Journal articles on the topic 'Hacking hack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hacking hack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Full textPratt, Mike. "Raptor Hacking." Wildlife Rehabilitation Bulletin 29, no. 1 (2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.
Full textAdzhakhunov, E. A., and O. V. Nikolaev. "UAV control hack system." Journal of «Almaz – Antey» Air and Space Defence Corporation, no. 2 (June 23, 2021): 35–41. http://dx.doi.org/10.38013/2542-0542-2021-2-35-41.
Full textAiken, Mary P., Julia C. Davidson, Michel Walrave, Koen S. Ponnet, Kirsty Phillips, and Ruby R. Farr. "Intention to Hack? Applying the Theory of Planned Behaviour to Youth Criminal Hacking." Forensic Sciences 4, no. 1 (2024): 24–41. http://dx.doi.org/10.3390/forensicsci4010003.
Full textPisarić, Milana. "The use of policeware to hack electronic evidence in Germany and the Netherlands." Nauka, bezbednost, policija 28, no. 1 (2023): 16–26. http://dx.doi.org/10.5937/nabepo28-43759.
Full textFidler, David P. "The U.S. Election Hacks, Cybersecurity, and International Law." AJIL Unbound 110 (2016): 337–42. http://dx.doi.org/10.1017/aju.2017.5.
Full textUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, et al. "The Impacts of Ethical Hacking and its Security Mechanisms." Pakistan Journal of Engineering and Technology 5, no. 4 (2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Full textHussain, Syed Muzaffar. "AN INSIGHT INTO THE DIFFERENCES OF PSYCHOLOGICAL DISPARATE MOTIVATIONS BETWEEN HACKERS AND CRACKERS." Journal of Correctional Issues 5, no. 1 (2022): 27–32. http://dx.doi.org/10.52472/jci.v5i1.94.
Full textBohnsack, René, and Meike Malena Liesner. "What the hack? A growth hacking taxonomy and practical applications for firms." Business Horizons 62, no. 6 (2019): 799–818. http://dx.doi.org/10.1016/j.bushor.2019.09.001.
Full textJordan, Tim. "A genealogy of hacking." Convergence: The International Journal of Research into New Media Technologies 23, no. 5 (2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.
Full textGoel, Shubham, Kunal Gupta, Mayank Garg, and A. K. Madan. "Ethical Hacking and Its Countermeasures." International Journal of Advance Research and Innovation 2, no. 3 (2014): 41–49. http://dx.doi.org/10.51976/ijari.231408.
Full textKarlgren, Kasper, Barry Brown, and Donald McMillan. "From Self-Tracking to Sleep-Hacking." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–26. http://dx.doi.org/10.1145/3555630.
Full textSati, Vrinda, and Raja Muthalagu. "Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution." Cybernetics and Information Technologies 23, no. 2 (2023): 124–36. http://dx.doi.org/10.2478/cait-2023-0017.
Full textBrown, Barry, Minna Vigren, Asreen Rostami, and Mareike Glöss. "Why Users Hack: Conflicting Interests and the Political Economy of Software." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–26. http://dx.doi.org/10.1145/3555774.
Full textSendi Novianto, Setyo Budi, Farrikh Al Zami, Sasono Wibowo, Achmad Wahid Kurniawan, and Budi Widjajanto. "PELATIHAN & SIMULASI CRACK VS HACK 1.0 DI SMA NEGERI 3 SEMARANG." Jurnal Layanan Masyarakat (Journal of Public Services) 6, no. 2 (2022): 385–94. http://dx.doi.org/10.20473/jlm.v6i2.2022.385-394.
Full textAkhtar, Naveed. "Latest trends in the Cybersecurity after the solar wind hacking attack." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:yellow;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 1, no. 2 (2021): 14–24. http://dx.doi.org/10.33897/fujeas.v1i2.347.
Full textNatho, Parinya, Suwit Somsuphaprungyos, Salinun Boonmee, and Sangtong Boonying. "Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm." International Journal of Reconfigurable and Embedded Systems (IJRES) 13, no. 3 (2024): 502. http://dx.doi.org/10.11591/ijres.v13.i3.pp502-511.
Full textBradbury, Victoria, and Suzy O'Hara. "Reframing Innovation." Media-N 15, no. 2 (2019): 5–19. http://dx.doi.org/10.21900/j.median.v15i2.76.
