Literatura académica sobre el tema "Hacking network"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Hacking network".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Hacking network"
Prasanth, A., P. Sankar Ganesh y S. P. Raja Gopalan. "Data Prevention from Network Hacking". International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (30 de abril de 2018): 807–11. http://dx.doi.org/10.31142/ijtsrd11035.
Texto completoUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar y Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms". Pakistan Journal of Engineering and Technology 5, n.º 4 (29 de diciembre de 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Texto completoMohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor y Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING". International Journal of Law, Government and Communication 6, n.º 22 (10 de marzo de 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.
Texto completoHancock, Bill. "Using network hacking techniques to disrupt military operational networks". Network Security 1998, n.º 8 (agosto de 1998): 13–17. http://dx.doi.org/10.1016/s1353-4858(98)80075-5.
Texto completoOsagie, M. S. U. y Amenze Joy Osagie. "A Bit of Hacking Techniques for Vulnerable Subdomain". Journal of Advances in Computing, Communications and Information Technology 1 (25 de abril de 2021): 1–7. http://dx.doi.org/10.37121/jaccit.v1.133.
Texto completoSchneier, B. "Hacking the business climate for network security". Computer 37, n.º 4 (abril de 2004): 87–89. http://dx.doi.org/10.1109/mc.2004.1297316.
Texto completoGarcía-Cobo, Iván. "Quantum Network Intelligent Management System". Optics 3, n.º 4 (15 de noviembre de 2022): 430–37. http://dx.doi.org/10.3390/opt3040036.
Texto completoBotha, Martin y Rossouw von Solms. "The utilization of trend analysis in the effective monitoring of information security. Part 2: the model". Information Management & Computer Security 10, n.º 1 (1 de marzo de 2002): 5–11. http://dx.doi.org/10.1108/09685220210417454.
Texto completoHyunhee Park, Hyunhee Park. "Edge Based Lightweight Authentication Architecture Using Deep Learning for Vehicular Networks". 網際網路技術學刊 23, n.º 1 (enero de 2022): 195–202. http://dx.doi.org/10.53106/160792642022012301020.
Texto completoEllis, Tom, Xiao Wang y James J. Collins. "Gene Regulation: Hacking the Network on a Sugar High". Molecular Cell 30, n.º 1 (abril de 2008): 1–2. http://dx.doi.org/10.1016/j.molcel.2008.03.005.
Texto completoTesis sobre el tema "Hacking network"
Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.
Texto completoThesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
Akkaya, Deniz y Fabien Thalgott. "Honeypots in network security". Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Texto completoDay by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
Maloušek, Zdeněk. "Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217444.
Texto completoOlovson, Natali. "Hacking for the State? : The Use of Private Persons in Cyber Attacks and State Responsibility". Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10218.
Texto completoHaywood, Douglas. "The ethic of the code : values, networks and narrative among the civic hacking community". Thesis, Goldsmiths College (University of London), 2018. http://research.gold.ac.uk/23348/.
Texto completoMaggs, Catherine. "WikiLeaks and Communicative Counterpower". Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/13511.
Texto completoDostál, Otto. "Právní aspekty boje proti počítačové trestné činnosti". Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-433079.
Texto completoSilva, Luísa Carina Cabodeira Viana da. "Growth hacking e consumidores oportunistas: O impacto de rewards em programas de marketing referral". Master's thesis, 2020. http://hdl.handle.net/10362/94984.
Texto completoOs programas de marketing referral têm vindo a tornar-se numa ferramenta popular entre as empresas. Os seus benefícios são um tema polémico na literatura, uma vez que são programas propensos a atraírem utilizadores com um comportamento de compra oportunista. Como resultado disso, a entrega de recompensas despoleta uma corrida ao reward por parte de utilizadores com perfil oportunista. No presente estudo, propomos um modelo matemático baseado em agentes e suportado por 20.000 simulações, capaz de estudar o impacto desta população na disseminação do programa e na sua lucratividade. Mostrámos que os agentes interessados numa recolha oportunista do reward são responsáveis pelo sucesso do programa e pela sua disseminação. Este efeito ganha dimensão quando a disparidade monetária entre o custo do serviço e o valor do reward é maior. Por fim, concluímos que o aumento do número de convites, que os oportunistas realizam, despoleta uma intensificação dos resultados supra indicados.
