Works matching DE "PREVENTION of computer hacking"
Results: 84
Hackers of critical infrastructure: expectations and limits of the principle of target distinction.
- Published in:
- International Review of Law, Computers & Technology, 2023, v. 37, n. 3, p. 274, doi. 10.1080/13600869.2022.2164462
- By:
- Publication type:
- Article
Cybersecurity--Hacking.
- Published in:
- World Libraries, 2020, v. 24, n. 1, p. 1
- By:
- Publication type:
- Article
Who are you? Secure identities in single hop ad hoc networks.
- Published in:
- Distributed Computing, 2017, v. 30, n. 2, p. 103, doi. 10.1007/s00446-016-0280-0
- By:
- Publication type:
- Article
Secure and energy aware load balancing framework for cloud data centre networks.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2019, v. 55, n. 9, p. 540, doi. 10.1049/el.2019.0022
- By:
- Publication type:
- Article
Efficient Security Services of Honeypot using Kerberos for Detecting Intruders.
- Published in:
- International Journal of System & Software Engineering, 2015, v. 3, n. 2, p. 10, doi. 10.21863/ijsse/2015.3.2.006
- By:
- Publication type:
- Article
Sentencing ‘Anonymous’: exacerbating the civil divide between online citizens and government.
- Published in:
- Police Practice & Research, 2016, v. 17, n. 6, p. 507, doi. 10.1080/15614263.2016.1205983
- By:
- Publication type:
- Article
Novel intrusion prediction mechanism based on honeypot log similarity.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- By:
- Publication type:
- Article
Optimal configuration of intrusion detection systems.
- Published in:
- Information Technology & Management, 2021, v. 22, n. 4, p. 231, doi. 10.1007/s10799-020-00319-z
- By:
- Publication type:
- Article
Cyberfraud and Computer Crime.
- Published in:
- Strategic Finance, 1999, v. 81, n. 5, p. 38
- By:
- Publication type:
- Article
CROSS-LINGUAL CYBERSECURITY ANALYTICS IN THE INTERNATIONAL DARK WEB WITH ADVERSARIAL DEEP REPRESENTATION LEARNING.
- Published in:
- MIS Quarterly, 2022, v. 46, n. 2, p. 1209, doi. 10.25300/MISQ/2022/16618
- By:
- Publication type:
- Article
Threats to Information Systems: Today's Reality, Yesterday's Understanding.
- Published in:
- MIS Quarterly, 1992, v. 16, n. 2, p. 173, doi. 10.2307/249574
- By:
- Publication type:
- Article
Multi-operator wireless mesh networks secured by an all-encompassing security architecture.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 2, p. 169, doi. 10.1007/s10207-014-0244-y
- By:
- Publication type:
- Article
An adaptive threat model for security ceremonies.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 2, p. 103, doi. 10.1007/s10207-014-0253-x
- By:
- Publication type:
- Article
NSA Director Warns China Has Power to Kill U.S. Power Grid.
- Published in:
- China Business Review, 2014, p. 1
- By:
- Publication type:
- Article
WiFi: Boon or Boondoggle?
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2008, v. 19, n. 5, p. 3, doi. 10.1002/jcaf.20411
- By:
- Publication type:
- Article
EXPLORING DEVIANT HACKER NETWORKS (DHN) ON SOCIAL MEDIA PLATFORMS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 2, p. 7
- By:
- Publication type:
- Article
Data Encryption Method Using Environmental Secret Key with Server Assistance.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 423, doi. 10.1080/10798587.2015.1121615
- By:
- Publication type:
- Article
PROSECUTING THE CIA: DOES THE COMPUTER FRAUD AND ABUSE ACT ALLOW FOR LIABILITY?
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- By:
- Publication type:
- Article
TECHNOLOGY AND INDIVIDUAL PRIVACY RIGHTS: THE FOURTH AMENDMENT IMPLICATIONS OF EXPLOITING ZERO-DAY VULNERABILITIES FOR DOMESTIC INVESTIGATIONS.
- Published in:
- Columbia Human Rights Law Review, 2015, v. 47, n. 1, p. 242
- By:
- Publication type:
- Article
Are blockchains immune to all malicious attacks?
- Published in:
- Financial Innovation, 2016, v. 2, n. 1, p. 1, doi. 10.1186/s40854-016-0046-5
- By:
- Publication type:
- Article
Randomness determines practical security of BB84 quantum key distribution.
- Published in:
- Scientific Reports, 2015, p. 16200, doi. 10.1038/srep16200
- By:
- Publication type:
- Article
A Usable and Secure Two-Factor Authentication Scheme.
- Published in:
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 4, p. 169, doi. 10.1080/19393555.2011.629340
- By:
- Publication type:
- Article
iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 4, p. 213, doi. 10.1080/19393551003762223
- By:
- Publication type:
- Article
General Misconceptions about Information Security Lead to an Insecure World.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 164, doi. 10.1080/19393550802369792
- By:
- Publication type:
- Article
BIG IN JAPAN.
- Published in:
- Asia Weekly, 2008, v. 2, n. 37, p. 14
- Publication type:
- Article
Attorneys Must Protect Clients' Sensitive Data.
- Published in:
- Florida Bar Journal, 2016, v. 90, n. 7, p. 8
- By:
- Publication type:
- Article
CybeR secuRiTy - Small, Medium, Large, and EXTRA Large.
- Published in:
- Contract Management, 2015, v. 55, n. 8, p. 58
- By:
- Publication type:
- Article
'E-SPY': DETECTION AND PREDICTION OF WEBSITE ATTACKS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 315, doi. 10.26483/ijarcs.v9i1.5243
- By:
- Publication type:
- Article
A Proposed Method to Enhance the Strength of Honeypot Through the use of IP-Spoofing Detection Method.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 756
- By:
- Publication type:
- Article
Securing RFID from External Attacks Using Enhanced Security Mechanism.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1207
- By:
- Publication type:
- Article
PROTECTING THE STATES FROM ELECTORAL INVASIONS.
- Published in:
- William & Mary Bill of Rights Journal, 2019, v. 28, n. 1, p. 197
- By:
- Publication type:
- Article
Rebooting the Small Law Practice: A Call for Increased Cybersecurity in the Age of Hacks and Digital Attacks.
- Published in:
- American Journal of Trial Advocacy, 2015, v. 38, n. 3, p. 519
- By:
- Publication type:
- Article
WHY KEEPING PACE WITH ZERO DAY VULNERABILITIES IS VITAL TO GOVERNMENT SECURITY.
- Published in:
- Asia-Pacific Defence Reporter, 2015, v. 41, n. 9, p. 28
- By:
- Publication type:
- Article
A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors.
- Published in:
- Victims & Offenders, 2016, v. 11, n. 4, p. 534, doi. 10.1080/15564886.2015.1121944
- By:
- Publication type:
- Article
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective.
- Published in:
- Journal of the Association for Information Systems, 2010, v. 11, n. 7, p. 394
- By:
- Publication type:
- Article
From the President.
- Published in:
- Access (10300155), 2016, v. 30, n. 4, p. 3
- By:
- Publication type:
- Article
Spear Phishing and Ransomware: Internal audit's role regarding the growing threats.
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2017, v. 36, n. 1, p. 23
- By:
- Publication type:
- Article
Ethics and Technology.
- Published in:
- Alabama Lawyer, 2014, v. 75, n. 1, p. 31
- By:
- Publication type:
- Article
Routine Activities in a Virtual Space: A Taiwanese Case of an ATM Hacking Spree.
- Published in:
- International Journal of Cyber Criminology, 2018, p. 333, doi. 10.5281/zenodo.1467935
- By:
- Publication type:
- Article
Corporate Cybersecurity: The International Threat to Private Networks and How Regulations Can Mitigate It.
- Published in:
- Vanderbilt Journal of Entertainment & Technology Law, 2018, v. 21, n. 1, p. 309
- By:
- Publication type:
- Article
CRYPTO WARS 2.0: WHY LISTENING TO APPLE ON ENCRYPTION WILL MAKE AMERICA MORE SECURE.
- Published in:
- Temple International & Comparative Law Journal, 2016, v. 30, n. 2, p. 353
- By:
- Publication type:
- Article
SECURING THE INTERNET.
- Published in:
- ITNOW, 2018, v. 60, n. 2, p. 36, doi. 10.1093/itnow/bwy047
- By:
- Publication type:
- Article
VULNERABILITY INTELLIGENCE.
- Published in:
- ITNOW, 2016, v. 58, n. 4, p. 26, doi. 10.1093/itnow/bww100
- By:
- Publication type:
- Article
How Secure is Secure?
- Published in:
- ITNOW, 2015, v. 57, n. 1, p. 34, doi. 10.1093/itnow/bwv014
- By:
- Publication type:
- Article
Staying One Step Ahead.
- Published in:
- ITNOW, 2013, v. 55, n. 4, p. 38, doi. 10.1093/itnow/bwt080
- By:
- Publication type:
- Article
THE GREY HAT HACKER: RECONCILING CYBERSPACE REALITY AND THE LAW.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 383
- By:
- Publication type:
- Article
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 13, p. 2222, doi. 10.1002/sec.1472
- By:
- Publication type:
- Article
Quantitative threat situation assessment based on alert verification.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 13, p. 2135, doi. 10.1002/sec.1473
- By:
- Publication type:
- Article
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 13, p. 1905, doi. 10.1002/sec.950
- By:
- Publication type:
- Article
Location-Related Privacy in Geo-Social Networks.
- Published in:
- IEEE Internet Computing, 2011, v. 15, n. 3, p. 20, doi. 10.1109/MIC.2011.29
- By:
- Publication type:
- Article