Journal articles on the topic 'Computer hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Full textHausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Full textHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Full textJamaluddin, Jamaluddin, El Rahmat Jaya Hulu, and Rimbun Siringoringo. "PENGONTROLAN KEAMANAN SISTEM KOMPUTER CLIENT DARI SERANGAN HACKER DAN VIRUS KOMPUTER SECARA JARAK JAUH (REMOTE SERVER) DENGAN MENGGUNAKAN SSH." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 7, no. 1 (April 30, 2023): 123–27. http://dx.doi.org/10.46880/jmika.vol7no1.pp123-127.
Full textBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Full textWarren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (August 7, 2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.
Full textMenkus, Belden. "Seattle computer hackers sentenced." Computer Fraud & Security Bulletin 1993, no. 9 (September 1993): 4. http://dx.doi.org/10.1016/0142-0496(93)90231-k.
Full textBratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.
Full textXu, Zhengchuan, Qing Hu, and Chenghong Zhang. "Why computer talents become computer hackers." Communications of the ACM 56, no. 4 (April 2013): 64–74. http://dx.doi.org/10.1145/2436256.2436272.
Full textFerenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (September 2022): 124–29. http://dx.doi.org/10.58679/ii52272.
Full textRees, Frank. "New perspective on computer hackers." Computer Fraud & Security 1996, no. 6 (June 1996): 8. http://dx.doi.org/10.1016/s1361-3723(96)90287-0.
Full textNichol, Sandy. "FBI sting targets computer hackers." Computers & Security 18, no. 5 (January 1999): 433. http://dx.doi.org/10.1016/s0167-4048(99)80094-7.
Full textCheng, Xiaogang, Ren Guo, and Yonghong Chen. "Randomized quantum oblivious transfer with application in hacker-resistant computation." International Journal of Quantum Information 16, no. 04 (June 2018): 1850039. http://dx.doi.org/10.1142/s0219749918500399.
Full textHolt, Thomas J., Joshua D. Freilich, and Steven M. Chermak. "Exploring the Subculture of Ideologically Motivated Cyber-Attackers." Journal of Contemporary Criminal Justice 33, no. 3 (April 4, 2017): 212–33. http://dx.doi.org/10.1177/1043986217699100.
Full textRahmat, Dadan, Irman Suherman, Zahara Muharraran, and Aulia Khotimah Husna. "PERANCANGAN DE-MILITARISED ZONE (DMZ) BERBASIS INTRUSION DETECTION SYSTEM (IDS) PADA INFRASTRUKTUR JARINGAN KOMPUTER PEMERINTAH DAERAH KOTA SUKABUMI." INFOTECH journal 10, no. 1 (January 18, 2024): 1–11. http://dx.doi.org/10.31949/infotech.v10i1.7929.
Full textMcCormack, Michael P. "Computer hackers turn to pager systems." Computer Audit Update 1996, no. 11 (November 1996): 6. http://dx.doi.org/10.1016/0960-2593(96)88245-0.
Full textMeyer, Helen. "Computer hackers turn to pager systems." Computers & Security 15, no. 7 (January 1996): 585–86. http://dx.doi.org/10.1016/s0167-4048(97)88116-3.
Full textMcCormack, Michael. "Computer hackers turn to pager systems." Computer Fraud & Security 1996, no. 11 (November 1996): 3. http://dx.doi.org/10.1016/1361-3723(96)88925-1.
Full textVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textDickman, Steven. "Hackers breach computer security across three continents." Nature 329, no. 6137 (September 1987): 277. http://dx.doi.org/10.1038/329277b0.
Full textVoiskounsky, Alexander E., and Olga V. Smyslova. "Flow-Based Model of Computer Hackers' Motivation." CyberPsychology & Behavior 6, no. 2 (April 2003): 171–80. http://dx.doi.org/10.1089/109493103321640365.
Full textZaród, Marcin. "Hacking Collective as a Trading Zone. Notes from the Ethnography of Hackerspaces in Poland." Kultura i Edukacja 110, no. 4 (December 31, 2015): 134–51. http://dx.doi.org/10.15804/kie.2015.04.08.
Full textButler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (March 1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.
Full textHussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS." Journal of Correctional Issues 5, no. 1 (August 16, 2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.
Full textHunter, Philip. "LexisNexis hackers sentenced." Computer Fraud & Security 2007, no. 4 (April 2007): 19–20. http://dx.doi.org/10.1016/s1361-3723(07)70063-5.
Full textMansfield-Devine, Steve. "Hacking the hackers." Computer Fraud & Security 2009, no. 6 (June 2009): 10–13. http://dx.doi.org/10.1016/s1361-3723(09)70073-9.
Full textSchneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (November 2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.
