To see the other types of publications on this topic, follow the link: Computer hackers.

Journal articles on the topic 'Computer hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Full text
Abstract:
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However, no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test, a cyber expertise test, and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot, as well as the CTF event, were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers, it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers.
APA, Harvard, Vancouver, ISO, and other styles
2

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Full text
Abstract:
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hackers largely increase their information sharing, with two exceptions. The second hacker’s attack is deterred by the first hacker’s reputation gain. The firm’s defense against the second hacker increases in the second hacker’s unit cost, decreases in the second hacker’s information sharing effectiveness and utilization of joint sharing, and also decreases in both hackers’ reputation gain. Policy and managerial implications are provided.
APA, Harvard, Vancouver, ISO, and other styles
3

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Full text
Abstract:
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. When the first hacker exerts higher effort and shares more information, lower defense by the firm is sufficient to deter the second hacker. When the firm is deterred by the first hacker, the first hacker attacks less and shares more information than in the interior solution. For the first hacker and the firm, both players commonly prefer the disadvantaged player to move first. The exception is that the firm prefers to deter the first disadvantaged hacker when the two hackers benefit substantially from information sharing, reputation gain, or the second player is advantaged. The results contrast with the literature where the advantaged player commonly prefers to move first, with conflicting sequence preferences.
APA, Harvard, Vancouver, ISO, and other styles
4

Jamaluddin, Jamaluddin, El Rahmat Jaya Hulu, and Rimbun Siringoringo. "PENGONTROLAN KEAMANAN SISTEM KOMPUTER CLIENT DARI SERANGAN HACKER DAN VIRUS KOMPUTER SECARA JARAK JAUH (REMOTE SERVER) DENGAN MENGGUNAKAN SSH." METHOMIKA Jurnal Manajemen Informatika dan Komputerisasi Akuntansi 7, no. 1 (April 30, 2023): 123–27. http://dx.doi.org/10.46880/jmika.vol7no1.pp123-127.

Full text
Abstract:
Computer system security is very important to be considered by computer users to protect their computers from attacks such as hackers and computer viruses that can take data and damage the user's computer system. Hacker is a person or party who has the skill in breaking through and sneaking to access a computer without the user's permission and can take data and even damage the system on the user's computer. And a Computer Virus is a computer program that copies and inserts copies into the program and can damage the computer system. So that by using SSH (Secure Shell) can control and check computer security from hacker attacks and computer viruses without having to come to the location where there is a client computer or done remotely (Remote Server).
APA, Harvard, Vancouver, ISO, and other styles
5

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Full text
Abstract:
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers.We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers.We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?
APA, Harvard, Vancouver, ISO, and other styles
6

Warren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (August 7, 2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Menkus, Belden. "Seattle computer hackers sentenced." Computer Fraud & Security Bulletin 1993, no. 9 (September 1993): 4. http://dx.doi.org/10.1016/0142-0496(93)90231-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Zhengchuan, Qing Hu, and Chenghong Zhang. "Why computer talents become computer hackers." Communications of the ACM 56, no. 4 (April 2013): 64–74. http://dx.doi.org/10.1145/2436256.2436272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ferenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (September 2022): 124–29. http://dx.doi.org/10.58679/ii52272.

Full text
Abstract:
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the CAM table of a switch with MAC addresses, and TCP SYN Flood is an attack that can be launched against a server in the computer network.
APA, Harvard, Vancouver, ISO, and other styles
11

Rees, Frank. "New perspective on computer hackers." Computer Fraud & Security 1996, no. 6 (June 1996): 8. http://dx.doi.org/10.1016/s1361-3723(96)90287-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nichol, Sandy. "FBI sting targets computer hackers." Computers & Security 18, no. 5 (January 1999): 433. http://dx.doi.org/10.1016/s0167-4048(99)80094-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cheng, Xiaogang, Ren Guo, and Yonghong Chen. "Randomized quantum oblivious transfer with application in hacker-resistant computation." International Journal of Quantum Information 16, no. 04 (June 2018): 1850039. http://dx.doi.org/10.1142/s0219749918500399.

