Journal articles on the topic 'Hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (May 2, 2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Full textOdemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Full textBátfai, Norbert, Renátó Besenczi, József Szabó, Péter Jeszenszky, András Buda, László Jármi, Rita Barbara Lovas, Marcell Kristóf Pál, Gergő Bogacsovics, and Enikő Tóthné Kovács. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (April 6, 2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.
Full textHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (March 2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Full textCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Full textGuo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (April 28, 2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.
Full textAl-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (October 2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.
Full textScariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (September 1, 2022): E716. http://dx.doi.org/10.24215/16696581e716.
Full textBratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (October 2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.
Full textBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Full textBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (February 12, 2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Full textKulkarni, Atul, and Debajyoti Mukhopadhyay. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 111. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp111-114.
Full textIsnarti, Rika. "The Role of China’s Patriotic Hackers and Their Relationship to the Government." Andalas Journal of International Studies (AJIS) 4, no. 2 (November 1, 2015): 161. http://dx.doi.org/10.25077/ajis.4.2.161-180.2015.
Full textWarren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (August 7, 2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.
Full textLaksmiati, Dewi. "Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 1 (January 19, 2023): 38–45. http://dx.doi.org/10.47709/cnahpc.v5i1.1991.
Full textManik, Burju Manik, and Imran Lubis. "Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (June 19, 2021): 34–41. http://dx.doi.org/10.35447/jikstra.v3i1.356.
Full textWu, Yong, Junlin Duan, Tao Dai, and Dong Cheng. "Managing Security Outsourcing in the Presence of Strategic Hackers." Decision Analysis 17, no. 3 (September 2020): 235–59. http://dx.doi.org/10.1287/deca.2019.0406.
Full textAl-Tarawneh, Ahmed, and Ja’afer Al-Saraireh. "Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm." Journal of Intelligent & Fuzzy Systems 40, no. 6 (June 21, 2021): 12321–37. http://dx.doi.org/10.3233/jifs-210458.
Full textMaxigas. "Hackers against technology: Critique and recuperation in technological cycles." Social Studies of Science 47, no. 6 (October 30, 2017): 841–60. http://dx.doi.org/10.1177/0306312717736387.
Full textJeong, Sarah, and Colin McSwiggen. "Hackers!" XRDS: Crossroads, The ACM Magazine for Students 20, no. 4 (June 2014): 38–42. http://dx.doi.org/10.1145/2604998.
Full textHollinger, Richard C. "Hackers." ACM SIGCAS Computers and Society 21, no. 1 (June 1991): 6–17. http://dx.doi.org/10.1145/122246.122248.
Full textWark, McKenzie. "Hackers." Theory, Culture & Society 23, no. 2-3 (May 2006): 320–22. http://dx.doi.org/10.1177/026327640602300242.
Full textDudchik, Andrei Yu. "Partisans go cyber: The hacker ethic and partisans’ legacy." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 322–39. http://dx.doi.org/10.21638/spbu17.2023.209.
Full textAguado, Alexandre Garcia, and Isabel Alvarez Canovas. "Cultura hacker e educação: percepções dos hackers sobre a vivência de elementos de sua cultura nas escolas." Perspectiva 39, no. 3 (June 28, 2021): 1–18. http://dx.doi.org/10.5007/2175-795x.2021.e81052.
Full textEtuh, Emmanuel, Francis S. Bakpo, George E. Okereke, and David Omagu. "Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem." Computer Science & Engineering: An International Journal 13, no. 4 (August 27, 2023): 01–19. http://dx.doi.org/10.5121/cseij.2023.13401.
Full textUlrich, Frank, Sune Müller, and Stephen Flowers. "The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication." Communications of the Association for Information Systems 52 (2023): 988–1016. http://dx.doi.org/10.17705/1cais.05246.
Full textTurgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (February 2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.
Full textHathaway, Melissa. "Power Hackers." Scientific American 303, no. 4 (October 2010): 16. http://dx.doi.org/10.1038/scientificamerican1010-16.
Full textButler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (March 1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.
Full textStephenson, Peter. "Hiring Hackers." Information Systems Security 8, no. 2 (June 1999): 10–13. http://dx.doi.org/10.1201/1086/43305.8.2.19990601/31059.3.
Full textCrawley, Adrian. "Hiring hackers." Network Security 2016, no. 9 (September 2016): 13–15. http://dx.doi.org/10.1016/s1353-4858(16)30088-5.
Full textBall, Philip. "Medical hackers." Lancet 388, no. 10044 (August 2016): 554–55. http://dx.doi.org/10.1016/s0140-6736(16)31223-5.
Full textHighland, Harold Joseph. "Hackers revisited." Computers & Security 7, no. 4 (August 1988): 339. http://dx.doi.org/10.1016/0167-4048(88)90565-2.
Full textSchneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (November 2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.
Full textKera, Denisa, Zack Denfeld, and Cathrine Kramer. "Food Hackers." Gastronomica 15, no. 2 (2015): 49–56. http://dx.doi.org/10.1525/gfc.2015.15.2.49.
Full textMartínez-Cazalla, María Dolors. "Cazando hackers. Un regalo del ‘convidado de piedra’." Revista de Humanidades de Valparaíso, no. 12 (December 20, 2018): 115. http://dx.doi.org/10.22370/rhv.2018.12.1344.
Full textLange, Antoine, and Jean-François Henrotte. "Piratage éthique : mise à jour du cadre législatif pour une Belgique 2.0 ?" Pin Code N° 16, no. 4 (December 18, 2023): 24–27. http://dx.doi.org/10.3917/pinc.016.0024.
Full textAsarudeen, S. Sheik, and R. Priya R. Priya. "Recruitment of Ethical Hackers." International Journal of Scientific Research 2, no. 1 (June 1, 2012): 145–46. http://dx.doi.org/10.15373/22778179/jan2013/50.
Full textAji, Brian Budi. "TINDAKAN KEJAHATAN CYBER CRIME DALAM BENTUK DEFACE WEBSITE." Cyber Security dan Forensik Digital 6, no. 1 (August 16, 2023): 25–29. http://dx.doi.org/10.14421/csecurity.2023.6.1.4049.
Full textFerenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (September 2022): 124–29. http://dx.doi.org/10.58679/ii52272.
Full textMohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.
Full textPrasetyo, Stefanus Eko, Haeruddin Haeruddin, and Kelvin Ariesryo. "Website Security System from Denial of Service attacks, SQL Injection, Cross Site Scripting using Web Application Firewall." Antivirus : Jurnal Ilmiah Teknik Informatika 18, no. 1 (May 10, 2024): 27–36. http://dx.doi.org/10.35457/antivirus.v18i1.3339.
Full textCheng, Xiaogang, Ren Guo, and Yonghong Chen. "Randomized quantum oblivious transfer with application in hacker-resistant computation." International Journal of Quantum Information 16, no. 04 (June 2018): 1850039. http://dx.doi.org/10.1142/s0219749918500399.
Full textEsquivel-Sada, Daphne. "Les matériaux vivants entre les mains hackers." Matériaux vivants 49 (2024): 81–98. http://dx.doi.org/10.4000/11yyb.
Full textNikitina, Svetlana. "Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture." Journal of Popular Culture 45, no. 1 (February 2012): 133–52. http://dx.doi.org/10.1111/j.1540-5931.2011.00915.x.
Full textScariot Esquivel, Nelson. "¿Qué es ser hacker?" Question/Cuestión 3, no. 71 (May 10, 2022): E661. http://dx.doi.org/10.24215/16696581e661.
Full textPradana Aji, Rio, Yudi Prayudi, and Ahmad Luthfi. "ANALYSIS OF BRUTE FORCE ATTACK LOGS TOWARD NGINX WEB SERVER ON DASHBOARD IMPROVED LOG LOGGING SYSTEM USING FORENSIC INVESTIGATION METHOD." Jurnal Teknik Informatika (Jutif) 4, no. 1 (February 10, 2023): 39–48. http://dx.doi.org/10.52436/1.jutif.2023.4.1.644.
Full textHolt, Thomas J., Joshua D. Freilich, and Steven M. Chermak. "Exploring the Subculture of Ideologically Motivated Cyber-Attackers." Journal of Contemporary Criminal Justice 33, no. 3 (April 4, 2017): 212–33. http://dx.doi.org/10.1177/1043986217699100.
Full textFitroh, Qorry Aina, and Bambang Sugiantoro. "PERAN ETHICAL HACKING DALAM MEMERANGI CYBERTHREATS." JURNAL ILMIAH INFORMATIKA 11, no. 01 (March 10, 2023): 27–31. http://dx.doi.org/10.33884/jif.v11i01.6593.
Full textGoldstein, Gordon, and Laurent Saintonge. "Les États hackers." Books N° 64, no. 4 (April 1, 2015): 37–38. http://dx.doi.org/10.3917/books.064.0037.
Full text