024.01506152
- By:
- Publication type:
- Article
Penetration Testing Framework using the Q Learning Ensemble Deep CNN Discriminator Framework.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 845, doi. 10.14569/ijacsa.2024.0150385
- By:
- Publication type:
- Article
Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2021, v. 34, n. 3, p. 463, doi. 10.1080/08850607.2020.1783877
- By:
- Publication type:
- Article
Security Investment, Hacking, and Information Sharing between Firms and between Hackers.
- Published in:
- Games (20734336), 2017, v. 8, n. 2, p. 23, doi. 10.3390/g8020023
- By:
- Publication type:
- Article
Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis.
- Published in:
- Future Internet, 2022, v. 14, n. 8, p. 238, doi. 10.3390/fi14080238
- By:
- Publication type:
- Article
Creating Honeypots to Prevent Online Child Exploitation.
- Published in:
- Future Internet, 2022, v. 14, n. 4, p. 121, doi. 10.3390/fi14040121
- By:
- Publication type:
- Article
Password Collection through Social Engineering: An Analysis of a Simulated Attack.
- Published in:
- Journal of Information System Security, 2010, v. 6, n. 4, p. 53
- By:
- Publication type:
- Article
Autistic autobiography and hermeneutical injustice.
- Published in:
- Metaphilosophy, 2021, v. 52, n. 5, p. 556, doi. 10.1111/meta.12514
- Publication type:
- Article
Assessing Privacy and Security of Information Systems from Audit Data.
- Published in:
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1417, doi. 10.1007/s10796-021-10129-5
- By:
- Publication type:
- Article
IntroductionCybercrime: A Note on International Issues.
- Published in:
- Information Systems Frontiers, 2004, v. 6, n. 2, p. 111, doi. 10.1023/B:ISFI.0000025779.42497.30
- By:
- Publication type:
- Article
SEEKING WARRANTS FOR UNKNOWN LOCATIONS: THE MISMATCH BETWEEN DIGITAL PEGS AND TERRITORIAL HOLES.
- Published in:
- Emory Law Journal, 2018, v. 68, n. 1, p. 183
- By:
- Publication type:
- Article
CYBER ESPIONAGE AND ELECTRONIC SURVEILLANCE: BEYOND THE MEDIA COVERAGE.
- Published in:
- Emory Law Journal, 2017, v. 66, n. 3, p. 513
- By:
- Publication type:
- Article
THE HACKER'S AEGIS.
- Published in:
- Emory Law Journal, 2011, v. 60, n. 5, p. 1051
- By:
- Publication type:
- Article
First remarks on the environmental imprinting of released captive-born young Egyptian Vultures.
- Published in:
- Vulture News, 2023, v. 83, n. 1, p. 89, doi. 10.4314/vulnew.v83a1.9
- By:
- Publication type:
- Article
First remarks on the environmental imprinting of released captive-born young Egyptian Vultures.
- Published in:
- Vulture News, 2022, v. 83, p. 89
- By:
- Publication type:
- Article
PROTECT YOUR PRACTICE FROM HACKERS.
- Published in:
- CDS Review, 2022, p. 8
- By:
- Publication type:
- Article