Referral marketing programs have become a popular tool among businesses. Its benefits are a controversial topic in the literature, as they are programs likely to attract users with opportunistic buying behavior. As a result, reward distribution triggers a rush for rewards by users who have this opportunistic behavior. In the present study, we propose a mathematical model based on agents and supported by 20.000 simulations, capable of studying the impact of this population on the dissemination of the program and its profitability. We have shown that agents interested in an opportunistic reward collection are responsible for the success of the program and its dissemination. This effect gains dimension when the monetary disparity between the cost of the service and the reward value is greater. Finally, we conclude that the increase in the number of invitations that opportunists make triggers the intensification of the above results.
Soares, João Pedro dos Santos. "Implementation of a distributed intrusion detection and reaction system". Master's thesis, 2016. http://hdl.handle.net/10316/99196.
Texto completoSecurity was not always an important aspect in terms of networking and hosts. Nowadays, it is absolutely mandatory. Security measures must make an e ort to evolve at the same rate, or even at a higher rate, than threats, which is proving to be the most di cult of tasks. In this report we will detail the process of the implementation of a real distributed intrusion detection and reaction system, that will be responsible for securing a core set of networks already in production, comprising of thousands of servers, users and their respective con dential information.
"A Hacker-Centric Perspective to Empower Cyber Defense". Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.
Texto completoDissertation/Thesis
Doctoral Dissertation Computer Science 2020
Libros sobre el tema "Hacking network"
Pospisil, John. Hacking MySpace. New York: John Wiley & Sons, Ltd., 2006.
Buscar texto completoMcClure, Stuart. Hacking exposed: Network security secrets & solutions. 5a ed. Emeryville, Calif: McGraw-Hill/Osborne, 2005.
Buscar texto completoStuart, McClure y Kurtz George, eds. Hacking exposed: Network security secrets & solutions. 2a ed. Berkeley, Calif: Osborne/McGraw-Hill, 2001.
Buscar texto completoKent, Backman y Corley James E, eds. Hands-on ethical hacking and network defense. 2a ed. Boston, MA: Course Technology, Cengage Learning, 2011.
Buscar texto completoJoel, Scambray y Kurtz George, eds. Hacking exposed: Network security secrets and solutions. 3a ed. New York: Osborne/McGraw-Hill, 2001.
Buscar texto completoJoel, Scambray y Kurtz George, eds. Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill, 2009.
Buscar texto completoKent, Backman y Corley James E, eds. Hands-on ethical hacking and network defense. Boston, MA: Course Technology, 2013.
Buscar texto completoStuart, McClure, ed. Hacking exposed Windows 2000: Network security secrets & solutions. New York: Osborne/McGraw-Hill, 2001.
Buscar texto completoCannings, Rich. Hacking ExposedTM Web 2.0. New York: McGraw-Hill, 2008.
Buscar texto completoManu, Zacharia, ed. Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, MA: Thomson Course Technology PTR, 2008.
Buscar texto completoCapítulos de libros sobre el tema "Hacking network"
Söderberg, Johan. "Users in the Dark: The Development of a User-Controlled Technology in the Czech Wireless Network Community". En Hacking Europe, 219–39. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5493-8_10.
Texto completoSinha, Sanjib. "Know Your Network". En Beginning Ethical Hacking with Kali Linux, 61–69. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3891-2_4.
Texto completoSinha, Sanjib. "Building an Nmap Network Scanner". En Beginning Ethical Hacking with Python, 165–68. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_24.
Texto completoSinha, Sanjib. "Virtual Private Network or VPN". En Beginning Ethical Hacking with Python, 185–89. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2541-7_28.
