To see the other types of publications on this topic, follow the link: Hackers.

Journal articles on the topic 'Hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.

Full text
Abstract:
Supplementing the literature on information sharing between firms, the paper seeks to understand information sharing between hackers and how firms defend against increasingly sophisticated hackers. Each hacker seeks financial gain, mutually beneficial information exchange, and reputation gain. The two hackers’ attack and the firm’s defense are inverse U shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The first hacker’s information sharing increases as both hackers focus increasingly on reputation gain. The two hacke
APA, Harvard, Vancouver, ISO, and other styles
2

Odemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.

Full text
Abstract:
This research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established, and the hacker also escalated his rights on the server. Therefore, the honeypot server setup has been designed to reveal the correlation of a hacker’s actions with that of the hacker’s experience, personality, expertise, and psychology. To the best of our knowledge, such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in th
APA, Harvard, Vancouver, ISO, and other styles
3

Bátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.

Full text
Abstract:
Klasszikus értelmezésben a hacker a kifinomult problémákat kifinomultan kezelni képes szakértő. Tipikusan programozó, de ugyanúgy mutathat hacker attitűdöket, lehet hacker egy művész, egy feltaláló, egy tudós vagy egy sportoló is. Ebben a cikkben azt mutatjuk be, hogyan lehet hacker egy e-sportoló játékos. A hacker természetéből fakadóan autodidakta, de a tanulási folyamat formális eszközökkel segíthető, katalizálható. A mi ilyen formális keretünk a Debreceni Egyetem Atlétikai Clubjának (DEAC) nemrégiben megalakított e-sport szakosztálya, a cikkben bemutatott DEAC-Hackers. 
 
 ---&#x
APA, Harvard, Vancouver, ISO, and other styles
4

Hausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.

Full text
Abstract:
One firm defends proactively or retroactively against a first hacker, and thereafter against a second hacker, in four four-period games. The hackers share information for financial gain, mutual advantage, and reputation. The first hacker’s attack and information sharing are strategic substitutes. When the firm is proactive in period 1, the first hacker’s information sharing decreases as the second hacker’s attack cost increases. The deterring effort in eight corner solutions is proportional to the deterred player’s valuation and inverse proportional to the deterred player’s unit effort cost. W
APA, Harvard, Vancouver, ISO, and other styles
5

Nycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.

Full text
Abstract:
Hacker forums are places for new hackers, newbies, to find information on hacking practices and to become part of a community. This study contributes to understanding ways newbies try to become accepted experienced computer hackers. Using Pierre Bourdieu’s Field Theory and its concepts, 500 threads from a forum were analyzed to see how newbies attempt to gain a place in the hacking field amongst experienced hackers. Thematic analysis methods were used to demonstrate how the forum’s field, and those within it, behaved to obtain what Bourdieu describes as cultural and social capital to obtain kn
APA, Harvard, Vancouver, ISO, and other styles
6

Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.

Full text
Abstract:
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together wi
APA, Harvard, Vancouver, ISO, and other styles
7

Deepti, Chaudhari1 Hetvi Patel2 Anushri Ghosh3 Neha Patil4 Vikas Pawar5 Yogesh Sonawane6. "A Survey on Image steganography using Genetic Algorithm." Scandinavian Journal of Information Systems 35, no. 1 (2023): 131–35. https://doi.org/10.5281/zenodo.7858158.

Full text
Abstract:
Nowadays technologies are increasing very rapidly, and with the rise of these technologies the world is now open to everyone, and nothing is hidden. This gives an advantage to the hackers to hack the information and misuse it. Using our personal data for malicious purposes is very harmful for everyone. In this open world some of the data should be very confidential and should not be able to be hacked by the hackers. Here, in our work, we have designed the model that would hide the confidential data from the hackers in such a way that even if the hacker retrieves the data or file, but the hacke
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.

Full text
Abstract:
<p>Hacker culture is generally regarded as a subculture, and the public has a high degree of misunderstanding towards hackers. The media reports sometimes depict hackers overly negatively, possibly because hackers could gain a dominant position in the age of information and, therefore, threaten the existing balance of social power distribution. Moreover, those reports, whether intentionally or not, misunderstand the meaning of “hackers”: “Hackers” are people who want to identify and solve problems directly and effectively, but “crackers” are those who cause problems for society.</p&gt
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.

Full text
Abstract:
Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes
APA, Harvard, Vancouver, ISO, and other styles
10

Scariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.

