Journal articles on the topic 'Hacking network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hacking network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Prasanth, A., P. Sankar Ganesh, and S. P. Raja Gopalan. "Data Prevention from Network Hacking." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 807–11. http://dx.doi.org/10.31142/ijtsrd11035.
Full textUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar, and Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms." Pakistan Journal of Engineering and Technology 5, no. 4 (December 29, 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Full textMohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (March 10, 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.
Full textHancock, Bill. "Using network hacking techniques to disrupt military operational networks." Network Security 1998, no. 8 (August 1998): 13–17. http://dx.doi.org/10.1016/s1353-4858(98)80075-5.
Full textOsagie, M. S. U., and Amenze Joy Osagie. "A Bit of Hacking Techniques for Vulnerable Subdomain." Journal of Advances in Computing, Communications and Information Technology 1 (April 25, 2021): 1–7. http://dx.doi.org/10.37121/jaccit.v1.133.
Full textSchneier, B. "Hacking the business climate for network security." Computer 37, no. 4 (April 2004): 87–89. http://dx.doi.org/10.1109/mc.2004.1297316.
Full textGarcía-Cobo, Iván. "Quantum Network Intelligent Management System." Optics 3, no. 4 (November 15, 2022): 430–37. http://dx.doi.org/10.3390/opt3040036.
Full textBotha, Martin, and Rossouw von Solms. "The utilization of trend analysis in the effective monitoring of information security. Part 2: the model." Information Management & Computer Security 10, no. 1 (March 1, 2002): 5–11. http://dx.doi.org/10.1108/09685220210417454.
Full textHyunhee Park, Hyunhee Park. "Edge Based Lightweight Authentication Architecture Using Deep Learning for Vehicular Networks." 網際網路技術學刊 23, no. 1 (January 2022): 195–202. http://dx.doi.org/10.53106/160792642022012301020.
Full textEllis, Tom, Xiao Wang, and James J. Collins. "Gene Regulation: Hacking the Network on a Sugar High." Molecular Cell 30, no. 1 (April 2008): 1–2. http://dx.doi.org/10.1016/j.molcel.2008.03.005.
Full textCuartielles Ruiz, David, and César García Sáez. "From Hacking to Making." Digital Culture & Society 6, no. 1 (December 1, 2020): 85–106. http://dx.doi.org/10.14361/dcs-2020-0105.
Full textЧеркасов, Александр Николаевич, and Алена Валерьевна Сивенко. "Development of a model for ensuring the security of a social network account based on a neural network algorithm." Вестник Адыгейского государственного университета, серия «Естественно-математические и технические науки», no. 2(281) (September 28, 2021): 47–55. http://dx.doi.org/10.53598/2410-3225-2021-2-281-47-55.
Full textTikhonova, Sophia V. "Maurizio Ferraris' Theory of Documentality and Social Media: Media Hacking as Hacking of Cultural Memory." Galactica Media: Journal of Media Studies 4, no. 2 (June 27, 2022): 84–101. http://dx.doi.org/10.46539/gmd.v4i2.262.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (July 20, 2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textAghila, R., K. Nagalakshmi, B. S. Roopan, S. Rajakrishnan, and T. Anandaraj. "A Formal Analysis and Some Properties of Kerberos in Network Security." Asian Journal of Computer Science and Technology 1, no. 1 (May 5, 2012): 6–10. http://dx.doi.org/10.51983/ajcst-2012.1.1.1697.
Full textPisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands." Nauka, bezbednost, policija 28, no. 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.
Full textChaudhary, Sachin, and Kanchan Chaudhary. "Distributed Honeypots System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 5–11. http://dx.doi.org/10.51976/ijari.121302.
Full textKwon, Se-Hwan, and Dea-Woo Park. "Hacking and Security of Encrypted Access Points in Wireless Network." Journal of information and communication convergence engineering 10, no. 2 (June 30, 2012): 156–61. http://dx.doi.org/10.6109/jicce.2012.10.2.156.