Texto completoSinha, Sanjib. "Setting Up a Penetration Testing and Network Security Lab". En Beginning Ethical Hacking with Kali Linux, 19–40. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3891-2_2.
Texto completoPalit, Sudip Kumar y Mohuya Chakraborty. "A Mobile User Authentication Technique in Global Mobility Network". En Proceedings of International Ethical Hacking Conference 2019, 171–90. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0361-0_14.
Texto completoRoy, Indranil, Shekhar Sonthalia, Trideep Mandal, Animesh Kairi y Mohuya Chakraborty. "Study on Network Scanning Using Machine Learning-Based Methods". En Proceedings of International Ethical Hacking Conference 2019, 77–85. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0361-0_6.
Texto completoMohan, Aswathy, G. Aravind Swaminathan y Jeenath Shafana. "Systematic Approach for Network Security Using Ethical Hacking Technique". En Intelligent Communication Technologies and Virtual Mobile Networks, 47–59. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1844-5_4.
Texto completoStrauß, Christine. "Fallstudie I: «Hacking» in einem Local Area Network-Ein quantitativer Ansatz". En Informatik und Unternehmensführung, 147–90. Wiesbaden: Vieweg+Teubner Verlag, 1991. http://dx.doi.org/10.1007/978-3-322-94696-6_5.
Texto completoPage, Ruth. "Hoaxes, hacking and humour: analysing impersonated identity on social network sites". En The Language of Social Media, 46–64. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137029317_3.
Texto completoActas de conferencias sobre el tema "Hacking network"
Alufaisan, Yasmeen, Yan Zhou, Murat Kantarcioglu y Bhavani Thuraisingham. "Hacking social network data mining". En 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017. http://dx.doi.org/10.1109/isi.2017.8004874.
Texto completoMarchal, Samuel, Jerome Francois, Radu State y Thomas Engel. "PhishScore: Hacking phishers' minds". En 2014 10th International Conference on Network and Service Management (CNSM). IEEE, 2014. http://dx.doi.org/10.1109/cnsm.2014.7014140.
Texto completoChen, Tzer-shyong, Fuh-gwo Jeng y Yu-chia Liu. "Hacking Tricks Toward Security on Network Environments". En 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06). IEEE, 2006. http://dx.doi.org/10.1109/pdcat.2006.66.
Texto completoHan, Mee Lan, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen y Huy Kang Kim. "WHAP: Web-hacking profiling using Case-Based Reasoning". En 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860503.
Texto completoKang, Hyunjae, Byung Il Kwak, Young Hun Lee, Haneol Lee, Hwejae Lee y Huy Kang Kim. "Car Hacking and Defense Competition on In-Vehicle Network". En Third International Workshop on Automotive and Autonomous Vehicle Security. Reston, VA: Internet Society, 2021. http://dx.doi.org/10.14722/autosec.2021.23035.
Texto completoArunPrakash, M. y T. R. Gokul. "Network security-overcome password hacking through graphical password authentication". En 2011 National Conference on Innovations in Emerging Technology (NCOIET). IEEE, 2011. http://dx.doi.org/10.1109/ncoiet.2011.5738831.
Texto completoWang, Yien y Jianhua Yang. "Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool". En 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2017. http://dx.doi.org/10.1109/waina.2017.39.
Texto completoZuo, Y. y B. Panda. "Network viruses: their working principles and marriages with hacking programs". En IEEE Systems, Man and Cybernetics Society Information Assurance Workshop. IEEE, 2003. http://dx.doi.org/10.1109/smcsia.2003.1232444.
Texto completoAlsunbul, Saad, Phu Le, Jefferson Tan y Bala Srinivasan. "A network defense system for detecting and preventing potential hacking attempts". En 2016 International Conference on Information Networking (ICOIN). IEEE, 2016. http://dx.doi.org/10.1109/icoin.2016.7427157.
Texto completoMusthyala, Harish y P. Nagarjuna Reddy. "Hacking wireless network credentials by performing phishing attack using Python Scripting". En 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432155.
Texto completo