Academic literature on the topic 'Hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hackers"
Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Full textOdemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Full textBátfai, Norbert, Renátó Besenczi, József Szabó, Péter Jeszenszky, András Buda, László Jármi, Rita Barbara Lovas, Marcell Kristóf Pál, Gergő Bogacsovics, and Enikő Tóthné Kovács. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (April 6, 2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.
Full textHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Full textCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Full textGuo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (April 28, 2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.
Full textAl-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (October 2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.
Full textScariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (September 1, 2022): E716. http://dx.doi.org/10.24215/16696581e716.
Full textBratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.
Full textBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Full textDissertations / Theses on the topic "Hackers"
Zubovych, A. "Are hackers outlaws or watchdogs?" Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/11384.
Full textWilmes, Justin Allen. "The Red Scare: The Evolution and Impact of Russian Computer Hackers." Miami University Honors Theses / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1146055290.
Full textObruch, Arseniy. "The hackers attacks and modern viruses." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13105.
Full textBarudy, G. Claudia, and A. Loreto Cristi. "Hackers: la identidad de un pirata postmoderno." Tesis, Universidad de Chile, 1999. http://repositorio.uchile.cl/handle/2250/136343.
Full textEl autor no autoriza el acceso a texto completo de su documento
Nuestra época se ha visto marcada por un ascendente proceso de globalización en el área de las comunicaciones. La rápida ampliación de las posibilidades de acceso a la comunicación vía Internet se ha constituido en el principal agente de este proceso. Por esto, consideramos que es muy importante poner atención a las relaciones comunicacionales que esta red genera. El hacker se instala en este contexto, nace y se desarrolla dentro de Internet, dedicado a investigar sistemas, obtener, intervenir o borrar información circulante a través de esta red.
Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.
Full textLockridge, Timothy Alan. "Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77355.
Full textPh. D.
Howlett, William IV. "The Rise of China's Hacking Culture: Defining Chinese Hackers." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/383.
Full textDELFANTI, ALESSANDRO. "GENOME HACKERS. REBEL BIOLOGY, OPEN SOURCE AND SCIENCE ETHIC." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/159641.
Full textTaylor, Paul Anthony. "Hackers : a case-study of the social shaping of computing." Thesis, University of Edinburgh, 1998. http://hdl.handle.net/1842/30821.
Full textViroli, Edoardo <1991>. "Hackers, cyberterrorismo e relazioni internazionali : Viaggio al centro della cibernetizzazione globale." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8219.
Full textBooks on the topic "Hackers"
Films for the Humanities (Firm) and Canadian Broadcasting Corporation, eds. Hackers. Princeton, N.J: Films for the Humanities and Sciences, 2005.
Find full textVerton, Dan. The hacker diaries: Confessions of teenage hackers. New York: McGraw-Hill/Osborne, 2002.
Find full textGoldstein, Emmanuel. Dear Hacker: Letters to the editor of 2600. Indianapolis, IN: Wiley Pub., 2010.
Find full textBook chapters on the topic "Hackers"
Calcutt, Andrew. "Hackers/slackers." In White Noise, 56–61. London: Palgrave Macmillan UK, 1999. http://dx.doi.org/10.1057/9780230373686_8.
Full textButler, Michael, and Jacob G. Oakley. "Developing Hackers." In The Business of Hacking, 95–128. Berkeley, CA: Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0174-7_6.
Full textDarling, Julie, and D. J. Cools. "[[Untitled]]." In Little Hackers, 2–33. New York: Routledge, 2024. http://dx.doi.org/10.4324/9781003501527-1.
Full textDi Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs, 1–4. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-13895-0_80-1.
Full textOakley, Jacob G. "Why Human Hackers?" In Professional Red Teaming, 15–28. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4309-1_2.
Full textDi Salvo, Philip. "Hackers and Whistleblowers." In The Palgrave Encyclopedia of Interest Groups, Lobbying and Public Affairs, 613–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-44556-0_80.
Full textD’Andrea, Vincenzo, Stefano De Paoli, and Maurizio Teli. "Open to Grok. How do Hackers’ Practices Produce Hackers?" In IFIP – The International Federation for Information Processing, 121–29. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09684-1_10.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 105–30. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Texts in Computer Science, 105–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_5.
Full textKizza, Joseph Migga. "Cyber Crimes and Hackers." In Guide to Computer Network Security, 107–32. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_5.
Full textConference papers on the topic "Hackers"
Vasconcelos, João Victor Alves. "Teste de Invasão: O segredo por trás de como funciona uma invasão hacker, a metodologia de invasão utilizada por hackers." In Conferência Connect Tech. Sociedade Brasileira de Computação, 2024. http://dx.doi.org/10.5753/connect.2024.238546.
Full textYafi, Eiad, Katya Yefimova, and Karen E. Fisher. "Young Hackers." In CHI '18: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3170427.3174363.
Full textFang, Zhen, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, and Hsinchun Chen. "Exploring key hackers and cybersecurity threats in Chinese hacker communities." In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 2016. http://dx.doi.org/10.1109/isi.2016.7745436.
Full textNyman, Linus. "Hackers on Forking." In OpenSym '14: The International Symposium on Open Collaboration. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2641580.2641590.
Full textEchenique, Federico, and Kevin He. "Screening p-Hackers." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538358.
Full textAl-Ramahi, Mohammad, Izzat Alsmadi, and Joshua Davenport. "Exploring hackers assets." In HotSoS '20: Hot Topics in the Science of Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3384217.3385619.
Full textBlocki, Jeremiah, Manuel Blum, and Anupam Datta. "GOTCHA password hackers!" In CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517312.2517319.
Full textBellin, David. "Young Hackers (abstract)." In the 1986 ACM fourteenth annual conference. New York, New York, USA: ACM Press, 1986. http://dx.doi.org/10.1145/324634.325385.
Full textBehere, Sagar, and Martin Törngren. "Educating Embedded Systems Hackers." In the WESE'14: Workshop. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2829957.2829958.
Full textRechavi, Amit, Tamar Berenblum, David Maimon, and Ido Sivan Sevilla. "Hackers Topology Matter Geography." In ASONAM '15: Advances in Social Networks Analysis and Mining 2015. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808797.2808873.
Full textReports on the topic "Hackers"
Vilbig, Kevin. Hack All The History! Hackers 1959 - 1991. Portland State University Library, June 2013. http://dx.doi.org/10.15760/honors.20.
Full textEisen, Stefan, and Jr. Network Warfare. It's Not Just for Hackers Anymore. Fort Belvoir, VA: Defense Technical Information Center, June 1995. http://dx.doi.org/10.21236/ada297897.
Full textLohn, Andrew. Hacking AI: A Primer for Policymakers on Machine Learning Cybersecurity. Center for Security and Emerging Technology, December 2020. http://dx.doi.org/10.51593/2020ca006.
Full textCary, Dakota. Academics, AI, and APTs. Center for Security and Emerging Technology, March 2021. http://dx.doi.org/10.51593/2020ca010.
Full textYilmaz, Ihsan, and Kenes Bulent. Digital Authoritarianism in Turkish Cyberspace: A Study of Deception and Disinformation by the AKP Regime’s AKtrolls and AKbots. Populism & Politics (P&P), November 2023. http://dx.doi.org/10.55271/pp0026.
Full textDukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.
Full textFrith, R. A. Geology, Hackett River, District of Mackenzie, Northwest Territories. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122787.
Full textFrith, R. A. Precambrian geology of the Hackett River area, District of Mackenzie, N.W.T. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1987. http://dx.doi.org/10.4095/122463.
Full textGreen, Crystal, Mariah Voutilainen, and Lauren Ziegler. Journeys in Family School Engagement. HundrED, December 2023. http://dx.doi.org/10.58261/zhac4043.
Full textMeghan Bennett, Meghan Bennett. Hacked clocks tell us how an important pollinator keeps time in changing world. Experiment, October 2016. http://dx.doi.org/10.18258/8047.
Full text