Academic literature on the topic 'Hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hackers"
Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Full textOdemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Full textBátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.
Full textHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Full textNycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.
Full textCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Full textDeepti, Chaudhari1 Hetvi Patel2 Anushri Ghosh3 Neha Patil4 Vikas Pawar5 Yogesh Sonawane6. "A Survey on Image steganography using Genetic Algorithm." Scandinavian Journal of Information Systems 35, no. 1 (2023): 131–35. https://doi.org/10.5281/zenodo.7858158.
Full textGuo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.
Full textAl-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.
Full textScariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.
Full textDissertations / Theses on the topic "Hackers"
Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.
Full textWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textObruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.
Full textBarudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.
Full textChavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.
Full textLockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.
Full textHowlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.
Full textDELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.
Full textTaylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.
Full textViroli, Edoardo <1991>. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.
Full textBooks on the topic "Hackers"
Films for the Humanities (Firm) and Canadian Broadcasting Corporation, eds. Hackers. Films for the Humanities and Sciences, 2005.
Find full textVerton, Dan. The hacker diaries: Confessions of teenage hackers. McGraw-Hill/Osborne, 2002.
Find full textBook chapters on the topic "Hackers"
Prictor, Megan. "Hackers and hacked." In Confidentiality, Privacy, and Data Protection in Biomedicine. Routledge, 2024. http://dx.doi.org/10.4324/9781003394518-12.
Full textButler, Michael, and Jacob G. Oakley. "Developing Hackers." In The Business of Hacking. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0174-7_6.
Full textCalcutt, Andrew. "Hackers/slackers." In White Noise. Palgrave Macmillan UK, 1999. http://dx.doi.org/10.1057/9780230373686_8.
Full textDarling, Julie, and D. J. Cools. "[[Untitled]]." In Little Hackers. Routledge, 2024. http://dx.doi.org/10.4324/9781003501527-1.
Full textDi Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-13895-0_80-1.
Full textOakley, Jacob G. "Why Human Hackers?" In Professional Red Teaming. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4309-1_2.
Full textDi Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-44556-0_80.
Full textMoallem, Abbas. "Cyberattackers versus Hackers." In Human Factors Analysis of 23 Cyberattacks. CRC Press, 2025. https://doi.org/10.1201/9781003461739-3.
Full textD’Andrea, Vincenzo, Stefano De Paoli, and Maurizio Teli. "Open to Grok. How do Hackers’ Practices Produce Hackers?" In IFIP – The International Federation for Information Processing. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09684-1_10.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security. Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.
Full textConference papers on the topic "Hackers"
Amadou, Abdoul Nasser Hassane, Anas Motii, and Mohammed Jouhari. "HC-HackerRank: Identifying Key Hackers in Cybercrime Social Network Forums." In 2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet). IEEE, 2024. https://doi.org/10.1109/commnet63022.2024.10793292.
Full textHassane Amadou, Abdoul Nasser, Anas Motii, Saida Elouardi, and El Houcine Bergou. "EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00073.
Full textFarrag, Mohamed, Samir G. Sayed, and Marwa Zamzam. "Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception." In 2024 7th International Conference on Signal Processing and Information Security (ICSPIS). IEEE, 2024. https://doi.org/10.1109/icspis63676.2024.10812608.
Full textRizk, Hamada, and Hirozumi Yamaguchi. "Hackers on the Go: Investigating Cyber Threats to Crowdsourced Mobility-on-Demand Platforms." In 2023 33rd International Conference on Computer Theory and Applications (ICCTA). IEEE, 2023. https://doi.org/10.1109/iccta60978.2023.10969231.
Full textFord, Irina, Ananta Soneji, Faris Bugra Kokulu, et al. "“Watching over the shoulder of a professional”: Why Hackers Make Mistakes and How They Fix Them." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00202.
Full textVasconcelos, João Victor Alves. "Teste de Invasão: O segredo por trás de como funciona uma invasão hacker, a metodologia de invasão utilizada por hackers." In Conferência Connect Tech. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/connect.2024.238546.
Full textYafi, Eiad, Katya Yefimova, and Karen E. Fisher. "Young Hackers." In CHI '18: CHI Conference on Human Factors in Computing Systems. ACM, 2018. http://dx.doi.org/10.1145/3170427.3174363.
Full textFang, Zhen, Xinyi Zhao, Qiang Wei, et al. "Exploring key hackers and cybersecurity threats in Chinese hacker communities." In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 2016. http://dx.doi.org/10.1109/isi.2016.7745436.
Full textNyman, Linus. "Hackers on Forking." In OpenSym '14: The International Symposium on Open Collaboration. ACM, 2014. http://dx.doi.org/10.1145/2641580.2641590.
Full textEchenique, Federico, and Kevin He. "Screening p-Hackers." In EC '22: The 23rd ACM Conference on Economics and Computation. ACM, 2022. http://dx.doi.org/10.1145/3490486.3538358.
Full textReports on the topic "Hackers"
Vilbig, Kevin. Hack All The History! Hackers 1959 - 1991. Portland State University Library, 2013. http://dx.doi.org/10.15760/honors.20.
Full textEisen, Stefan, and Jr. Network Warfare. It's Not Just for Hackers Anymore. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada297897.
Full textLohn, Andrew. Hacking AI: A Primer for Policymakers on Machine Learning Cybersecurity. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca006.
Full textCary, Dakota. Academics, AI, and APTs. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca010.
Full textYilmaz, Ihsan, and Kenes Bulent. Digital Authoritarianism in Turkish Cyberspace: A Study of Deception and Disinformation by the AKP Regime’s AKtrolls and AKbots. Populism & Politics (P&P), 2023. http://dx.doi.org/10.55271/pp0026.
Full textDukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, 2021. http://dx.doi.org/10.4271/epr2021019.
Full textAzar, Pablo, Sergio Olivas, and Nish D. Sinha. The Price of Processing: Information Frictions and Market Efficiency in DeFi. Federal Reserve Bank of New York, 2025. https://doi.org/10.59576/sr.1153.
Full textFrith, R. A. Geology, Hackett River, District of Mackenzie, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122787.
Full textFrith, R. A. Precambrian geology of the Hackett River area, District of Mackenzie, N.W.T. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122463.
Full textGreen, Crystal, Mariah Voutilainen, and Lauren Ziegler. Journeys in Family School Engagement. HundrED, 2023. http://dx.doi.org/10.58261/zhac4043.
Full text