Academic literature on the topic 'Computer hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer hackers"

1

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Full text
Abstract:
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However, no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test, a cyber expertise test, and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot, as well as the CTF event, were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers, it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers.
APA, Harvard, Vancouver, ISO, and other styles
2

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Full text
Abstract:
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hackers largely increase their information sharing, with two exceptions. The second hacker’s attack is deterred by the first hacker’s reputation gain. The firm’s defense against the second hacker increases in the second hacker’s unit cost, decreases in the second hacker’s information sharing effectiveness and utilization of joint sharing, and also decreases in both hackers’ reputation gain. Policy and managerial implications are provided.
APA, Harvard, Vancouver, ISO, and other styles
3

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Full text
Abstract:
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. When the first hacker exerts higher effort and shares more information, lower defense by the firm is sufficient to deter the second hacker. When the firm is deterred by the first hacker, the first hacker attacks less and shares more information than in the interior solution. For the first hacker and the firm, both players commonly prefer the disadvantaged player to move first. The exception is that the firm prefers to deter the first disadvantaged hacker when the two hackers benefit substantially from information sharing, reputation gain, or the second player is advantaged. The results contrast with the literature where the advantaged player commonly prefers to move first, with conflicting sequence preferences.
APA, Harvard, Vancouver, ISO, and other styles
4

Jamaluddin, Jamaluddin, El Rahmat Jaya Hulu, and Rimbun Siringoringo. "PENGONTROLAN KEAMANAN SISTEM KOMPUTER CLIENT DARI SERANGAN HACKER DAN VIRUS KOMPUTER SECARA JARAK JAUH (REMOTE SERVER) DENGAN MENGGUNAKAN SSH." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 7, no. 1 (April 30, 2023): 123–27. http://dx.doi.org/10.46880/jmika.vol7no1.pp123-127.

Full text
Abstract:
Computer system security is very important to be considered by computer users to protect their computers from attacks such as hackers and computer viruses that can take data and damage the user's computer system. Hacker is a person or party who has the skill in breaking through and sneaking to access a computer without the user's permission and can take data and even damage the system on the user's computer. And a Computer Virus is a computer program that copies and inserts copies into the program and can damage the computer system. So that by using SSH (Secure Shell) can control and check computer security from hacker attacks and computer viruses without having to come to the location where there is a client computer or done remotely (Remote Server).
APA, Harvard, Vancouver, ISO, and other styles
5

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Full text
Abstract:
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers.We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers.We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?
APA, Harvard, Vancouver, ISO, and other styles
6

Warren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (August 7, 2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Menkus, Belden. "Seattle computer hackers sentenced." Computer Fraud & Security Bulletin 1993, no. 9 (September 1993): 4. http://dx.doi.org/10.1016/0142-0496(93)90231-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Zhengchuan, Qing Hu, and Chenghong Zhang. "Why computer talents become computer hackers." Communications of the ACM 56, no. 4 (April 2013): 64–74. http://dx.doi.org/10.1145/2436256.2436272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ferenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (September 2022): 124–29. http://dx.doi.org/10.58679/ii52272.

Full text
Abstract:
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the CAM table of a switch with MAC addresses, and TCP SYN Flood is an attack that can be launched against a server in the computer network.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer hackers"

1

Wilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Imhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rota, Andrea. "Hacking the Web 2.0 : user agency and the role of hackers as computational mediators." Thesis, London School of Economics and Political Science (University of London), 2016. http://etheses.lse.ac.uk/3313/.

Full text
Abstract:
This thesis studies the contested reconfigurations of computational agency within the domain of practices and affordances involved in the use of the Internet in everyday life (here labelled lifeworld Internet), through the transition of the Internet to a much deeper reliance on computation than at any previous stage. Computational agency is here considered not only in terms of capacity to act enabled (or restrained) by the computational layer but also as the recursive capacity to reconfigure the computational layer itself, therefore in turn affecting one’s own and others’ computational agency. My research is based on multisited and diachronic ethnographic fieldwork: an initial (2005–2007) autoethnographic case study focused on the negotiations of computational agency within the development of a Web 2.0 application, later (2010–2011) fieldwork interviews focused on processes through which users make sense of the increasing pervasiveness of the Internet and of computation in everyday life, and a review (2010–2015) of hacker discourses focused on tracing the processes through which hackers constitute themselves as a recursive public able to inscribe counter–narratives in the development of technical form and to reproduce itself as a public of computational mediators with capacity to operate at the intersection of the technical and the social. By grounding my enquiry in the specific context of the lifeworlds of individual end users but by following computational agency through global hacker discourses, my research explores the role of computation, computational capacity and computational mediators in the processes through which users ‘hack’ their everyday Internet environments for practical utility, or develop independent alternatives to centralized Internet services as part of their contestation of values inscribed in the materiality of mainstream Internet.
APA, Harvard, Vancouver, ISO, and other styles
5

