Siga este link para ver outros tipos de publicações sobre o tema: Hacking hack.

Artigos de revistas sobre o tema "Hacking hack"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Hacking hack".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Texto completo da fonte
Resumo:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together wi
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Pratt, Mike. "Raptor Hacking." Wildlife Rehabilitation Bulletin 29, no. 1 (2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.

Texto completo da fonte
Resumo:
In the raptor rehabilitation field, hacking is a special procedure for raising juvenile raptors that simulates natural fledging and allows young raptors—those that cannot yet fly and either are still restricted to or just leaving the nest—a gradual acclimation to independence. Hacking also is known as a ‘soft release.’ This paper focuses on hacking raptors and discusses advantages, disadvantages, hacking age, procedures, hack box design and construction, site selection, fledging age of raptor species, and hack release.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Adzhakhunov, E. A., and O. V. Nikolaev. "UAV control hack system." Journal of «Almaz – Antey» Air and Space Defence Corporation, no. 2 (June 23, 2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.

Texto completo da fonte
Resumo:
The paper presents an alternative solution to the problem of drone hacking over a radio channel and uses signal spoofing of a global positioning system (GPS, GLONASS). Within the framework of the study, block diagram and operation algorithm of the system were developed and experimental data were obtained.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Aiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips, and Ruby R. Farr. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking." Forensic Sciences 4, no. 1 (2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.

Texto completo da fonte
Resumo:
Adolescents are currently the most digitally connected generation in history. There is an ever-growing need to understand how typical adolescent risk-taking intersects with the vastly criminogenic potential of digital technology. Criminal hacking in older adolescents (16–19-year-olds) was assessed using an adapted Theory of Planned Behaviour (TPB) model, a cohesive theoretical framework that incorporates cognitive processes and human drivers (informed by psychology, cyberpsychology, and criminology theory). In 2021, a large-scale anonymous online survey was conducted across nine European count
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Pisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands." Nauka, bezbednost, policija 28, no. 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.

Texto completo da fonte
Resumo:
Hacking as manipulation of software, data, computer system or network without the knowledge and permission of the user constitutes an act of criminal offence. However, given that certain technological tendencies make it difficult/impossible to collect electronic evidence, the question arises as to whether the authorities responsible for detecting and proving criminal offenses should be authorized to hack, i.e. to conduct investigations in the digital environment in such a way that they would be authorized to exploit technical, systemic and human vulnerabilities within the IT system, without kn
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Fidler, David P. "The U.S. Election Hacks, Cybersecurity, and International Law." AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.

Texto completo da fonte
Resumo:
In October 2016, the United States accused Russia of hacking political organizations involved in the U.S. elections and leaking pilfered information to influence the outcome. In December, President Obama imposed sanctions for the hacking. This incident damaged President Obama's cybersecurity legacy. The “hack and leak” campaign targeted American self-government—a challenge to his administration's promotion of democracy in cyberspace. It created problems for the president's emphasis on international law and norms as “rules of the road” for cybersecurity. The episode exposed failures in his atte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ul Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, et al. "The Impacts of Ethical Hacking and its Security Mechanisms." Pakistan Journal of Engineering and Technology 5, no. 4 (2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.

Texto completo da fonte
Resumo:
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Hussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS." Journal of Correctional Issues 5, no. 1 (2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.

Texto completo da fonte
Resumo:
This paper considers two different classes of computer hackers, with a special emphasis on disparate motivations of hacking. Hackers’ psychology widely discussed in the media is almost entirely unexplored by psychologists. In this study, hackers’ and crackers’ motivation is investigated, using the study of values scale. One hundred and fourteen participants completed our online research instrument. The study of values and demographic data were questioned. Participants were categorized as hackers and crackers through their responses on two items questioned in the demographic datasheet. Results
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Bohnsack, René, and Meike Malena Liesner. "What the hack? A growth hacking taxonomy and practical applications for firms." Business Horizons 62, no. 6 (2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Jordan, Tim. "A genealogy of hacking." Convergence: The International Journal of Research into New Media Technologies 23, no. 5 (2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.