Full textZhou, Zhengchun, and Wenyao Shen. "HoneyPot : Enhancing Cybersecurity through a computer simulation technology." Highlights in Science, Engineering and Technology 105 (June 30, 2024): 97–101. http://dx.doi.org/10.54097/0q8h9k30.
Full textTurgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (February 2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.
Full textBegishev, Ildar, Zarina Khisamova, and Sergey Nikitin. "The Organization of Hacking Community: Criminological and Criminal Law Aspects." Russian Journal of Criminology 14, no. 1 (February 28, 2020): 96–105. http://dx.doi.org/10.17150/2500-4255.2020.14(1).96-105.
Full textRaheman, Fazal, Tejas Bhagat, Brecht Vermeulen, and Peter Van Daele. "Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis." Future Internet 14, no. 8 (July 30, 2022): 238. http://dx.doi.org/10.3390/fi14080238.
Full textHaigh, Thomas. "When hackers were heroes." Communications of the ACM 64, no. 4 (April 2021): 28–34. http://dx.doi.org/10.1145/3451227.
Full textMunro, Ken. "Give hackers the boot." Infosecurity Today 2, no. 6 (November 2005): 46. http://dx.doi.org/10.1016/s1742-6847(05)70347-5.
Full textWong, Ken. "The Hackers and Computer Crime against Financial Institutions." EDPACS 14, no. 5 (November 1986): 1–7. http://dx.doi.org/10.1080/07366988609450384.
Full textDavidson, Clive. "Cyberpunk: Outlaws and hackers on the computer frontier." Computer Fraud & Security Bulletin 1992, no. 2 (February 1992): 20. http://dx.doi.org/10.1016/0142-0496(92)90155-c.
Full textHancock, Bill. "Hackers Breach Firewall-1." Computers & Security 19, no. 6 (October 2000): 496–97. http://dx.doi.org/10.1016/s0167-4048(00)06022-3.
Full textMeyer, John. "Rich pickings for hackers." Computers & Security 17, no. 8 (January 1998): 717. http://dx.doi.org/10.1016/s0167-4048(98)90343-1.
Full textCollinson, Helen. "War declared on hackers." Computers & Security 14, no. 3 (January 1995): 217. http://dx.doi.org/10.1016/0167-4048(95)90373-9.
Full textCollinson, Helen. "Hackers crack BSykB code." Computers & Security 14, no. 5 (January 1995): 409. http://dx.doi.org/10.1016/0167-4048(96)90033-4.
Full textConway, Maura. "Hackers as terrorists? why it doesn't compute." Computer Fraud & Security 2003, no. 12 (December 2003): 10–13. http://dx.doi.org/10.1016/s1361-3723(03)00007-1.
Full textTeixeira, Adriano Canabarro, Fernanda Batistela, and Adriana Dickel. "Computer Programming and Auxiliary Learning Processes: Hackers School Case." Creative Education 08, no. 07 (2017): 1001–19. http://dx.doi.org/10.4236/ce.2017.87073.
Full textAlper, J. "COMPUTER SCIENCE:From Army of Hackers, an Upstart Operating System." Science 282, no. 5396 (December 11, 1998): 1976–79. http://dx.doi.org/10.1126/science.282.5396.1976.
Full textFreeman, Edward H. "Computer Hackers and Search and Seizure:United States v. Jarrett." Information Systems Security 16, no. 4 (September 4, 2007): 239–43. http://dx.doi.org/10.1080/10658980701585306.
Full textMarkoff, John, and Andrew Pollack. "Computer “Hackers” viewed as a threat to phone security." Computers & Security 7, no. 5 (October 1988): 526. http://dx.doi.org/10.1016/0167-4048(88)90309-4.
Full textSparkes, Matthew. "Hackers can steal data by changing computer CPU speed." New Scientist 262, no. 3491 (May 2024): 13. http://dx.doi.org/10.1016/s0262-4079(24)00902-3.
Full textLindup, Ken. "Hackers for hire." Network Security 1996, no. 1 (January 1996): 18. http://dx.doi.org/10.1016/s1353-4858(96)90171-3.
Full textSmith, G. Stevenson. "Management models for international cybercrime." Journal of Financial Crime 22, no. 1 (January 5, 2015): 104–25. http://dx.doi.org/10.1108/jfc-09-2013-0051.
Full textGengler, Barbara. "Security bill to fight hackers." Computer Fraud & Security 1999, no. 8 (August 1999): 5. http://dx.doi.org/10.1016/s1361-3723(99)80045-1.
Full textNichol, Sandy. "Hackers open door to Windows." Computers & Security 18, no. 6 (January 1999): 522. http://dx.doi.org/10.1016/s0167-4048(99)90855-6.
Full textCollinson, Helen. "Hot on the hackers trail." Computers & Security 14, no. 3 (January 1995): 215. http://dx.doi.org/10.1016/0167-4048(95)90365-8.
Full text