Full textWANG, Xue-rui, and Yong-qiang HE. "Security Management and Prevention on the Campus Network against Hacking." Journal of Information Security Research 10, no. 3 (September 1, 2019): 87. http://dx.doi.org/10.6025/jisr/2019/10/3/87-91.
Full textBang, Sang-Won, Byeong-Soo Jung, and Sang-Cheol Lee. "Research on financial institutional network partition design for anti-hacking." Journal of Computer Virology and Hacking Techniques 13, no. 4 (April 29, 2017): 257–63. http://dx.doi.org/10.1007/s11416-017-0297-3.
Full textChun, Yangha. "Analysis of Cyber Threats in the Connection Section of the Control System and Countermeasures Required." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 10, 2021): 412–17. http://dx.doi.org/10.17762/turcomat.v12i6.1831.
Full textAhmad, Bilal, Wang Jian, and Zain Anwar Ali. "Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions." Journal of Computer Networks and Communications 2018 (July 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.
Full textS.Sowmiyasree and Dr.T.Ranganayaki. "Data Analytics Era: Survey of Analysis of Banking System by using Blockchain." International Journal for Modern Trends in Science and Technology 9, no. 01 (January 25, 2023): 62–68. http://dx.doi.org/10.46501/ijmtst0901011.
Full textMungekar, Abhishek, Yashraj Solanki, and R. Swarnalatha. "Augmentation of a SCADA based firewall against foreign hacking devices." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1359. http://dx.doi.org/10.11591/ijece.v10i2.pp1359-1366.
Full textPisarić, Milana. "THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE." Journal of Criminology and Criminal Law 61, no. 1 (June 2023): 51–66. http://dx.doi.org/10.47152/rkkp.61.1.3.
Full textKim, Seong-Kyu. "Automotive Vulnerability Analysis for Deep Learning Blockchain Consensus Algorithm." Electronics 11, no. 1 (December 30, 2021): 119. http://dx.doi.org/10.3390/electronics11010119.
Full textBezmaternykh, P. V., D. A. Ilin, and D. P. Nikolaev. "U-Net-bin: hacking the document image binarization contest." Computer Optics 43, no. 5 (October 2019): 825–32. http://dx.doi.org/10.18287/2412-6179-2019-43-5-825-832.
Full textRani, S. Vijaya, and G. N. K. Suresh Babu. "Optimizing Error Rate in Intrusion Detection System Using Artificial Neural Network Algorithm." International Journal of Emerging Research in Management and Technology 6, no. 9 (June 24, 2018): 152. http://dx.doi.org/10.23956/ijermt.v6i9.102.
Full textKOMBATE, Yendoubé, Pélagie HOUNGUE, and Samuel OUYA. "A bibliometric method for analyzing IoT hacking solutions in network services." Procedia Computer Science 203 (2022): 141–48. http://dx.doi.org/10.1016/j.procs.2022.07.020.
Full textShea, J. J. "Hacking Exposed-Network Security Secrets & Solutions, 4th Ed. [Book Review]." IEEE Electrical Insulation Magazine 19, no. 5 (September 2003): 73–74. http://dx.doi.org/10.1109/mei.2003.1238725.
Full textArévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (January 31, 2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.
Full textBartolacci, Michael R., and Stanko Dimitrov. "Promoting Resiliency in Emergency Communication Networks." International Journal of Information Systems for Crisis Response and Management 9, no. 1 (January 2017): 1–10. http://dx.doi.org/10.4018/ijiscram.2017010101.
Full textSati, Vrinda, and Raja Muthalagu. "Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution." Cybernetics and Information Technologies 23, no. 2 (June 1, 2023): 124–36. http://dx.doi.org/10.2478/cait-2023-0017.
Full textLin, Hsiao-Chung, Ping Wang, Kuo-Ming Chao, Wen-Hui Lin, and Jia-Hong Chen. "Using Deep Learning Networks to Identify Cyber Attacks on Intrusion Detection for In-Vehicle Networks." Electronics 11, no. 14 (July 12, 2022): 2180. http://dx.doi.org/10.3390/electronics11142180.