Texto completo da fonte
Resumo:
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This article proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame, a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Goel, Shubham, Kunal Gupta, Mayank Garg, and A. K. Madan. "Ethical Hacking and Its Countermeasures." International Journal of Advance Research and Innovation 2, no. 3 (2014): 41–49. http://dx.doi.org/10.51976/ijari.231408.

Texto completo da fonte
Resumo:
In today‘s world the explosive growth of the Internet has brought many good things such as E-commerce-banking, E-mail, Cloud Computing. Most organizations, governments are linked to the internet in some way or the other, but the question arises ‗how safe are they‘. There is also a Dark side to all the progress such as Hack-ing, creation of Backdoors, phishing etc.This paper elucidates in brief about what hacking is, discusses its scope, types of hackers and the techniques employed by them. Itarticulates on the growing trend of smart mailers, which can send mails from any possible email,working
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Karlgren, Kasper, Barry Brown, and Donald McMillan. "From Self-Tracking to Sleep-Hacking." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–26. http://dx.doi.org/10.1145/3555630.

Texto completo da fonte
Resumo:
With growing interest in how technology can make sense of our body and bodily experiences, this work looks at how these experiences are communicated through and with the help of technology. We present the ways in which knowledge about sleep, and how to manipulate it, is collectively shared online. This paper documents the sleep-change practices of four groups of 'Sleep Hackers' including Nurses, Polyphasic Sleeper, Over-sleepers, and Biohackers. Our thematic analysis uses 1002 posts taken from public forums discussing sleep change. This work reveals the different ways individuals share their e
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Sati, Vrinda, and Raja Muthalagu. "Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution." Cybernetics and Information Technologies 23, no. 2 (2023): 124–36. http://dx.doi.org/10.2478/cait-2023-0017.

Texto completo da fonte
Resumo:
Abstract The world today runs on data, every minuscule task to the large one requires data. All the data is stored in the various technologies that we use. And to keep data safe, air gaps are introduced. Air gaps are a network security measure where secure computer networks are physically isolated from unsecured networks. Yet, different methods to hack the air gap have come forth. The paper analyzes the problem of hacking an air gap via screen brightness modulations. The proposed solution is a software program used to alert the user of a change in the brightness level of the screen. The concep
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Brown, Barry, Minna Vigren, Asreen Rostami, and Mareike Glöss. "Why Users Hack: Conflicting Interests and the Political Economy of Software." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–26. http://dx.doi.org/10.1145/3555774.

Texto completo da fonte
Resumo:
It is often assumed that the interests of users and developers coincide, sharing a common goal of good design. Yet users often desire functionality that goes beyond what designers, and the organisations they work in, are willing to supply. Analysing online forums, complemented with interviews, we document how users, hackers and software developers worked together to discover and apply system exploits in hardware and software. We cover four cases: users of CPAP breathing assistance machines getting access to their own sleep data, 'hacking' the Nintendo switch game console to run non-authorised
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Sendi Novianto, Setyo Budi, Farrikh Al Zami, Sasono Wibowo, Achmad Wahid Kurniawan, and Budi Widjajanto. "PELATIHAN & SIMULASI CRACK VS HACK 1.0 DI SMA NEGERI 3 SEMARANG." Jurnal Layanan Masyarakat (Journal of Public Services) 6, no. 2 (2022): 385–94. http://dx.doi.org/10.20473/jlm.v6i2.2022.385-394.

Texto completo da fonte
Resumo:
Dari seluruh SMA yang ada di Kota Semarang, ada salah satu SMA yang merupakan SMA terbaik di kota ini, yaitu SMA Negeri 3 Semarang. Namun demikian SMA ini tetap berusaha memajukan keterampilan dan pengetahuan siswa dan guru, yaitu dengan cara berkolaborasi dengan instansi lain dengan mengadakan pelatihan dibidang teknologi informasi yang isi materinya meliputi crack, hack, sosial media, industri inovatif, data mining, dan yang lainnya. Kolaborasi ini diadakan dengan tujuan agar SMA tersebut dapat sejajar dengan SMA terbaik lainnya dalam menyongsong perkembangan teknologi informasi dunia yang s
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Akhtar, Naveed. "Latest trends in the Cybersecurity after the solar wind hacking attack." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:yellow;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 1, no. 2 (2021): 14–24. http://dx.doi.org/10.33897/fujeas.v1i2.347.

Texto completo da fonte
Resumo:
That dominance, in any case, has gotten to be a risk. On Sunday, Solar Winds alarmed thousands of its clients that an “outside country state” had found a back entryway into its most well-known item, an instrument called Orion that makes a difference organizations screen blackouts on their computer systems and servers. The company uncovered that programmers snuck a malevolent code that gave them inaccessible get to customers’ systems into an upgrade of Orion. The hack started as early as Walk, Solar Winds conceded, giving the programmers bounty of time to get to the customers’ inside workings.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Natho, Parinya, Suwit Somsuphaprungyos, Salinun Boonmee, and Sangtong Boonying. "Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm." International Journal of Reconfigurable and Embedded Systems (IJRES) 13, no. 3 (2024): 502. http://dx.doi.org/10.11591/ijres.v13.i3.pp502-511.

Texto completo da fonte
Resumo:
&lt;span&gt;The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems. These issues include opponents stealing a company's or nation's private information and harming the economy or the organization's security. Password hacking is a common tool used by hackers for illegal purposes. Password security against hackers is essential. There are several ways to hack passwords, including traffic interception, social engineering, credential stuffing, and pa
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Bradbury, Victoria, and Suzy O'Hara. "Reframing Innovation." Media-N 15, no. 2 (2019): 5–19. http://dx.doi.org/10.21900/j.median.v15i2.76.

Texto completo da fonte
Resumo:
This paper outlines five presentations delivered by invited panelists during Reframing Innovation: Art, the Maker Movement and Critique, our New Media Caucus affiliated panel at the CAA Conference, February 2019, New York City. The panel developed from our co-edited volume, Art Hack Practice(forthcoming, Routledge) which investigates global art hacking practices employed by individuals and groups who are working within, around or against the phenomenon known as ‘maker culture’ as artists, designers, curators and historians.&#x0D; Each presentation offers a distinct account of contemporary art
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Bellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Texto completo da fonte
Resumo:
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interes
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Charnley, P. M. C. "Hack-gate: examining the phone-hacking scandal and its repercussions for press regulation in the UK." Journal of Intellectual Property Law & Practice 7, no. 3 (2012): 211–19. http://dx.doi.org/10.1093/jiplp/jpr218.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Thavarajah, Nathan, and Miriam Fenkes. "Hacked kestrels (<em>Falco tinnunculus</em>) show similar patterns of post-fledging food dependency as wild reared birds: implications for best practice in release management of orphaned raptors." Wildlife Rehabilitation Bulletin 40, no. 1 (2022): 1–7. http://dx.doi.org/10.53607/wrb.v40.243.

Texto completo da fonte
Resumo:
One of the challenges of wildlife rehabilitation is ensuring that rehabilitated animals have the required characteristics for survival after release. This is especially the case for orphaned animals that normally develop survival skills during a prolonged period of parental care. For raptors, this is called the post-fledging dependency period (PDP), where parents provide nutritional support to juveniles whilst they develop the physiological and behavioural characteristics required to successfully hunt prey. Orphaned raptors can be rehabilitated and released using a method termed “hacking,” a t
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Ferretti, Silva. "Hacking by the prompt: Innovative ways to utilize ChatGPT for evaluators." New Directions for Evaluation 2023, no. 178-179 (2023): 73–84. http://dx.doi.org/10.1002/ev.20557.