Full text
Abstract:
OT (Oblivious transfer) is a fundamental primitive in cryptography. But it is well known that in quantum cryptography, unconditionally secure OT is impossible. A variant of OT, i.e. randomized OT, is presented. We then show how to realize this variant in quantum cryptography with some security relaxations, which is inevitable because of the well-known impossible result in quantum cryptography. We also present a new secure computational model, namely HRC (Hacker-Resistant Computation) model. Since on today’s Internet there are more and more hackers and increased cyber threat, knowing how to protect the information and privacy stored on our computer and on cloud servers is very important, even when the computer or server has been breached by hackers. Finally, some interesting applications of the randomized OT variant to HRC are discussed.
APA, Harvard, Vancouver, ISO, and other styles
14

Holt, Thomas J., Joshua D. Freilich, and Steven M. Chermak. "Exploring the Subculture of Ideologically Motivated Cyber-Attackers." Journal of Contemporary Criminal Justice 33, no. 3 (April 4, 2017): 212–33. http://dx.doi.org/10.1177/1043986217699100.

Full text
Abstract:
Research on physical, that is, violent, terror attacks and extremism has increased dramatically over the last decade. The growth of the Internet and computer technology has also led to concern over the use of cyberattacks by ideologically motivated offenders to cause harm and further their political and social agendas. There is, however, a lack of empirical research on cyber-attackers limiting our knowledge of the factors that affect their behavior. This study addresses this empirical gap through a qualitative analysis of 10 interviews conducted with ideologically motivated Turkish computer hackers. The findings demonstrated that Turkish hackers motivated by an ideological agenda reflected the larger values of the hacker subculture, though the targets for their attacks were shaped directly by religious or political beliefs. We conclude by discussing in depth our findings and implications for counterterror and cybersecurity policy and practice.
APA, Harvard, Vancouver, ISO, and other styles
15

Rahmat, Dadan, Irman Suherman, Zahara Muharraran, and Aulia Khotimah Husna. "PERANCANGAN DE-MILITARISED ZONE (DMZ) BERBASIS INTRUSION DETECTION SYSTEM (IDS) PADA INFRASTRUKTUR JARINGAN KOMPUTER PEMERINTAH DAERAH KOTA SUKABUMI." INFOTECH journal 10, no. 1 (January 18, 2024): 1–11. http://dx.doi.org/10.31949/infotech.v10i1.7929.

Full text
Abstract:
De-Militarized Zone (DMZ) is a mechanism to protect the internal system from attacks by hackers or other parties who want to enter the system without access rights. The internal system is a confidential information system, the DMZ consists of all open ports that can be seen by outside parties so that hackers attack to crack the server that has the DMZ, so the hacker can only access hosts located in the DMZ. This is done so that internet users who can access the server cannot easily access and reach users on the local network. Within a network, hosts are most vulnerable to attacks that provide services to users outside. As computer networks develop in the Sukabumi City Regional Government, implementing a computer network security system model should be the main focus considering that there are many public services with high security risks and also the absence of a security system that can minimize data or application security risks on computer networks.
APA, Harvard, Vancouver, ISO, and other styles
16

McCormack, Michael P. "Computer hackers turn to pager systems." Computer Audit Update 1996, no. 11 (November 1996): 6. http://dx.doi.org/10.1016/0960-2593(96)88245-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Meyer, Helen. "Computer hackers turn to pager systems." Computers & Security 15, no. 7 (January 1996): 585–86. http://dx.doi.org/10.1016/s0167-4048(97)88116-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

McCormack, Michael. "Computer hackers turn to pager systems." Computer Fraud & Security 1996, no. 11 (November 1996): 3. http://dx.doi.org/10.1016/1361-3723(96)88925-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
APA, Harvard, Vancouver, ISO, and other styles
20

Dickman, Steven. "Hackers breach computer security across three continents." Nature 329, no. 6137 (September 1987): 277. http://dx.doi.org/10.1038/329277b0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Voiskounsky, Alexander E., and Olga V. Smyslova. "Flow-Based Model of Computer Hackers' Motivation." CyberPsychology & Behavior 6, no. 2 (April 2003): 171–80. http://dx.doi.org/10.1089/109493103321640365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zaród, Marcin. "Hacking Collective as a Trading Zone. Notes from the Ethnography of Hackerspaces in Poland." Kultura i Edukacja 110, no. 4 (December 31, 2015): 134–51. http://dx.doi.org/10.15804/kie.2015.04.08.

Full text
Abstract:
Development in computing resulted in creation of various communities devoted to nonformal computer science and engineering practices. The article examines Polish hackers, defined as a legal part of computer subcultures, and compares studies of hackers done abroad with findings from ethnography done in Poland. Applying actornetwork theory as a methodological framework, it also shows how hacking collectives contribute to ecologies of knowledge on different scales. This contributions, observed as various technological, scientific, or political actions, construct hackerspace as a trading zone. The paper also discusses problems with merging descriptions of hackers’ culture with ANT approach.
APA, Harvard, Vancouver, ISO, and other styles
23

Butler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (March 1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS." Journal of Correctional Issues 5, no. 1 (August 16, 2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.

Full text
Abstract:
This paper considers two different classes of computer hackers, with a special emphasis on disparate motivations of hacking. Hackers’ psychology widely discussed in the media is almost entirely unexplored by psychologists. In this study, hackers’ and crackers’ motivation is investigated, using the study of values scale. One hundred and fourteen participants completed our online research instrument. The study of values and demographic data were questioned. Participants were categorized as hackers and crackers through their responses on two items questioned in the demographic datasheet. Results indicated that hackers were found higher on the motivations of seeking knowledge, aesthetic sense, social interactions, and mysticism while crackers were found more motivated due to their economical and political interests. Findings suggested that hackers hack for the thrill of learning and gathering information to gain intelligence. Hackers hack to make society a better place to live. Compared to hackers, crackers are incapable of normal social interactions, and their hacking is based on the motivations of getting money and power.
APA, Harvard, Vancouver, ISO, and other styles
25

Hunter, Philip. "LexisNexis hackers sentenced." Computer Fraud & Security 2007, no. 4 (April 2007): 19–20. http://dx.doi.org/10.1016/s1361-3723(07)70063-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Mansfield-Devine, Steve. "Hacking the hackers." Computer Fraud & Security 2009, no. 6 (June 2009): 10–13. http://dx.doi.org/10.1016/s1361-3723(09)70073-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Schneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (November 2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Zhou, Zhengchun, and Wenyao Shen. "HoneyPot : Enhancing Cybersecurity through a computer simulation technology." Highlights in Science, Engineering and Technology 105 (June 30, 2024): 97–101. http://dx.doi.org/10.54097/0q8h9k30.

Full text
Abstract:
Honeypot technology is essentially a technique of deceiving attackers by deploying hosts, network services, or information as bait to lure them into attacking. This allows for the capture and analysis of attack behavior, speculating on attack intentions and motivations, enabling the defense to have a clear understanding of the security threats they face, and enhancing the security protection capabilities of the actual system through technical and management measures. A honeypot is like an intelligence gathering system. It is also possible to eavesdrop on the connections between hackers, collect various tools used by hackers, and gain control of their social networks.
APA, Harvard, Vancouver, ISO, and other styles
29

Turgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (February 2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Begishev, Ildar, Zarina Khisamova, and Sergey Nikitin. "The Organization of Hacking Community: Criminological and Criminal Law Aspects." Russian Journal of Criminology 14, no. 1 (February 28, 2020): 96–105. http://dx.doi.org/10.17150/2500-4255.2020.14(1).96-105.

Full text
Abstract:
Digital technology is an integral part of our daily lives. Regardless of whether we have a computer at home, whether we use the possibilities of obtaining state and municipal services in digital form or simply operate electronic gadgets, society's dependence on technology is increasing. A secure digital environment enhances trust and contributes to the creation of a stable and prosperous nation. Government and the business community are also taking advantage of the technological revolution through greater adoption and use of digital technologies. Traditional forms of crime have also evolved, as criminal associations increasingly use the information and telecommunications network - the Internet - to commit cybercrimes and increase their profits. Digital crime is developing at an incredibly fast pace, and new types of criminal acts are constantly emerging. So we need to keep up with digital technologies, understand the opportunities they create for cybercriminals, and how they can be used as a tool to combat cybercrime. The active use of digital technologies in all spheres of social life in the last three decades formed a background for the emergence of a special type of criminals - the so-called hackers. Criminal groups of hackers pose a public danger because, if they unite, they are capable of planning a large-scale computer attack which could target, among other things, critically important information infrastructure objects. Besides, hacker groups have become a real danger for both governments, large corporations, the military, and for private persons. The trend for blurring the boundaries between hacker groups and organized crime, that the experts predicted a few years ago, has now become a reality. In fact, it is possible to say that a new independent type of organized crime has emerged - the hacking community. These circumstances make it necessary to develop a special norm that provides for the liability for organizing hacking community or participating in it. Such a norm will allow for a complex approach to the criminal law counteraction against such criminal groups by ensuring an adequate criminal law assessment of the actions of the organizers and coordinators of hackers organizations.
APA, Harvard, Vancouver, ISO, and other styles
31

Raheman, Fazal, Tejas Bhagat, Brecht Vermeulen, and Peter Van Daele. "Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis." Future Internet 14, no. 8 (July 30, 2022): 238. http://dx.doi.org/10.3390/fi14080238.

Full text
Abstract:
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil.” Third-party permissions resulting in an attack surface (AS) and in-computer storage that computers mandate are key design elements that hackers exploit, formerly by remote malware installation and later by stealing personal data using authentication faking techniques. In legacy computers, the AS cannot be completely eliminated, nor can a connected device retain data offline, rendering fool-proof cybersecurity impossible. Although the architects of legacy computers made perfectly reasonable engineering trade-offs for their world, our world is very different. Zero vulnerability computing (ZVC) challenges the impossible with in-computer offline storage (ICOS) and Supra OS (SOS), to deliver comprehensive protection against vulnerabilities. The feasibility of ZVC is demonstrated in a tiny permanently computer-mounted hardware wallet, providing the first evidence of the complete obliteration of the AS. Malware cannot infect the ZVC device on account of lacking an AS, nor can personal data be hacked as they mostly remain offline, except for sporadic processing. Further research should explore whether ZVC can fully secure computers in more complex real-world scenarios and open a new epoch in the evolution of computers and the Internet.
APA, Harvard, Vancouver, ISO, and other styles
32

Haigh, Thomas. "When hackers were heroes." Communications of the ACM 64, no. 4 (April 2021): 28–34. http://dx.doi.org/10.1145/3451227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Munro, Ken. "Give hackers the boot." Infosecurity Today 2, no. 6 (November 2005): 46. http://dx.doi.org/10.1016/s1742-6847(05)70347-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wong, Ken. "The Hackers and Computer Crime against Financial Institutions." EDPACS 14, no. 5 (November 1986): 1–7. http://dx.doi.org/10.1080/07366988609450384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Davidson, Clive. "Cyberpunk: Outlaws and hackers on the computer frontier." Computer Fraud & Security Bulletin 1992, no. 2 (February 1992): 20. http://dx.doi.org/10.1016/0142-0496(92)90155-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hancock, Bill. "Hackers Breach Firewall-1." Computers & Security 19, no. 6 (October 2000): 496–97. http://dx.doi.org/10.1016/s0167-4048(00)06022-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Meyer, John. "Rich pickings for hackers." Computers & Security 17, no. 8 (January 1998): 717. http://dx.doi.org/10.1016/s0167-4048(98)90343-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Collinson, Helen. "War declared on hackers." Computers & Security 14, no. 3 (January 1995): 217. http://dx.doi.org/10.1016/0167-4048(95)90373-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Collinson, Helen. "Hackers crack BSykB code." Computers & Security 14, no. 5 (January 1995): 409. http://dx.doi.org/10.1016/0167-4048(96)90033-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Conway, Maura. "Hackers as terrorists? why it doesn't compute." Computer Fraud & Security 2003, no. 12 (December 2003): 10–13. http://dx.doi.org/10.1016/s1361-3723(03)00007-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Teixeira, Adriano Canabarro, Fernanda Batistela, and Adriana Dickel. "Computer Programming and Auxiliary Learning Processes: Hackers School Case." Creative Education 08, no. 07 (2017): 1001–19. http://dx.doi.org/10.4236/ce.2017.87073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Alper, J. "COMPUTER SCIENCE:From Army of Hackers, an Upstart Operating System." Science 282, no. 5396 (December 11, 1998): 1976–79. http://dx.doi.org/10.1126/science.282.5396.1976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Freeman, Edward H. "Computer Hackers and Search and Seizure:United States v. Jarrett." Information Systems Security 16, no. 4 (September 4, 2007): 239–43. http://dx.doi.org/10.1080/10658980701585306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Markoff, John, and Andrew Pollack. "Computer “Hackers” viewed as a threat to phone security." Computers & Security 7, no. 5 (October 1988): 526. http://dx.doi.org/10.1016/0167-4048(88)90309-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sparkes, Matthew. "Hackers can steal data by changing computer CPU speed." New Scientist 262, no. 3491 (May 2024): 13. http://dx.doi.org/10.1016/s0262-4079(24)00902-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lindup, Ken. "Hackers for hire." Network Security 1996, no. 1 (January 1996): 18. http://dx.doi.org/10.1016/s1353-4858(96)90171-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Smith, G. Stevenson. "Management models for international cybercrime." Journal of Financial Crime 22, no. 1 (January 5, 2015): 104–25. http://dx.doi.org/10.1108/jfc-09-2013-0051.

Full text
Abstract:
Purpose – The purpose of this paper is to identify how the management structure of cybercriminals has changed and will continue to be revised in the future as their criminal business models are modified. In the early days of hacktivism, a distinction was made between a “hacker” and a “cracker”. The hacker was considered someone who was interested in the vulnerabilities in a computer system, but they were not out to exploit these vulnerabilities for illicit gains. Today, this is no longer true, as loosely coordinated gangs of computer hackers exploit vulnerabilities of financial institutions and the public to steal and transfer money across borders without difficulty. Design/methodology/approach – The paper reviews legal cases dealing with the computer theft of assets from financial institutions and individuals. The focus is on external exploits of hackers not on employee’s theft of assets. It explores the management structure used by cybercriminals who have been caught and prosecuted by legal authorities in the USA and other countries. The paper discusses how this management structure has evolved from older traditional crime business models based on “family” relationships to morphing criminal gangs based in Russia, the Ukraine and other locations almost untouchable by the US legal authorities. These new criminal networks are based on knowledge relationships and quickly disappearing network connections. The paper concludes with a discussion regarding the management structure cybercriminals will follow in the future, as they continue their criminal activities. Findings – The study provides indications of a trend toward more complex management and organizational structures among cybergangs. Originality/value – Although there are many annual studies identifying the growth of cybercrime and the types of attacks being made, but there is not even a single study that shows how the cybercrime business model has changed over the past 20 years. From that perspective, the paper provides information of a changing and more effective business model for cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
48

Gengler, Barbara. "Security bill to fight hackers." Computer Fraud & Security 1999, no. 8 (August 1999): 5. http://dx.doi.org/10.1016/s1361-3723(99)80045-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Nichol, Sandy. "Hackers open door to Windows." Computers & Security 18, no. 6 (January 1999): 522. http://dx.doi.org/10.1016/s0167-4048(99)90855-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Collinson, Helen. "Hot on the hackers trail." Computers & Security 14, no. 3 (January 1995): 215. http://dx.doi.org/10.1016/0167-4048(95)90365-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography