Journal articles on the topic 'Hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Full textOdemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Full textBátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.
Full textHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Full textNycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.
Full textCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Full textDeepti, Chaudhari1 Hetvi Patel2 Anushri Ghosh3 Neha Patil4 Vikas Pawar5 Yogesh Sonawane6. "A Survey on Image steganography using Genetic Algorithm." Scandinavian Journal of Information Systems 35, no. 1 (2023): 131–35. https://doi.org/10.5281/zenodo.7858158.
Full textGuo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.
Full textAl-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.
Full textScariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.
Full textBratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.
Full textBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Full textAtul, Kulkarni, and Mukhopadhyay Debajyoti. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111–14. https://doi.org/10.11591/ijeecs.v9.i1.pp111-114.
Full textBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Full textWarren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.
Full textKulkarni, Atul, and Debajyoti Mukhopadhyay. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp111-114.
Full textIsnarti, Rika. "The Role of China’s Patriotic Hackers and Their Relationship to the Government." Andalas Journal of International Studies (AJIS) 4, no. 2 (2015): 161. http://dx.doi.org/10.25077/ajis.4.2.161-180.2015.
Full textMohsin, Rashid Shaikh, and Sunil Sangle Harshal. "Moral Hacking & Hacking Assaults." Recent Innovations in Wireless Network Security 6, no. 1 (2023): 1–5. https://doi.org/10.5281/zenodo.10039412.
Full textLaksmiati, Dewi. "Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 1 (2023): 38–45. http://dx.doi.org/10.47709/cnahpc.v5i1.1991.
Full textManik, Burju Manik, and Imran Lubis. "Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (2021): 34–41. http://dx.doi.org/10.35447/jikstra.v3i1.356.
Full textRenushka, Madarie. "Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of Hackers." International Journal of Cyber Criminology 11, no. 1 (2017): 78–97. https://doi.org/10.5281/zenodo.495773.
Full textDogra, Mrs Shallu, Nitin Singh, and Ayush Sahil. "A REVIEW PAPER ON ETHICAL HACKING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37588.
Full textWu, Yong, Junlin Duan, Tao Dai, and Dong Cheng. "Managing Security Outsourcing in the Presence of Strategic Hackers." Decision Analysis 17, no. 3 (2020): 235–59. http://dx.doi.org/10.1287/deca.2019.0406.
Full textAl-Tarawneh, Ahmed, and Ja’afer Al-Saraireh. "Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm." Journal of Intelligent & Fuzzy Systems 40, no. 6 (2021): 12321–37. http://dx.doi.org/10.3233/jifs-210458.
Full textJeong, Sarah, and Colin McSwiggen. "Hackers!" XRDS: Crossroads, The ACM Magazine for Students 20, no. 4 (2014): 38–42. http://dx.doi.org/10.1145/2604998.
Full textHollinger, Richard C. "Hackers." ACM SIGCAS Computers and Society 21, no. 1 (1991): 6–17. http://dx.doi.org/10.1145/122246.122248.
Full textWark, McKenzie. "Hackers." Theory, Culture & Society 23, no. 2-3 (2006): 320–22. http://dx.doi.org/10.1177/026327640602300242.
Full textMaxigas. "Hackers against technology: Critique and recuperation in technological cycles." Social Studies of Science 47, no. 6 (2017): 841–60. http://dx.doi.org/10.1177/0306312717736387.
Full textDudchik, Andrei Yu. "Partisans go cyber: The hacker ethic and partisans’ legacy." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 322–39. http://dx.doi.org/10.21638/spbu17.2023.209.
Full textAguado, Alexandre Garcia, and Isabel Alvarez Canovas. "Cultura hacker e educação: percepções dos hackers sobre a vivência de elementos de sua cultura nas escolas." Perspectiva 39, no. 3 (2021): 1–18. http://dx.doi.org/10.5007/2175-795x.2021.e81052.
Full textEtuh, Emmanuel, Francis S. Bakpo, George E. Okereke, and David Omagu. "Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem." Computer Science & Engineering: An International Journal 13, no. 4 (2023): 01–19. http://dx.doi.org/10.5121/cseij.2023.13401.
Full textMs., Apurva Saxena*1 &. Dr.Anubha Dubey2. "KERBEROS AUTHENTICATION MODEL FOR DATA SECURITY IN CLOUD COMPUTING USING HONEY-POT." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 8 (2019): 35–44. https://doi.org/10.5281/zenodo.3367428.
Full textUlrich, Frank, Sune Müller, and Stephen Flowers. "The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication." Communications of the Association for Information Systems 52 (2023): 988–1016. http://dx.doi.org/10.17705/1cais.05246.
Full textTurgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.
Full textHathaway, Melissa. "Power Hackers." Scientific American 303, no. 4 (2010): 16. http://dx.doi.org/10.1038/scientificamerican1010-16.
Full textButler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.
Full textPapathéodorou, Aris. "Hackers ouverts." EcoRev' N° 16, no. 2 (2004): 57–61. http://dx.doi.org/10.3917/ecorev.016.0057.
Full textStephenson, Peter. "Hiring Hackers." Information Systems Security 8, no. 2 (1999): 10–13. http://dx.doi.org/10.1201/1086/43305.8.2.19990601/31059.3.
Full textCrawley, Adrian. "Hiring hackers." Network Security 2016, no. 9 (2016): 13–15. http://dx.doi.org/10.1016/s1353-4858(16)30088-5.
Full textBall, Philip. "Medical hackers." Lancet 388, no. 10044 (2016): 554–55. http://dx.doi.org/10.1016/s0140-6736(16)31223-5.
Full textHighland, Harold Joseph. "Hackers revisited." Computers & Security 7, no. 4 (1988): 339. http://dx.doi.org/10.1016/0167-4048(88)90565-2.
Full textSchneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.
Full textKera, Denisa, Zack Denfeld, and Cathrine Kramer. "Food Hackers." Gastronomica 15, no. 2 (2015): 49–56. http://dx.doi.org/10.1525/gfc.2015.15.2.49.
Full textMartínez-Cazalla, María Dolors. "Cazando hackers. Un regalo del ‘convidado de piedra’." Revista de Humanidades de Valparaíso, no. 12 (December 20, 2018): 115. http://dx.doi.org/10.22370/rhv.2018.12.1344.
Full textLange, Antoine, and Jean-François Henrotte. "Piratage éthique : mise à jour du cadre législatif pour une Belgique 2.0 ?" Pin Code N° 16, no. 4 (2023): 24–27. http://dx.doi.org/10.3917/pinc.016.0024.
Full textAsarudeen, S. Sheik, and R. Priya R. Priya. "Recruitment of Ethical Hackers." International Journal of Scientific Research 2, no. 1 (2012): 145–46. http://dx.doi.org/10.15373/22778179/jan2013/50.
Full textAji, Brian Budi. "TINDAKAN KEJAHATAN CYBER CRIME DALAM BENTUK DEFACE WEBSITE." Cyber Security dan Forensik Digital 6, no. 1 (2023): 25–29. http://dx.doi.org/10.14421/csecurity.2023.6.1.4049.
Full textFerenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2022): 124–29. http://dx.doi.org/10.58679/ii52272.
Full textDarius-Antoniu, Ferenț. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2023): 124–29. https://doi.org/10.58679/II52272.
Full textNikitina, Svetlana. "Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture." Journal of Popular Culture 45, no. 1 (2012): 133–52. http://dx.doi.org/10.1111/j.1540-5931.2011.00915.x.
Full text