Full text
Abstract:
El siguiente artículo está basado en el capítulo tres de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza. Aquí analizamos el potencial revolucionario de les hackers frente al actual sistema económico, político e informático que gobierna el mundo: el capitalismo cibernético (Tiqqun, 2016). Centrándonos en el aspecto político y filosófico de la cultura hacker. En efecto, buscamos responder a las siguientes preguntas: ¿Pueden los/as hackers constituirse en una clase política? ¿Por qué pensar a los/as hackers en
APA, Harvard, Vancouver, ISO, and other styles
11

Bratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Full text
Abstract:
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools
APA, Harvard, Vancouver, ISO, and other styles
13

Atul, Kulkarni, and Mukhopadhyay Debajyoti. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111–14. https://doi.org/10.11591/ijeecs.v9.i1.pp111-114.

Full text
Abstract:
Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets, (ii) anal
APA, Harvard, Vancouver, ISO, and other styles
14

Bellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Full text
Abstract:
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interes
APA, Harvard, Vancouver, ISO, and other styles
15

Warren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kulkarni, Atul, and Debajyoti Mukhopadhyay. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp111-114.

Full text
Abstract:
<p>Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets,
APA, Harvard, Vancouver, ISO, and other styles
17

Isnarti, Rika. "The Role of China’s Patriotic Hackers and Their Relationship to the Government." Andalas Journal of International Studies (AJIS) 4, no. 2 (2015): 161. http://dx.doi.org/10.25077/ajis.4.2.161-180.2015.

Full text
Abstract:
China is one of countries around the world known for the use of patriotic hackers who conduct many cyber-attacks. Patriotic hackers tend to be linked to nationalist movements or work for the government. For example, when ethnic Chinese were blamed for violent riots in Indonesia in 1998, Chinese patriotic hackers attacked Indonesian government websites in protest. Patriotic hackers also blocked CNN’s website during Beijing Olympics in 2008 because it reported protests in Tibet and reported bad news about China as Olympic host. They also attacked Vietnamese websites reporting conflict with China
APA, Harvard, Vancouver, ISO, and other styles
18

Mohsin, Rashid Shaikh, and Sunil Sangle Harshal. "Moral Hacking & Hacking Assaults." Recent Innovations in Wireless Network Security 6, no. 1 (2023): 1–5. https://doi.org/10.5281/zenodo.10039412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Laksmiati, Dewi. "Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 1 (2023): 38–45. http://dx.doi.org/10.47709/cnahpc.v5i1.1991.

Full text
Abstract:
The digital world has seen a significant increase in security threats in recent years, with hacker attacks on websites being a major concern in cybersecurity. One platform that is particularly vulnerable is WordPress, which is widely used and therefore a popular target for hackers. About 95.62% hacked website in 2021 is WordPress based site. Therefore, to improve website security we conducted a vulnerability assessment on a WordPress based website, in order to identify vulnerabilities that may be exploited by hackers. To do the vulnerability assessment, we used the network-based scanner based
APA, Harvard, Vancouver, ISO, and other styles
20

Manik, Burju Manik, and Imran Lubis. "Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (2021): 34–41. http://dx.doi.org/10.35447/jikstra.v3i1.356.

Full text
Abstract:
Research to install IPCop and honeypot on server computers and implement IPCop by way of configuration to protect the server from unauthorized parties. The software used in this research is IPCop, Manjaro Linux, Shootpress, Windows 10, and Virtual Box. The results of this study indicate that the implementation of IPCop as a security system on the server can be done and can run well. IPCop is able to protect servers from hacker attacks very well, even using IPCop hackers are not able to ping the server, so hackers cannot find out information about the target server. Honeypot implementation as a
APA, Harvard, Vancouver, ISO, and other styles
21

Renushka, Madarie. "Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of Hackers." International Journal of Cyber Criminology 11, no. 1 (2017): 78–97. https://doi.org/10.5281/zenodo.495773.

Full text
Abstract:
<em>Although much has been written on topic of hacker motivations, little empirical research has been conducted and even less research has attempted to quantify hackers’ motivations. The present study analyses relationships between the frequency of several hacking behaviours and motivations to hack in a sample of male hackers and potential hackers. Motivations frequently recurring in the literature are assessed and Schwartz´s (1992) Theory of Motivational Types of Values is applied. A preference for self-transcendence and openness to change values was found in the whole sample. Intellectual ch
APA, Harvard, Vancouver, ISO, and other styles
22

Dogra, Mrs Shallu, Nitin Singh, and Ayush Sahil. "A REVIEW PAPER ON ETHICAL HACKING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37588.