Full textBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Full textCharnley, P. M. C. "Hack-gate: examining the phone-hacking scandal and its repercussions for press regulation in the UK." Journal of Intellectual Property Law & Practice 7, no. 3 (2012): 211–19. http://dx.doi.org/10.1093/jiplp/jpr218.
Full textThavarajah, Nathan, and Miriam Fenkes. "Hacked kestrels (<em>Falco tinnunculus</em>) show similar patterns of post-fledging food dependency as wild reared birds: implications for best practice in release management of orphaned raptors." Wildlife Rehabilitation Bulletin 40, no. 1 (2022): 1–7. http://dx.doi.org/10.53607/wrb.v40.243.
Full textFerretti, Silva. "Hacking by the prompt: Innovative ways to utilize ChatGPT for evaluators." New Directions for Evaluation 2023, no. 178-179 (2023): 73–84. http://dx.doi.org/10.1002/ev.20557.
Full textThackray, Helen. "Research spotlight – Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities." Social Psychological Review 21, no. 1 (2019): 8–9. http://dx.doi.org/10.53841/bpsspr.2019.21.1.8.
Full textAsh, Rachel. "Untextbooking for the CI Latin class: why and how to begin." Journal of Classics Teaching 20, no. 39 (2019): 65–70. http://dx.doi.org/10.1017/s2058631019000114.
Full textTan, Edna, and Angela Calabrese Barton. "Hacking a Path into and through STEM: Exploring how Youth Build Connecting Pathways between STEM-Related Landscapes." Teachers College Record: The Voice of Scholarship in Education 122, no. 2 (2020): 1–44. http://dx.doi.org/10.1177/016146812012200211.
Full textShanmuga Priya, S., Dr A.Valarmathi, M. Rizwana, and Dr L.Mary Gladence. "Enhanced Mutual Authentication System in Mobile Cloud Environments." International Journal of Engineering & Technology 7, no. 3.34 (2018): 192. http://dx.doi.org/10.14419/ijet.v7i3.34.18962.
Full textK Prabu, Et al. "Security Privacy Process Involvement in Cloud Security for Data Preservation against Data Malicious Activity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 1572–83. http://dx.doi.org/10.17762/ijritcc.v11i10.8709.
Full textDreessen, Katrien, Selina Schepers, and Danny Leen. "From Hacking Things to Making Things. Rethinking making by supporting non-expert users in a FabLab." Interaction Design and Architecture(s), no. 30 (September 20, 2016): 47–64. http://dx.doi.org/10.55612/s-5002-030-003.
Full textBilgin, Adem. "Elhik’s Metamathematics and the robot Philia: Internet Communication Protocol Modelling of Observeds according to Observers." European Journal of Artificial Intelligence and Machine Learning 1, no. 2 (2022): 1–10. http://dx.doi.org/10.24018/ejai.2022.1.2.3.
Full textReflinaldi, Reflinaldi, Bobbi Aidi Rahman, Awliya Rahmi, and Melisa Rezi. "Hacking Threat in Arab Cyberspace: How al-Hākirz al-Muslimūn Construct Narratives against Zionists and Anti-Islamists." Arabiyatuna: Jurnal Bahasa Arab 7, no. 2 November (2023): 457. http://dx.doi.org/10.29240/jba.v7i2.8156.
Full textGuterres, Lilia Ervina Jeronimo, and Ahmad Ashari. "THE ANALYSIS OF WEB SERVER SECURITY FOR MULTIPLE ATTACKS IN THE TIC TIMOR IP NETWORK." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 14, no. 1 (2020): 103. http://dx.doi.org/10.22146/ijccs.53265.
Full textBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Full textHancocks, Stephen. "Hacks, hackers and hacking." British Dental Journal 211, no. 2 (2011): 51. http://dx.doi.org/10.1038/sj.bdj.2011.576.
Full textHasan, Hind Ali Abdul, Safaa Maijd Mohammed, and Noor Hayder Abdul Ameer. "ADVANCED ENCRYPTION STANDARD USING FPGA OVERNETWORK." EUREKA: Physics and Engineering, no. 1 (January 29, 2021): 32–39. http://dx.doi.org/10.21303/2461-4262.2021.001613.
Full textHerskovitz, Jaylin. "DIY Assistive Software: End-User Programming for Personalized Assistive Technology." ACM SIGACCESS Accessibility and Computing, no. 137 (January 2024): 1. http://dx.doi.org/10.1145/3654768.3654772.
Full textSriman, B., and Venkat Sai Sujan Kandregula. "The Next level of Security Scalable Solution Blockchain (SSSB) in Satellite Communication System." Journal of Physics: Conference Series 2335, no. 1 (2022): 012063. http://dx.doi.org/10.1088/1742-6596/2335/1/012063.
Full textTsybulnyk, Serhii, Dmytro Zubarskyi, and Diana Pivtorak. "APPLIED SOFTWARE FOR PERSONAL INFORMATION STORAGE." Bulletin of the National Technical University «KhPI» Series: New solutions in modern technologies, no. 1(15) (May 5, 2023): 53–59. http://dx.doi.org/10.20998/2413-4295.2023.01.07.
Full textSarkar, Sanchar, and Swarnalatha Rangarajan. "“Do you think it is a Pandemic?” Apocalypse, Anxiety and the Environmental Grotesque in Paolo Bacigalupi’s The Windup Girl." Interlitteraria 27, no. 1 (2022): 69–83. http://dx.doi.org/10.12697/il.2022.27.1.7.
Full textPramana, Taufik Agung, and Yudi Ramdhani. "Sentiment Analysis Tanggapan Masyarakat Tentang Hacker Bjorka Menggunakan Metode SVM." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 6, no. 1 (2023): 49–62. http://dx.doi.org/10.32672/jnkti.v6i1.5583.
Full textDelgado, Ana, and Blanca Callén. "Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times." Public Understanding of Science 26, no. 2 (2016): 179–94. http://dx.doi.org/10.1177/0963662516647348.
Full textJasiński, Maciej. "The Correspondence of Michał Antoni Hacki and Johannes Hevelius." Odrodzenie i Reformacja w Polsce 67 (March 5, 2024): 199–230. http://dx.doi.org/10.12775/oirwp.2023.07.
Full textLennerfors, Thomas Taro, Per Fors, and Jonathan R. Woodward. "Case hacks: Four hacks for promoting critical thinking in case-based management education for sustainable development." Högre utbildning 10, no. 2 (2020): 1. http://dx.doi.org/10.23865/hu.v10.1960.
Full textGacharná G., Federico Iván. "Hacker ético vs. delincuente informático: Una mirada en el contexto colombiano." INVENTUM 4, no. 6 (2009): 46–49. http://dx.doi.org/10.26620/uniminuto.inventum.4.6.2009.46-49.
Full textSwetha, Pelleti. "Modeling and Predicting Cyber Hacking Breaches." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 5349–55. http://dx.doi.org/10.22214/ijraset.2021.36168.
Full textKurniawan, Ade, Yuichi Ohsita, and Masayuki Murata. "Experiments on Adversarial Examples for Deep Learning Model Using Multimodal Sensors." Sensors 22, no. 22 (2022): 8642. http://dx.doi.org/10.3390/s22228642.
Full textŁukaszewicz-Chantry, Maria. "Poemat Maryjny Michała Antoniego Hackiego." Symbolae Philologorum Posnaniensium Graecae et Latinae 28, no. 2 (2019): 127–37. http://dx.doi.org/10.14746/sppgl.2018.xxviii.2.8.
Full textBentolila, Héctor Rodolfo. "Importancia del lenguaje y método filosófico en el segundo Wittgenstein." Revista Colombiana de Filosofía de la Ciencia 18, no. 36 (2018): 83–95. http://dx.doi.org/10.18270/rcfc.v18i36.2351.
Full textGiannone, Ariel. "Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software." Revista Latinoamericana de Ingenieria de Software 4, no. 6 (2017): 252. http://dx.doi.org/10.18294/relais.2016.252-254.
Full textVilatta, Emilia, and José Giromini. "La injusticia testimonial como fabricación de personas: una lectura ontológica." Griot : Revista de Filosofia 21, no. 1 (2021): 75–93. http://dx.doi.org/10.31977/grirfi.v21i1.2106.
Full textNanda, Sendi Eka, and Winda Widyaningsih. "PENGARUH TERPAAN BERITA PERETASAN TOKOPEDIA TERHADAP REPUTASI PERUSAHAAN." Jurnal Broadcasting Communication 3, no. 1 (2021): 12–22. http://dx.doi.org/10.53856/bcomm.v3i1.138.
Full text