Artore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Howell, Christian Jordan-Michael. "The Restrictive Deterrent Effect of Warning Banners in a Compromised Computer System." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6259.

Full text
Abstract:
System trespassing, which refers to the unauthorized access of computer systems, has rapidly become a worldwide phenomenon. Despite growing concern, criminological literature has paid system trespassing little attention. The current study utilizes data gathered from a Chinese computer network to examine system trespasser behavior after exposure to one of three warning messages: an altruistic message used for moral persuasion (warning 1), a legal sanction threat (warning 2), and an ambiguous threat (warning 3). More specifically, the current study examines the temporal order of various keystroke commands to determine if some keystroke commands are used as a tactical skill to avoid detection. The results of a series of bivariate cross-tabulations show that encountering a standard legal threat or ambiguous threat increase the early use of reconnaissance commands; however, these findings were not pronounced enough to gain statistical significance. Since the current study is the first known test of particularistic restrictive deterrence in cyberspace it informs those working in cyber security, whilst expanding the scope of the theory.
APA, Harvard, Vancouver, ISO, and other styles
7

Oswald, Kathleen Frazer. "Hacking subject, subjecting hacking crisis in technoculture /." Click here for download, 2006. http://wwwlib.umi.com/cr/villanova/fullcit?p1432838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Levine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.

Full text
Abstract:
A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect and classify rootkit exploits. The goal of this research is to provide system administrators, researchers, and security personnel with the information necessary in order to take the best possible recovery actions concerning systems that are compromised by rootkits. There is no such methodolgoy available at present to perform this function. This may also help to detect and fingerprint additional instances and prevent further security instances involving rootkits. A formal framework was developed in order to define rootkit exploits as an existing rootkit, a modification to an exisiting, or an entirely new rootkit. A methodology was then described in order to apply this framework against rootkits that are to be investigated. We then proposed some new methods to detect and characterize specific types of rootkit exploits. These methods consisted of identifying unique string signatures of binary executable files as well as examining the system call table within the system kernel. We established a Honeynet in order to aid in our research efforts and then applied our methodology to a previously unseen rootkit that was targeted against the Honeynet. By using our methodology we were able to uniquely characterize this rootkit and identify some unique signatures that could be used in the detection of this specific rootkit. We applied our methodolgy against nine additional rootkit exploits and were were able to identify unique characterstics for each of these rootkits. These charactersitics could also be used in the prevention and detection of these rootkits.
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Nirbhay. "Determining the effectiveness of deceptive honeynets." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1303.

Full text
Abstract:
Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception has been widely used during wars and now in Information Systems. This thesis considers the current state of honeypot technology as well as describes the framework of how to improve the effectiveness of honeypots through the effective use of deception. In this research, a legitimate corporate deceptive network is created using Honeyd (a type of honeypot) which is attacked and improved using empirical learning approach. The data collected during the attacking exercise were analysed, using various measures, to determine the effectiveness of the deception in the honeypot network created using honeyd. The results indicate that the attackers were deceived into believing the honeynet was a real network which instead was a deceptive network.
APA, Harvard, Vancouver, ISO, and other styles
10

Kelly, Nicholas M. "The freedom of information hacked: console cowboys, computer wizards, and personal freedom in the digital age." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/6778.