Full text
Abstract:
Ethical Hacking is a proactive approach to cybersecurity that involves authorizing and systematically testing information systems to find vulnerabilities before they can be exploited by criminals. Ethical hackers are network and computer experts who attack security systems on behalf of their owners, looking for vulnerabilities that can be exploited by malicious hackers. The explosive growth of the Internet has given rise to many good things, including electronic commerce, email, collaborative computing, and new areas of advertising and information distribution. Ethical hacking, also known as p
APA, Harvard, Vancouver, ISO, and other styles
23

Wu, Yong, Junlin Duan, Tao Dai, and Dong Cheng. "Managing Security Outsourcing in the Presence of Strategic Hackers." Decision Analysis 17, no. 3 (2020): 235–59. http://dx.doi.org/10.1287/deca.2019.0406.

Full text
Abstract:
Nowadays, firms tend to outsource security operations to professional managed security service providers (MSSPs) as a result of the sophistication of strategic hackers. Thus, how an MSSP makes security decisions according to a strategic hacker’s action is worth researching. Constructing a contract theory model, this paper examines the interaction between an MSSP and a strategic hacker based on both parties’ characteristics. We find that the hacker will give up less valuable information assets, and thus not all information assets are worth protecting for the MSSP. For both parties, their optima
APA, Harvard, Vancouver, ISO, and other styles
24

Al-Tarawneh, Ahmed, and Ja’afer Al-Saraireh. "Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm." Journal of Intelligent & Fuzzy Systems 40, no. 6 (2021): 12321–37. http://dx.doi.org/10.3233/jifs-210458.

Full text
Abstract:
Twitter is one of the most popular platforms used to share and post ideas. Hackers and anonymous attackers use these platforms maliciously, and their behavior can be used to predict the risk of future attacks, by gathering and classifying hackers’ tweets using machine-learning techniques. Previous approaches for detecting infected tweets are based on human efforts or text analysis, thus they are limited to capturing the hidden text between tweet lines. The main aim of this research paper is to enhance the efficiency of hacker detection for the Twitter platform using the complex networks techni
APA, Harvard, Vancouver, ISO, and other styles
25

Jeong, Sarah, and Colin McSwiggen. "Hackers!" XRDS: Crossroads, The ACM Magazine for Students 20, no. 4 (2014): 38–42. http://dx.doi.org/10.1145/2604998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hollinger, Richard C. "Hackers." ACM SIGCAS Computers and Society 21, no. 1 (1991): 6–17. http://dx.doi.org/10.1145/122246.122248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wark, McKenzie. "Hackers." Theory, Culture & Society 23, no. 2-3 (2006): 320–22. http://dx.doi.org/10.1177/026327640602300242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Maxigas. "Hackers against technology: Critique and recuperation in technological cycles." Social Studies of Science 47, no. 6 (2017): 841–60. http://dx.doi.org/10.1177/0306312717736387.

Full text
Abstract:
I offer an interpretation of hackers’ technological choices through a theoretical framework of critique and recuperation in technological cycles, building on prior research that brings the pragmatic sociology of Boltanski and Chiapello to bear on matters in Science and Technology Studies. I argue that contextualizing technology choices in the development of capitalism through innovation illuminates their political significance. I start with the counterintuitive observation that some browser extensions popular with hackers, like RequestPolicy, make it considerably harder for them to look at web
APA, Harvard, Vancouver, ISO, and other styles
29

Dudchik, Andrei Yu. "Partisans go cyber: The hacker ethic and partisans’ legacy." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 322–39. http://dx.doi.org/10.21638/spbu17.2023.209.

Full text
Abstract:
The article discusses the role of hackers and hacktivists in modern hybrid conflicts, in particular the ‘localization’ patterns of hackerism, by focusing on the case of the Belarusian hacker group Cyber Partisans. The study shows the significance of the partisan movement for modern Belarusian identity and historical memory and discusses the attempts of appropriation of this topic by various political actors. The comparison between hacktivism and partisan warfare holds a certain heuristic potential, making it possible to build conceptual categories for the analysis of the hacktivists’ practices
APA, Harvard, Vancouver, ISO, and other styles
30

Aguado, Alexandre Garcia, and Isabel Alvarez Canovas. "Cultura hacker e educação: percepções dos hackers sobre a vivência de elementos de sua cultura nas escolas." Perspectiva 39, no. 3 (2021): 1–18. http://dx.doi.org/10.5007/2175-795x.2021.e81052.