Full textZhia Sheng, Dalian Wu, Isredza Rahmi A. Hamid, and Hannani Aman. "Multilevel Authentication for Social Network." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 220. http://dx.doi.org/10.30630/joiv.2.3-2.146.
Full textKurniawan, Ade, Yuichi Ohsita, and Masayuki Murata. "Experiments on Adversarial Examples for Deep Learning Model Using Multimodal Sensors." Sensors 22, no. 22 (November 9, 2022): 8642. http://dx.doi.org/10.3390/s22228642.
Full textLuo, Anlun. "Intrusion Detection System for Internet of Vehicles Based on Ensemble Learning and CNN." Journal of Physics: Conference Series 2414, no. 1 (December 1, 2022): 012014. http://dx.doi.org/10.1088/1742-6596/2414/1/012014.
Full textJi, Hong. "Research on the Protection Strategy of Network Security." Advanced Materials Research 703 (June 2013): 236–39. http://dx.doi.org/10.4028/www.scientific.net/amr.703.236.
Full textHadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.
Full textAndi, Hari Krishnan. "Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security." Journal of Trends in Computer Science and Smart Technology 3, no. 4 (May 19, 2022): 305–13. http://dx.doi.org/10.36548/jtcsst.2021.4.006.
Full textГромов, Юрий Юрьевич, Павел Игоревич Карасев, and Виктор Владимирович Кулешов. "ANALYSIS OF MODERN ACCESS POINTS FOR ENTERPRISE WIRELESS CHANNELS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 4(-) (December 15, 2021): 587–92. http://dx.doi.org/10.36622/vstu.2021.24.4.011.
Full textIbrahim, Mohanad R., and Karam Thanoon. "Quasar Remote Access Trojan feature extraction depending on Ethical Hacking." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 1 (January 27, 2022): 58–75. http://dx.doi.org/10.47577/technium.v4i1.5831.
Full textShmaryahu, Dorin, Guy Shani, Joerg Hoffmann, and Marcel Steinmetz. "Simulated Penetration Testing as Contingent Planning." Proceedings of the International Conference on Automated Planning and Scheduling 28 (June 15, 2018): 241–49. http://dx.doi.org/10.1609/icaps.v28i1.13902.
Full textTiwari, Shamik. "An Ensemble Deep Neural Network Model for Onion-Routed Traffic Detection to Boost Cloud Security." International Journal of Grid and High Performance Computing 13, no. 1 (January 2021): 1–17. http://dx.doi.org/10.4018/ijghpc.2021010101.
Full textSmys, S. "Recent Security Features of 5G Protocol for Real Time Network Domain – An Overview." Journal of ISMAC 3, no. 4 (April 12, 2022): 314–25. http://dx.doi.org/10.36548/jismac.2021.4.003.
Full textSmys, S. "Recent Security Features of 5G Protocol for Real Time Network Domain – An Overview." Journal of ISMAC 3, no. 4 (April 12, 2022): 314–25. http://dx.doi.org/10.36548/10.36548/jismac.2021.4.003.
Full textDruzin, Bryan. "Can the Liberal Order be Sustained? Nations, Network Effects, and the Erosion of Global Institutions." Michigan Journal of International Law, no. 42.1 (2021): 1. http://dx.doi.org/10.36642/mjil.42.1.can.
Full textAbdullah, Mokhaled N., Ihab A. Satam, Raid W. Daoud, Suhail N. Shihab, and Haider A. Kamel. "Design and implement a self-managed computer network for electronic exams and sharing." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (July 1, 2020): 466. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp466-475.
Full textXu, Song, and Ping He. "Protection System of Cooperative Network Based on Artificial Immune Theory." Advanced Materials Research 108-111 (May 2010): 1360–65. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.1360.
Full textYoun, Jaepil, Kookjin Kim, Daeyoung Kang, Jaeil Lee, Moosung Park, and Dongkyoo Shin. "Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups." Electronics 11, no. 24 (December 12, 2022): 4142. http://dx.doi.org/10.3390/electronics11244142.
Full text