Full text
Abstract:
“The Freedom of Information Hacked: Console Cowboys, Computer Wizards, and Personal Freedom in the Digital Age” examines depictions of computer hackers in fiction, the media, and popular culture, assessing how such depictions both influence and reflect popular conceptions of hackers and what they do. In doing so, the dissertation demonstrates the central concerns of hacker stories—concerns about digital security, privacy, and the value of information—have become the concerns of digital culture as a whole, hackers laying bare collective hopes and fears regarding digital networks.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer hackers"

1

Films for the Humanities (Firm) and Canadian Broadcasting Corporation, eds. Hackers. Princeton, N.J: Films for the Humanities and Sciences, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Verton, Dan. The hacker diaries: Confessions of teenage hackers. New York: McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bischoff, David. Hackers. New York: HarperCollins Pub., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jack, Dann, and Dozois Gardner R, eds. Hackers. New York: Ace Books, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Goldstein, Emmanuel. Dear Hacker: Letters to the editor of 2600. Indianapolis, IN: Wiley Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

(Firm), Learning Channel, September Films, and Discovery Channel University, eds. Hackers: Outlaws and angels. Princeton, N.J: Films for the Humanities and Sciences, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bischoff, David. Hackers: A novel. New York, N.Y: HarperPaperbacks, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Levy, Steven. Hackers: Heroes of the computer revolution. New York, N.Y: Penguin Books, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Levy, Steven. Hackers: Heroes of the computer revolution. New York, N.Y: Dell Pub., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stasi, Mafalda. God save the cyberpunk: Dichiarato morto al centro dell'imperio, il cyberpunk prospera nelle colonie. Bologna: Percorsi Synergon, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer hackers"

1

Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar. "Computer Hackers and Hacking." In Cybercrime and Digital Forensics, 67–125. Second edition. | Abingdon, Oxon ; New York, NY : Routledge, 2018.: Routledge, 2017. http://dx.doi.org/10.4324/9781315296975-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Texts in Computer Science, 105–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Texts in Computer Science, 109–36. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-47549-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 105–30. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 107–32. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 105–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schneier, Bruce. "Invited Talk: The Coming AI Hackers." In Lecture Notes in Computer Science, 336–60. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78086-9_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goyal, Rohit, and Nicola Dragoni. "Why Hackers Love eHealth Applications." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 58–63. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-51234-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Heinzen, Thomas E., and Louis M. Picciano. "Ilk Hunting: Newbies, Cyberpunks, Coders and the Search for Elusive, Ego-Twisted, Talented Computer Hackers." In International Handbook on Giftedness, 809–23. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-1-4020-6162-2_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khalifa, Wael, Kenneth Revett, and Abdel-Badeeh Salem. "In the Hacker’s Eye: The Neurophysiology of a Computer Hacker." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 112–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33448-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer hackers"

1

Blocki, Jeremiah, Manuel Blum, and Anupam Datta. "GOTCHA password hackers!" In CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517312.2517319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patterson, Nicholas, Michael Hobbs, Frank Jiang, and Lei Pan. "Cyber Security Insights into Self-Proclaimed Virtual World Hackers." In 5th International Conference on Computer Science, Information Technology. Aircc Publishing Corporation, 2019. http://dx.doi.org/10.5121/csit.2019.91107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Muller, Sune Dueholm, and Frank Ulrich. "The Competing Values of Hackers: The Culture Profile that Spawned the Computer Revolution." In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE, 2015. http://dx.doi.org/10.1109/hicss.2015.413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McFall, Steve. "Using technology to support investigations in the electronic age: tracking hackers to large scale international computer fraud." In Coupling Technology to National Need, edited by Arthur H. Guenther and Louis D. Higgs. SPIE, 1994. http://dx.doi.org/10.1117/12.170642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elva, Rochelle. "Trac: An Approach to Teaching Security-Aware Programming in Undergraduate Computer Science Courses." In 10th International Conference on Foundations of Computer Science & Technology (FCST 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120809.

Full text
Abstract:
The unfortunate list of software failures, attacks, and other software disasters has made it apparent that software engineers need to produce reliable code. The Department of Homeland Security reports that 90% of software exploits are due to vulnerabilities resulting from defects in code. These defects are easy to exploit. They are potentially dangerous as they create software vulnerabilities that allow hackers to attack software, preventing it from working or compromising sensitive data. Thus, these defects need to be addressed as part of any effort to secure software. An effective strategy for addressing security-related code defects is to use defensive programming methods like security-aware programming. This paper presents TRAC, an approach to teaching security-aware programming. The acronym stands for Teach, Revisit, Apply and Challenge. It also describes the implementation of the approach and the results of a small case study (n = 21), in a senior-level elective course.
APA, Harvard, Vancouver, ISO, and other styles
6

Hidalgo-Espinoza, Sergio, Kevin Chamorro-Cupuerán, and Oscar Chang-Tortolero. "Intrusion Detection in Computer Systems by using Artificial Neural Networks with Deep Learning Approaches." In 10th International Conference on Advances in Computing and Information Technology (ACITY 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101501.