Full text
Abstract:
Partindo da compreensão de que vivemos em sociedades em que as possibilidades e as opressões, em alguma medida, estão relacionadas às dinâmicas tecnológicas, e conscientes da necessidade de os processos educativos colocarem tais dinâmicas em perspectiva, neste artigo voltamos nosso olhar para os hackers e a percepção que possuem sobre a possibilidade de vivência de elementos da sua cultura nas escolas. Compreender quais elementos da cultura hacker, na percepção dos hackers de distintos movimentos e países, deveriam fazer parte do ambiente escolar é o objetivo principal deste trabalho. Um quest
APA, Harvard, Vancouver, ISO, and other styles
31

Etuh, Emmanuel, Francis S. Bakpo, George E. Okereke, and David Omagu. "Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem." Computer Science & Engineering: An International Journal 13, no. 4 (2023): 01–19. http://dx.doi.org/10.5121/cseij.2023.13401.

Full text
Abstract:
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the target domain on which the developed model will be deployed. Social media platform has experienced more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two possible ways. The first is to use the activities of the user while the second is to use the supplied details the user registered the account with. To adequately identify a social media user as hacker proactively, there are relevant user details called features that can be used to d
APA, Harvard, Vancouver, ISO, and other styles
32

Ms., Apurva Saxena*1 &. Dr.Anubha Dubey2. "KERBEROS AUTHENTICATION MODEL FOR DATA SECURITY IN CLOUD COMPUTING USING HONEY-POT." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 8 (2019): 35–44. https://doi.org/10.5281/zenodo.3367428.

Full text
Abstract:
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in a Cloud environment where anything like technology, tool, and the result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. This paper presents the concept of a high-interaction honeypot, Kerberos authentication system as a service in a cloud environment to implement the benefits of, such service to ably distinguish between hackers an
APA, Harvard, Vancouver, ISO, and other styles
33

Ulrich, Frank, Sune Müller, and Stephen Flowers. "The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication." Communications of the Association for Information Systems 52 (2023): 988–1016. http://dx.doi.org/10.17705/1cais.05246.

Full text
Abstract:
Underground hacking has evolved from its early countercultural roots to become a complex and varied phenomenon. By combining a historical review of the literature with a content analysis of 30 years of underground hacker communication, we show that hacking has evolved in three waves to embrace learning and creativity, intrusion and crime, as well as politics and cyberwarfare. We uncover a paradoxical relationship between hackers and society at large where underground hacking is considered a digital crime while at the same time inspiring and driving corporate innovation, cybersecurity, and even
APA, Harvard, Vancouver, ISO, and other styles
34

Turgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hathaway, Melissa. "Power Hackers." Scientific American 303, no. 4 (2010): 16. http://dx.doi.org/10.1038/scientificamerican1010-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Butler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Papathéodorou, Aris. "Hackers ouverts." EcoRev' N° 16, no. 2 (2004): 57–61. http://dx.doi.org/10.3917/ecorev.016.0057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Stephenson, Peter. "Hiring Hackers." Information Systems Security 8, no. 2 (1999): 10–13. http://dx.doi.org/10.1201/1086/43305.8.2.19990601/31059.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Crawley, Adrian. "Hiring hackers." Network Security 2016, no. 9 (2016): 13–15. http://dx.doi.org/10.1016/s1353-4858(16)30088-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ball, Philip. "Medical hackers." Lancet 388, no. 10044 (2016): 554–55. http://dx.doi.org/10.1016/s0140-6736(16)31223-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Highland, Harold Joseph. "Hackers revisited." Computers & Security 7, no. 4 (1988): 339. http://dx.doi.org/10.1016/0167-4048(88)90565-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Schneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kera, Denisa, Zack Denfeld, and Cathrine Kramer. "Food Hackers." Gastronomica 15, no. 2 (2015): 49–56. http://dx.doi.org/10.1525/gfc.2015.15.2.49.

Full text
Abstract:
The emergence of food collectives, as well as movements identifying with makerspace and hackerspace cultures such as Food Hacking Base and Hackteria, supports various experimental and playful practices, which are often participatory. We discuss a case study of foodhacking practices (the 2012 workshop in Prague on issues of spices and globalization) to identify the functions of such playful food prototypes. These practices paradoxically revive the original ideas of Jean Anthelme Brillat-Savarin’s 1825 The Physiology of Taste, fusing gastronomy with global politics, science, business, and even p
APA, Harvard, Vancouver, ISO, and other styles
44

Martínez-Cazalla, María Dolors. "Cazando hackers. Un regalo del ‘convidado de piedra’." Revista de Humanidades de Valparaíso, no. 12 (December 20, 2018): 115. http://dx.doi.org/10.22370/rhv.2018.12.1344.

Full text
Abstract:
Podemos ser hackeados porque no hay preguntas indiscretas sino respuestas imprudentes. El objetivo principal de este artículo es aprender a crear las mejores respuestas posibles, las más prudentes, para permanecer los más seguros que podamos. Esto es lo que significa cazando hackers: pesar sobre qué pieza de información fue la relevante para el hacker y por qué lo fue esta y no, otra. Si podemos prever nuestras fisuras podremos mantener nuestra zona a salvo de los hackers. Con el fin de alcanzar este objetivo, analizaremos cómo funciona el lenguaje encriptado conocido como las Cartas Rusas. La
APA, Harvard, Vancouver, ISO, and other styles
45

Lange, Antoine, and Jean-François Henrotte. "Piratage éthique : mise à jour du cadre législatif pour une Belgique 2.0 ?" Pin Code N° 16, no. 4 (2023): 24–27. http://dx.doi.org/10.3917/pinc.016.0024.

Full text
Abstract:
En septembre 2019, dans le numéro inaugural de cette revue, avaient été abordées plusieurs des grandes questions juridiques que pose le piratage éthique ou le hacking éthique 1 . Pour rappel, cette pratique consiste à s’infiltrer au travers des systèmes de sécurité informatique d’une organisation, afin d’identifier les vulnérabilités 2 de ces systèmes et de les signaler à leurs propriétaires. Dans la culture anglo-saxonne, on dénomme ces acteurs « White Hat hackers », par opposition aux « Black Hat hackers » qui exploitent les vulnérabilités découvertes 3 . La Belgique ayant introduit une réfo
APA, Harvard, Vancouver, ISO, and other styles
46

Asarudeen, S. Sheik, and R. Priya R. Priya. "Recruitment of Ethical Hackers." International Journal of Scientific Research 2, no. 1 (2012): 145–46. http://dx.doi.org/10.15373/22778179/jan2013/50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Aji, Brian Budi. "TINDAKAN KEJAHATAN CYBER CRIME DALAM BENTUK DEFACE WEBSITE." Cyber Security dan Forensik Digital 6, no. 1 (2023): 25–29. http://dx.doi.org/10.14421/csecurity.2023.6.1.4049.

Full text
Abstract:
Deface website merupakan tindakan yang dilakukan oleh seorang hacker atau peretas dengan tujuan untuk merusak atau mengubah tampilan homepage sebuah website. Tindakan ini sering dilakukan untuk menodai reputasi organisasi atau individu, mengeksploitasi kerentanan dalam sistem keamanan, atau menyampaikan pesan politik atau ideologis. Mempertimbangkan permasalahan tersebut, artikel ini mengkaji evolusi kejahatan dunia maya dalam bentuk website yang terdegradasi dengan menggunakan metode tinjauan sistematis. Dalam diskusi ini dilakukan kajian sistematis dengan terlebih dahulu memilih dan menentuk
APA, Harvard, Vancouver, ISO, and other styles
48

Ferenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2022): 124–29. http://dx.doi.org/10.58679/ii52272.

Full text
Abstract:
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization’s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrowd the
APA, Harvard, Vancouver, ISO, and other styles
49

Darius-Antoniu, Ferenț. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2023): 124–29. https://doi.org/10.58679/II52272.

Full text
Abstract:
In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by cyber criminals to launch MitM (Man-in-the-Middle) attacks, DoS attacks, observing traffic in a computer network, etc. Hackers can affect the functioning of devices on an organization&rsquo;s local network (server, router, switch, etc.) by sending thousands of packets per second to the target device. CAM Overflow is an attack where a hacker aims to overcrow
APA, Harvard, Vancouver, ISO, and other styles
50

Nikitina, Svetlana. "Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture." Journal of Popular Culture 45, no. 1 (2012): 133–52. http://dx.doi.org/10.1111/j.1540-5931.2011.00915.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!