Academic literature on the topic 'Computer hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer hackers"
Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Full textHausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Full textHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Full textJamaluddin, Jamaluddin, El Rahmat Jaya Hulu, and Rimbun Siringoringo. "PENGONTROLAN KEAMANAN SISTEM KOMPUTER CLIENT DARI SERANGAN HACKER DAN VIRUS KOMPUTER SECARA JARAK JAUH (REMOTE SERVER) DENGAN MENGGUNAKAN SSH." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 7, no. 1 (April 30, 2023): 123–27. http://dx.doi.org/10.46880/jmika.vol7no1.pp123-127.
Full textBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Full textWarren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (August 7, 2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.
Full textMenkus, Belden. "Seattle computer hackers sentenced." Computer Fraud & Security Bulletin 1993, no. 9 (September 1993): 4. http://dx.doi.org/10.1016/0142-0496(93)90231-k.
Full textBratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.
Full textXu, Zhengchuan, Qing Hu, and Chenghong Zhang. "Why computer talents become computer hackers." Communications of the ACM 56, no. 4 (April 2013): 64–74. http://dx.doi.org/10.1145/2436256.2436272.
Full textFerenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (September 2022): 124–29. http://dx.doi.org/10.58679/ii52272.
Full textDissertations / Theses on the topic "Computer hackers"
Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textDalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Full textImhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.
Full textRota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators." Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.
Full textArtore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.
Full textHowell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.
Full textOswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.
Full textLevine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Full textGupta, Nirbhay. "Determining the effectiveness of deceptive honeynets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.
Full textKelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.
Full textBooks on the topic "Computer hackers"
Films for the Humanities (Firm) and Canadian Broadcasting Corporation, eds. Hackers. Princeton, N.J: Films for the Humanities and Sciences, 2005.
Find full textVerton, Dan. The hacker diaries: Confessions of teenage hackers. New York: McGraw-Hill/Osborne, 2002.
Find full textGoldstein, Emmanuel. Dear Hacker: Letters to the editor of 2600. Indianapolis, IN: Wiley Pub., 2010.
Find full text(Firm), Learning Channel, September Films, and Discovery Channel University, eds. Hackers: Outlaws and angels. Princeton, N.J: Films for the Humanities and Sciences, 2006.
Find full textLevy, Steven. Hackers: Heroes of the computer revolution. New York, N.Y: Penguin Books, 1994.
Find full textLevy, Steven. Hackers: Heroes of the computer revolution. New York, N.Y: Dell Pub., 1994.
Find full textStasi, Mafalda. God save the cyberpunk: Dichiarato morto al centro dell'imperio, il cyberpunk prospera nelle colonie. Bologna: Percorsi Synergon, 1993.
Find full textBook chapters on the topic "Computer hackers"
Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Computer Hackers and Hacking." In Cybercrime and Digital Forensics, 67–125. Second edition. | Abingdon, Oxon ; New York, NY : Routledge, 2018.: Routledge, 2017. http://dx.doi.org/10.4324/9781315296975-3.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Texts in Computer Science, 105–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Texts in Computer Science, 109–36. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-47549-8_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 105–30. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 107–32. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 105–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_5.
Full textSchneier, Bruce. "Invited Talk: The Coming AI Hackers." In Lecture Notes in Computer Science, 336–60. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78086-9_26.
Full textGoyal, Rohit, and Nicola Dragoni. "Why Hackers Love eHealth Applications." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 58–63. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-51234-1_9.
Full textHeinzen, Thomas E., and Louis M. Picciano. "Ilk Hunting: Newbies, Cyberpunks, Coders and the Search for Elusive, Ego-Twisted, Talented Computer Hackers." In International Handbook on Giftedness, 809–23. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-1-4020-6162-2_39.
Full textKhalifa, Wael, Kenneth Revett, and Abdel-Badeeh Salem. "In the Hacker’s Eye: The Neurophysiology of a Computer Hacker." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 112–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33448-1_16.
Full textConference papers on the topic "Computer hackers"
Blocki, Jeremiah, Manuel Blum, and Anupam Datta. "GOTCHA password hackers!" In CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517312.2517319.
Full textPatterson, Nicholas, Michael Hobbs, Frank Jiang, and Lei Pan. "Cyber Security Insights into Self-Proclaimed Virtual World Hackers." In 5th International Conference on Computer Science, Information Technology. Aircc Publishing Corporation, 2019. http://dx.doi.org/10.5121/csit.2019.91107.
Full textMuller, Sune Dueholm, and Frank Ulrich. "The Competing Values of Hackers: The Culture Profile that Spawned the Computer Revolution." In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE, 2015. http://dx.doi.org/10.1109/hicss.2015.413.
Full textMcFall, Steve. "Using technology to support investigations in the electronic age: tracking hackers to large scale international computer fraud." In Coupling Technology to National Need, edited by Arthur H. Guenther and Louis D. Higgs. SPIE, 1994. http://dx.doi.org/10.1117/12.170642.
Full textElva, Rochelle. "Trac: An Approach to Teaching Security-Aware Programming in Undergraduate Computer Science Courses." In 10th International Conference on Foundations of Computer Science & Technology (FCST 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120809.
Full textHidalgo-Espinoza, Sergio, Kevin Chamorro-Cupuerán, and Oscar Chang-Tortolero. "Intrusion Detection in Computer Systems by using Artificial Neural Networks with Deep Learning Approaches." In 10th International Conference on Advances in Computing and Information Technology (ACITY 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101501.
Full textGhislain VLAVONOU, Davy, Isckyros Gangbo, Thierry Nsabimana, Christian Bimenyimana, Perpetus Jacques Houngbo, Joël T. Hounsou, and Fulvio Frati. "IDS with hybrid sampling technique: combination over and under-sampling technique and comparison with deep convolutional approach." In Intelligent Human Systems Integration (IHSI 2024) Integrating People and Intelligent Systems. AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004488.
Full textPohl, Johannes, and Andreas Noack. "Universal Radio Hacker." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3139937.3139951.
Full textJohnson, Andrew. "Hawker, Hacker, Herald." In SIGGRAPH07: Special Interest Group on Computer Graphics and Interactive Techniques Conference. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/1280120.1280226.
Full textRao, Gatta Sambasiva, P. Naveen Kumar, P. Swetha, and G. BhanuKiran. "Security assessment of computer networks -an ethical hacker's perspective." In 2014 International Conference on Computer and Communications Technologies (ICCCT). IEEE, 2014. http://dx.doi.org/10.1109/iccct2.2014.7066756.
Full textReports on the topic "Computer hackers"
Dukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.
Full text