Works matching Computer hacking


Results: 1122
    1
    2
    3
    4
    5
    6
    7
    8
    9
    11
    12
    13
    14
    15
    16

    MR ROBOT: Hacking the Apocalypse.

    Published in:
    Journal for Religion, Film & Media, 2019, v. 5, n. 2, p. 15, doi. 10.25364/05.052019.2.2
    By:
    • Lynch, John
    Publication type:
    Article
    17
    18

    A Legislator's Dilemma.

    Published in:
    IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
    By:
    • Ruth, Stephen;
    • Stone, Samuel
    Publication type:
    Article
    19
    20

    Government Hacking.

    Published in:
    Yale Law Journal, 2018, v. 127, n. 3, p. 570
    By:
    • MAYER, JONATHAN
    Publication type:
    Article
    21
    22

    Cracking 128-bit Keys.

    Published in:
    ISSA Journal, 2018, v. 16, n. 3, p. 9
    By:
    • Martin, Luther
    Publication type:
    Article
    23
    24
    25

    Cyberwar Spotlight: Iran.

    Published in:
    Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 1, p. 8
    By:
    • Gewirtz, David
    Publication type:
    Article
    26

    Freedom to Hack.

    Published in:
    Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
    By:
    • KILOVATY, IDO
    Publication type:
    Article
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37

    IS TRICKING A ROBOT HACKING?

    Published in:
    Berkeley Technology Law Journal, 2019, v. 34, n. 3, p. 891, doi. 10.15779/Z38M32N99Q
    By:
    • Evtimov, Ivan;
    • O'Hair, David;
    • Fernandes, Earlence;
    • Calo, Ryan;
    • Kohno, Tadayoshi
    Publication type:
    Article
    38
    39
    40

    About the Authors.

    Published in:
    Deviant Behavior, 2007, v. 28, n. 2, p. 199, doi. 10.1080/01639620701221568
    Publication type:
    Article
    41
    42

    Cloud Intrusion Detection System Based on SVM.

    Published in:
    International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 11, p. 101, doi. 10.3991/ijim.v17i11.39063
    By:
    • Alheeti, Khattab M. Ali;
    • Lateef, Ali Azawii Abdu;
    • Alzahrani, Abdulkareem;
    • Imran, Azhar;
    • Al_Dosary, Duaa
    Publication type:
    Article
    43
    44

    THE CYBER CIVIL WAR.

    Published in:
    Hofstra Law Review, 2015, v. 44, n. 1, p. 41
    By:
    • Haber, Eldar
    Publication type:
    Article
    45
    46
    47

    Breaching and Entering.

    Published in:
    Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
    By:
    • Din, Myra F.
    Publication type:
    Article
    48
    49
    50