Texto completo da fonte
Resumo:
Abstract“Hacking by the prompt”—writing simple yet creative conversational instructions in ChatGPT's message window—revealed many valuable additions to the evaluator's toolbox for all stages of the evaluation process. This includes the production of terms of reference and proposals for the dissemination of final reports. ChatGPT does not come with an instruction book, so evaluators must experiment creatively to understand its potential. The surprising performance of ChatGPT leads to the question: will it eventually substitute for evaluators? By describing ChatGPT through four personality chara
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Thackray, Helen. "Research spotlight – Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities." Social Psychological Review 21, no. 1 (2019): 8–9. http://dx.doi.org/10.53841/bpsspr.2019.21.1.8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Ash, Rachel. "Untextbooking for the CI Latin class: why and how to begin." Journal of Classics Teaching 20, no. 39 (2019): 65–70. http://dx.doi.org/10.1017/s2058631019000114.

Texto completo da fonte
Resumo:
When I first dreamed about leaving my textbook behind in any serious manner, the thought was spurred by a post authored by Audrey Watters in her blog Hack Education, ‘Hacking the Textbook (Open).’ In her post, Watters describes an event in which teachers are trained to create, cultivate, and collectively share their own curriculum content. I had already spent years modifying my textbook to make it work with the way I teach, and while I still believe that it is the best textbook for a Comprehensible Input-based class, I found myself struggling more and more against the book the further students
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Tan, Edna, and Angela Calabrese Barton. "Hacking a Path into and through STEM: Exploring how Youth Build Connecting Pathways between STEM-Related Landscapes." Teachers College Record: The Voice of Scholarship in Education 122, no. 2 (2020): 1–44. http://dx.doi.org/10.1177/016146812012200211.

Texto completo da fonte
Resumo:
Background/Context Minoritized youth from historically marginalized backgrounds continue to face systemic inequities in STEM. Existing strategies aimed at increasing diversity in STEM, which are guided by the STEM “pipeline” metaphor and are deficit-oriented, have yielded lackluster results. Purpose/Objective/Research Questions/Focus of Study This paper investigates how mi-noritized youth attempted to build connecting pathways between STEM-related worlds, how such attempts unfolded, and the resultant outcomes pertaining to their developing STEM expertise and subsequent STEM engagement. We intr
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Shanmuga Priya, S., Dr A.Valarmathi, M. Rizwana, and Dr L.Mary Gladence. "Enhanced Mutual Authentication System in Mobile Cloud Environments." International Journal of Engineering & Technology 7, no. 3.34 (2018): 192. http://dx.doi.org/10.14419/ijet.v7i3.34.18962.

Texto completo da fonte
Resumo:
Security is one of the significant worries of all associations which utilizes online methods for interchanges particularly banks. Of this, customer side is most defenseless against hacking, as the framework can't be totally shut when use over web by a typical customer is to be permitted. Most frameworks utilize a static password– based verification strategy which is anything but difficult to hack. There are different other validation strategies existing like cards, biometric recognizable proof, and so on. These strategies give better security, however are not material to online customer corres
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

K Prabu, Et al. "Security Privacy Process Involvement in Cloud Security for Data Preservation against Data Malicious Activity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 1572–83. http://dx.doi.org/10.17762/ijritcc.v11i10.8709.

Texto completo da fonte
Resumo:
Cloud data sent from the person is attacked, leading to data hacking. Data classification can be made by malware detection, leading to the data warehouse technique and data storage. The cloud data from a particular internet protocol address cannot be hacked. Only random cloud data is hacked. Even though this leads to some illegal issues. The method of managing the cloud data and maintaining the factor to hack illegal cloud data has been proposed. The method of malware detection and ML-based end-to-end malware detection are used in calculating the time efficiency. The malware detection and defe
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Dreessen, Katrien, Selina Schepers, and Danny Leen. "From Hacking Things to Making Things. Rethinking making by supporting non-expert users in a FabLab." Interaction Design and Architecture(s), no. 30 (September 20, 2016): 47–64. http://dx.doi.org/10.55612/s-5002-030-003.

Texto completo da fonte
Resumo:
When discussing maker culture, much attention is dedicated to how making can be beneficial for specific fields (e.g. healthcare, education) or various communities of makers (e.g. educators, crafters). The democratic ideal of personal fabrication and the maker culture movement – represented by the growth of open makerspaces (e.g. FabLabs, makerspaces) and online communities (e.g. ‘Instructables’, ‘Thingiverse’) worldwide – provides everyone with the opportunity to make (almost) anything. However, structurally engaging non-expert users still remains an important challenge for most open makerspac
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Bilgin, Adem. "Elhik’s Metamathematics and the robot Philia: Internet Communication Protocol Modelling of Observeds according to Observers." European Journal of Artificial Intelligence and Machine Learning 1, no. 2 (2022): 1–10. http://dx.doi.org/10.24018/ejai.2022.1.2.3.

Texto completo da fonte
Resumo:
Like all robot and IoT oriented mathematical studies this study is also transdisciplinary however most of the study remains in the field of mathematics and philosophy of mathematics due to the aim of mathematical modelling of the observations: a) protein synthesis by the information encoded in DNA and b) communication protocols of hacking software with encryption of IP of computers c) the process of DNA duplication to offspring formation in asexual and sexual reproduction. The ultimate mathematical aim of this study is providing a metamathematical approach for different types of mathematics to
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Reflinaldi, Reflinaldi, Bobbi Aidi Rahman, Awliya Rahmi, and Melisa Rezi. "Hacking Threat in Arab Cyberspace: How al-Hākirz al-Muslimūn Construct Narratives against Zionists and Anti-Islamists." Arabiyatuna: Jurnal Bahasa Arab 7, no. 2 November (2023): 457. http://dx.doi.org/10.29240/jba.v7i2.8156.

Texto completo da fonte
Resumo:
The attack on the al-Aqsa mosque on April 6, 2023, and the burning of the Qur'an on January 21, 2023, have sparked a reaction from hacker group who call themselvesالهاكرز المسلمون (al-hākirz al-muslimūn) 'Muslim Hackers' (MH). Through the “Hacker News” YouTube channel, they threaten to hack several strategic and vital facilities of the Israeli and Swedish governments. About this phenomenon, this study aims to explain the construction of their threat narratives to those whom they call Zionists and anti-Islamists. Explanative qualitative research was conducted to answer research questions cons
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Guterres, Lilia Ervina Jeronimo, and Ahmad Ashari. "THE ANALYSIS OF WEB SERVER SECURITY FOR MULTIPLE ATTACKS IN THE TIC TIMOR IP NETWORK." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 14, no. 1 (2020): 103. http://dx.doi.org/10.22146/ijccs.53265.

Texto completo da fonte
Resumo:
The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown ac
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Texto completo da fonte
Resumo:
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Hancocks, Stephen. "Hacks, hackers and hacking." British Dental Journal 211, no. 2 (2011): 51. http://dx.doi.org/10.1038/sj.bdj.2011.576.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Hasan, Hind Ali Abdul, Safaa Maijd Mohammed, and Noor Hayder Abdul Ameer. "ADVANCED ENCRYPTION STANDARD USING FPGA OVERNETWORK." EUREKA: Physics and Engineering, no. 1 (January 29, 2021): 32–39. http://dx.doi.org/10.21303/2461-4262.2021.001613.

Texto completo da fonte
Resumo:
The increase number of eavesdropping or cracker to attack the information and hack the privacy of people. So, the essential issue is making system capable of ciphering information with rapid speed. Due to the advance in computer eavesdropping and cracker that made them to analysis the way of ciphering in rapid speed way. The development in the computer especially in the rapid processer in the last decade create the breaching of any system is a matter of time. Owing to most of breaching ways are based on analysis of system that requireы to be breached and to try brute force on that system to cr
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Herskovitz, Jaylin. "DIY Assistive Software: End-User Programming for Personalized Assistive Technology." ACM SIGACCESS Accessibility and Computing, no. 137 (January 2024): 1. http://dx.doi.org/10.1145/3654768.3654772.

Texto completo da fonte
Resumo:
Existing assistive technologies often fail to support the unique and personalized needs of blind and visually impaired (BVI) people. Thus, BVI people have become domain experts in customizing and 'hacking' assistive technology in order to creatively suit their needs. However, current assistive technologies are difficult to hack and alter at the individual level due to the skill and resources required. Due to these challenges, new approaches to supporting Do-It-Yourself (DIY) technology creation are needed to make applying the DIY concept to high-tech assistive technologies for BVI people more
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Sriman, B., and Venkat Sai Sujan Kandregula. "The Next level of Security Scalable Solution Blockchain (SSSB) in Satellite Communication System." Journal of Physics: Conference Series 2335, no. 1 (2022): 012063. http://dx.doi.org/10.1088/1742-6596/2335/1/012063.

Texto completo da fonte
Resumo:
Abstract Data security is one of the topmost priorities for government organisations and multinational companies. In particular, extremely sensitive data is regularly transferred between different branches of the government and the military. Hacking and interruption of data transmission of such high-level data transfers can pose a huge risk to the security of a country and to its integrity as well. The method that the article proposes has been implemented on a smaller scale for cryptocurrency transactions by the organisation “Blockstream”. This study serves the purpose of exploring a new use c
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Tsybulnyk, Serhii, Dmytro Zubarskyi, and Diana Pivtorak. "APPLIED SOFTWARE FOR PERSONAL INFORMATION STORAGE." Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, no. 1(15) (May 5, 2023): 53–59. http://dx.doi.org/10.20998/2413-4295.2023.01.07.

Texto completo da fonte
Resumo:
In today's world, the personal information of any person can be conventionally divided into two large categories: general and special. As you can understand from the name, the first category is responsible for the type of data that can be found in public access, namely: surname, first name, patronymic, signature, place and date of birth, citizenship, marital status, education, bank details, etc. Such a variety of personal data requires different methods and automated means of storage. Today, private and state institutions increasingly refuse to store information in paper form. This is explaine
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Sarkar, Sanchar, and Swarnalatha Rangarajan. "“Do you think it is a Pandemic?” Apocalypse, Anxiety and the Environmental Grotesque in Paolo Bacigalupi’s The Windup Girl." Interlitteraria 27, no. 1 (2022): 69–83. http://dx.doi.org/10.12697/il.2022.27.1.7.

Texto completo da fonte
Resumo:
Paolo Bacigalupi’s The Windup Girl (2009), set in the post fossil-fuel, post turbo-capitalist country of Thailand, portrays the shocking after effects of bioengineering and gene-hack modifications in food crops. The narrative depicts a country tottering on the brink of an agricultural apocalypse on account of food production being severely affected by crop driven anomalies and rogue diseases such as “cibiscosis” and “blister rust” transmitted by variants of mutating pests. Natural seed stock becomes completely supplanted by the new genetically engineered seeds which become sterile after a sing
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Pramana, Taufik Agung, and Yudi Ramdhani. "Sentiment Analysis Tanggapan Masyarakat Tentang Hacker Bjorka Menggunakan Metode SVM." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 6, no. 1 (2023): 49–62. http://dx.doi.org/10.32672/jnkti.v6i1.5583.

Texto completo da fonte
Resumo:
Abstrak— Pada pertengahan tahun 2022, Indonesia dibuat gempar oleh kehadiran hacker dengan nama Bjorka, pasalnya Bjorka berhasil meretas situs Kementrian Komunikasi dan Informatika (KEMKOMINFO). Bjorka tidak melakukan aksinya satu atau dua kali, namun sering kali Bjorka membuat gempar seluruh masyarakat Indoneisa. Bagaimana tidak, selain meretas situs Kementrian Komunikasi dan Informatika, Bjorka juga berhasil mencuri dokumen rahasia milik Badan Intelejen Negara (BIN). Selain berhasil mencuri, Bjorka juga tidak ragu untuk menyebarluaskan dokumen rahasia tersebut dalam berupa kalimat di sosial
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Delgado, Ana, and Blanca Callén. "Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times." Public Understanding of Science 26, no. 2 (2016): 179–94. http://dx.doi.org/10.1177/0963662516647348.

Texto completo da fonte
Resumo:
In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. Wha
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Jasiński, Maciej. "The Correspondence of Michał Antoni Hacki and Johannes Hevelius." Odrodzenie i Reformacja w Polsce 67 (March 5, 2024): 199–230. http://dx.doi.org/10.12775/oirwp.2023.07.

Texto completo da fonte
Resumo:
Artykuł przedstawia korespondencję opata oliwskiego Michała Antoniego Hackiego (ok. 1630–1703) z gdańskim astronomem Janem Heweliuszem (1611–1687), prowadzoną nieregularnie w latach 1654–1686. Omawia obecne w niej zagadnienia, które uzupełniają dotychczasowe ustalenia dotyczące biografii obu korespondentów, w tym m.in. zainteresowania Hackiego muzyką czy przekonanie Heweliusza o niesłuszności stosowania pozycyjnych instrumentów astronomicznych zaopatrzonych w lunety. Ponadto przedstawia nieznane dotychczas okoliczności wyznaczenia gwiazdozbioru Tarczy ku czci Jana III i dedykowania mu książki
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Lennerfors, Thomas Taro, Per Fors, and Jonathan R. Woodward. "Case hacks: Four hacks for promoting critical thinking in case-based management education for sustainable development." Högre utbildning 10, no. 2 (2020): 1. http://dx.doi.org/10.23865/hu.v10.1960.

Texto completo da fonte
Resumo:
In management education at engineering and business schools, the case-based method is commonly used. The case-based method has a strong action orientation but is seen to downplay critical thinking, which is an important component in Education for Sustainable Development (ESD). Current literature suggests two ways in which the case-based method can be improved, namely by producing better cases, and by improving classroom practice. This paper contributes to research and practice on case-based ESD within management education by outlining a third way: hacking cases, in other words, making modifica
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Gacharná G., Federico Iván. "Hacker ético vs. delincuente informático: Una mirada en el contexto colombiano." INVENTUM 4, no. 6 (2009): 46–49. http://dx.doi.org/10.26620/uniminuto.inventum.4.6.2009.46-49.

Texto completo da fonte
Resumo:
El presente artículo aborda el singular mundo del Hacking Ético, buscando establecer que un hacker no es un delincuente tal y como se define en el imaginario general, haciendo especifica la disertación para el contexto colombiano. Con este fin se recurre al planteamiento de dos perfiles que son producto de la experiencia y trayectoria del autor, para concluir que en Colombia hay talento humano para formar grandes profesionales en Hacking Ético, pero hace falta una formación clara que evite que los participantes distorsionen el propósito y terminen irrumpiendo en la ilegalidad.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Swetha, Pelleti. "Modeling and Predicting Cyber Hacking Breaches." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 5349–55. http://dx.doi.org/10.22214/ijraset.2021.36168.

Texto completo da fonte
Resumo:
Analyzing cyber incident information units is an essential approach for deepening our expertise in the evolution of the chance situation. This is an especially new study topic, and lots of research continue to be done. In this paper, we record a statistical evaluation of a breach incident records set similar to 12 years (2005–2017) of cyber hacking sports that encompass malware attacks. We display that, an evaluation of the findings stated withinside the literature, each hacking breach incident inter-arrival instances and breach sizes must be modeled through stochastic processes, instead of th
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Kurniawan, Ade, Yuichi Ohsita, and Masayuki Murata. "Experiments on Adversarial Examples for Deep Learning Model Using Multimodal Sensors." Sensors 22, no. 22 (2022): 8642. http://dx.doi.org/10.3390/s22228642.

Texto completo da fonte
Resumo:
Recently, artificial intelligence (AI) based on IoT sensors has been widely used, which has increased the risk of attacks targeting AI. Adversarial examples are among the most serious types of attacks in which the attacker designs inputs that can cause the machine learning system to generate incorrect outputs. Considering the architecture using multiple sensor devices, hacking even a few sensors can create a significant risk; an attacker can attack the machine learning model through the hacked sensors. Some studies demonstrated the possibility of adversarial examples on the deep neural network
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Łukaszewicz-Chantry, Maria. "Poemat Maryjny Michała Antoniego Hackiego." Symbolae Philologorum Posnaniensium Graecae et Latinae 28, no. 2 (2019): 127–37. http://dx.doi.org/10.14746/sppgl.2018.xxviii.2.8.

Texto completo da fonte
Resumo:
The poem of the Abbot of Oliwa Michał Hacki can be considered as a poetic Mariological treatise which emphasises the privilege of the Immaculate Conception, questioned by the Reformation. Hacki gives numerous metaphors and titles of Mary, systematises them, classifies them into thematic groups and explains their meaning. By doing so, he preserves the hierarchy of theological truths and Christocentrism.
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Bentolila, Héctor Rodolfo. "Importancia del lenguaje y método filosófico en el segundo Wittgenstein." Revista Colombiana de Filosofía de la Ciencia 18, no. 36 (2018): 83–95. http://dx.doi.org/10.18270/rcfc.v18i36.2351.

Texto completo da fonte
Resumo:
El articulo responde a la pregunta ¿Por qué importa el lenguaje en filosofía?, formulada hace más de cuarenta años por el filósofo canadiense, Ian Hacking. Al hacerlo, parte de la nueva concepción del método filosófico desarrollada por Wittgenstein en sus Investigaciones Filosóficas. El objetivo es mostrar que el lenguaje importa a la filosofía, sobre todo, como el medio natural en que los seres humanos actúan y se mueven habitualmente. De dicha condición, y de comparar los usos filosóficos del lenguaje con las acciones lingüísticas primitivas -de donde derivan aquellos- se desprende un estilo
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Giannone, Ariel. "Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software." Revista Latinoamericana de Ingenieria de Software 4, no. 6 (2017): 252. http://dx.doi.org/10.18294/relais.2016.252-254.

Texto completo da fonte
Resumo:
&lt;p&gt;Debido al crecimiento exponencial de Internet y a que las organizaciones poseen cada vez mas información, se hace imprescindible bloquear y eliminar todas las intrusiones posibles. Gracias al hacking ético es posible detectar y corregir algunas de las vulnerabilidades antes que el sistema salga a la luz. Con el fin de mejorar este proceso se intentan incluir estas técnicas y métodos en el proceso tradicional de testing de software dentro de las organizaciones.&lt;/p&gt;
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Vilatta, Emilia, and José Giromini. "La injusticia testimonial como fabricación de personas: una lectura ontológica." Griot : Revista de Filosofia 21, no. 1 (2021): 75–93. http://dx.doi.org/10.31977/grirfi.v21i1.2106.

Texto completo da fonte
Resumo:
El objetivo de este trabajo es desarrollar una lectura ontológica del fenómeno ético-epistémico que Miranda Fricker (2017) caracteriza como injusticia testimonial. Para hacer esto, recurriremos a las ideas desarrolladas por Ian Hacking (2001, 2002, 2006) respecto a las relaciones entre las clasificaciones sociales y las clases o tipos sociales. Por un lado, consideraremos los procesos que Hacking llama “fabricación de personas” (making up people), a saber, aquellos procesos mediante los cuales la articulación de ciertas clasificaciones hace posible la existencia de ciertos tipos de personas. A
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Nanda, Sendi Eka, and Winda Widyaningsih. "PENGARUH TERPAAN BERITA PERETASAN TOKOPEDIA TERHADAP REPUTASI PERUSAHAAN." Jurnal Broadcasting Communication 3, no. 1 (2021): 12–22. http://dx.doi.org/10.53856/bcomm.v3i1.138.

Texto completo da fonte
Resumo:
Penelitian ini bertujuan untuk menguji dan menganalisis pengaruh terpaan Tokopedia Hacking News terhadap reputasi perusahaan. Metode penelitian menggunakan metode survei, jenis penelitian ini menggunakan kuantitatif melalui penyebaran kuesioner dengan purposive sampling. Unit analisis dalam penelitian ini adalah 350 responden yang menggunakan Tokopedia dari total populasi 2.330.000 penduduk Kota Depok dengan menggunakan rumus Slovin. Alat analisis data menggunakan analisis regresi linier sederhana menggunakan aplikasi IBM Statistics versi 25. Penelitian ini menggunakan teori uses and effect ya
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!