Full text
Abstract:
Intrusion detection into computer networks has become one of the most important issues in cybersecurity. Attackers keep on researching and coding to discover new vulnerabilities to penetrate information security system. In consequence computer systems must be daily upgraded using up-to-date techniques to keep hackers at bay. This paper focuses on the design and implementation of an intrusion detection system based on Deep Learning architectures. As a first step, a shallow network is trained with labelled log-in [into a computer network] data taken from the Dataset CICIDS2017. The internal behaviour of this network is carefully tracked and tuned by using plotting and exploring codes until it reaches a functional peak in intrusion prediction accuracy. As a second step, an autoencoder, trained with big unlabelled data, is used as a middle processor which feeds compressed information and abstract representation to the original shallow network. It is proven that the resultant deep architecture has a better performance than any version of the shallow network alone. The resultant functional code scripts, written in MATLAB, represent a re-trainable system which has been proved using real data, producing good precision and fast response.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghislain VLAVONOU, Davy, Isckyros Gangbo, Thierry Nsabimana, Christian Bimenyimana, Perpetus Jacques Houngbo, Joël T. Hounsou, and Fulvio Frati. "IDS with hybrid sampling technique: combination over and under-sampling technique and comparison with deep convolutional approach." In Intelligent Human Systems Integration (IHSI 2024) Integrating People and Intelligent Systems. AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004488.

Full text
Abstract:
Digital is constantly evolving with the appearance of connected objects and on top of the popularization today of artificial intelligence. One of the direct inductions remains the excessive proliferation of various kinds of attacks in computer systems. Hackers exploit these vulnerabilities to break in and attack systems with increasingly complex attacks. The consequences of intrusions are destructive and ruinous for businesses and organizations such as electronic ransom ware, data alteration and loss, financial and brand image loss.It is important for those involved in computer systems to equip any computer centre with adequate tools to prevent malicious individuals from accessing the systems. To remedy these setbacks, several IT tools are developed including IDS intrusion detection systems. IDS intrusion detection systems are devices designed to monitor a computer system, give alerts and trigger real-time counterattacks in the event of attacks. These intelligent systems use several detection approaches and various algorithms. The performance of the IDS is increased when the features dimensionality are reduced significantly.This study proposed feature dimensionality reduction techniques such as Principal Component Analysis (PCA) and Auto-Encoder (AE). The output from the reduced dimensional features are used to build machine Learning algorithms. The performance results is evaluated on the CSECICIDS2018 datasets. The proposed public intrusion data sets suffer from the Imbalance class. In order to handle this issue, we propose hybrid sampling technique by combining Over and undersampling technique.The performance results from the reduced features in terms of true positive, False positve, recall, precision, F-Measure, ROC Area, PRC Area show the better performance. In addition, the obtained results are compared with deep convolutional approach.
APA, Harvard, Vancouver, ISO, and other styles
8

Pohl, Johannes, and Andreas Noack. "Universal Radio Hacker." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3139937.3139951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Andrew. "Hawker, Hacker, Herald." In SIGGRAPH07: Special Interest Group on Computer Graphics and Interactive Techniques Conference. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/1280120.1280226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rao, Gatta Sambasiva, P. Naveen Kumar, P. Swetha, and G. BhanuKiran. "Security assessment of computer networks -an ethical hacker's perspective." In 2014 International Conference on Computer and Communications Technologies (ICCCT). IEEE, 2014. http://dx.doi.org/10.1109/iccct2.2014.7066756.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer hackers"

1

Dukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.

Full text
Abstract:
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used? What are the regulatory regimes that impact vehicular data use? Is the US close to harmonizing with other nations in the automotive data privacy? And will the risks of hackers lead to the “zombie car apocalypse” or to another avenue for ransomware? This report explores a number of these legal challenges and the unsettled aspects that arise in the world of automotive data
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography