Journal articles on the topic 'Hacking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hacking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohamad, Ani Munirah, Zaiton Hamin, Mohd Zakhiri Md Nor, and Nurhazman Abdul Aziz. "SELECTED THEORIES ON CRIMINALISATION OF HACKING." International Journal of Law, Government and Communication 6, no. 22 (March 10, 2021): 168–78. http://dx.doi.org/10.35631/ijlgc.6220016.
Full textCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Full textKindi, Vasso. "Taking a Look at History." Journal of the Philosophy of History 8, no. 1 (March 24, 2014): 96–117. http://dx.doi.org/10.1163/18722636-12341267.
Full textVerständig, Dan, and Janne Stricker. "Hacking Inequality." MedienPädagogik: Zeitschrift für Theorie und Praxis der Medienbildung 52 (February 16, 2023): 319–39. http://dx.doi.org/10.21240/mpaed/52/2023.02.16.x.
Full textUtomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.
Full textKnox, Hannah. "Hacking anthropology." Journal of the Royal Anthropological Institute 27, S1 (March 15, 2021): 108–26. http://dx.doi.org/10.1111/1467-9655.13483.
Full textCohen, Matt. "Hacking Colonialism." PMLA/Publications of the Modern Language Association of America 135, no. 3 (May 2020): 559–64. http://dx.doi.org/10.1632/pmla.2020.135.3.559.
Full textFarsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (February 25, 2010): 14–20. http://dx.doi.org/10.5120/229-380.
Full textPratt, Mike. "Raptor Hacking." Wildlife Rehabilitation Bulletin 29, no. 1 (June 30, 2011): 34–38. http://dx.doi.org/10.53607/wrb.v29.78.
Full textDustin Rubinstein, C., and Mariana F. Wolfner. "Reproductive hacking." Fly 8, no. 2 (March 27, 2014): 80–85. http://dx.doi.org/10.4161/fly.28396.
Full textKuehnel, Karin. "Hacking hemagglutinin." Nature Chemical Biology 13, no. 12 (December 2017): 1203. http://dx.doi.org/10.1038/nchembio.2523.
Full textNolan, Jason, and Michelle Levesque. "Hacking human." ACM SIGGROUP Bulletin 25, no. 2 (February 2005): 33–37. http://dx.doi.org/10.1145/1067721.1067728.
Full textLakoff, Andrew. "Ian Hacking." Public Culture 24, no. 1 (2012): 217–32. http://dx.doi.org/10.1215/08992363-1443610.
Full textGreenhalgh, T. "Genome hacking." BMJ 338, apr01 1 (April 1, 2009): b1322. http://dx.doi.org/10.1136/bmj.b1322.
Full textMcfedries, Paul. "Hacking DNA." IEEE Spectrum 46, no. 10 (October 2009): 23. http://dx.doi.org/10.1109/mspec.2009.5267990.
Full textRoberts, Paula. "Hacking Cyberspace." ACM SIGCAS Computers and Society 31, no. 4 (December 2001): 41–42. http://dx.doi.org/10.1145/572306.572314.
Full textPalmer, C. C. "Ethical hacking." IBM Systems Journal 40, no. 3 (2001): 769–80. http://dx.doi.org/10.1147/sj.403.0769.
Full textDavies, Sarah R. "Characterizing Hacking." Science, Technology, & Human Values 43, no. 2 (April 21, 2017): 171–97. http://dx.doi.org/10.1177/0162243917703464.
Full textWright, Alex. "Hacking cars." Communications of the ACM 54, no. 11 (November 2011): 18–19. http://dx.doi.org/10.1145/2018396.2018403.
Full textAmato, Patrick. "Hacking primes." Ubiquity 2003, February (February 2003): 1. http://dx.doi.org/10.1145/764014.764015.
Full textHeslen, John J. "Neurocognitive hacking." Politics and the Life Sciences 39, no. 1 (2020): 87–100. http://dx.doi.org/10.1017/pls.2020.3.
Full textTantillo, Dean. "Hacking Hydrogen." American Scientist 108, no. 1 (2020): 22. http://dx.doi.org/10.1511/2020.108.1.22.
Full textBarber, Richard. "Hacking Techniques." Computer Fraud & Security 2001, no. 3 (March 2001): 9–12. http://dx.doi.org/10.1016/s1361-3723(01)03014-7.
Full textBorrows, Peter. "Car hacking." New Scientist 217, no. 2901 (January 2013): 33. http://dx.doi.org/10.1016/s0262-4079(13)60237-7.
Full textSoupionis, Yannis, and Dimitris Gritzalis. "Hacking VoIP." Computers & Security 32 (February 2013): 267. http://dx.doi.org/10.1016/j.cose.2012.09.006.
Full textWesson, Kyle, and Todd Humphreys. "Hacking Drones." Scientific American 309, no. 5 (October 15, 2013): 54–59. http://dx.doi.org/10.1038/scientificamerican1113-54.
Full textCarlson, R. "Hacking humanity." IEEE Spectrum 39, no. 12 (December 2002): 47–48. http://dx.doi.org/10.1109/mspec.2002.1088455.
Full textMIZUNO, Naoki, Thomas WESTFECHTEL, Shotaro KOJIMA, Koichiro KAMATA, Kazunori OHNO, Takahiro SUZUKI, and Satoshi TADOKORO. "Hacking COMS." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2018 (2018): 1P2—C07. http://dx.doi.org/10.1299/jsmermd.2018.1p2-c07.
Full textOwaki, Dai, Volker Dürr, and Josef Schmitz. "Motion Hacking." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2020 (2020): 2A1—K06. http://dx.doi.org/10.1299/jsmermd.2020.2a1-k06.
Full textRid, Thomas, and Ben Buchanan. "Hacking Democracy." SAIS Review of International Affairs 38, no. 1 (2018): 3–16. http://dx.doi.org/10.1353/sais.2018.0001.
Full textNavarro, Renato. "Poetic hacking." Voz e Cena 3, no. 01 (June 27, 2022): 58–75. http://dx.doi.org/10.26512/vozcen.v3i01.42948.
Full textMcFedries, P. "Hacking unplugged [review of hacking activities and terminology]." IEEE Spectrum 41, no. 2 (February 2004): 80. http://dx.doi.org/10.1109/mspec.2004.1265143.
Full textAdam, A. E. "Hacking into Hacking: Gender and the Hacker Phenomenon." ACM SIGCAS Computers and Society 33, no. 4 (December 31, 2003): 3. http://dx.doi.org/10.1145/968358.968360.
Full textPutra, Jay Sadikin Abdul Azis Mandala. "HACKING AS A CHALLENGE FOR CHANGE AND THE DEVELOPMENT OF CYBER LAW IN INDONESIA." Jurnal Ilmu Hukum Tambun Bungai 8, no. 2 (December 7, 2023): 344–55. http://dx.doi.org/10.61394/jihtb.v8i2.279.
Full textLentz, Lene Wacher, and Jens Myrup Pedersen. "”Hacking” – forbrydelse eller digitalt selvforsvar?" Økonomi & Politik 93, Oktober (October 20, 2020): 76–90. http://dx.doi.org/10.7146/okonomi-og-politik.v93ioktober.122529.
Full textGupta, Alisha, and Frank Bosco. "Tempest in a teacup: An analysis of p-Hacking in organizational research." PLOS ONE 18, no. 2 (February 24, 2023): e0281938. http://dx.doi.org/10.1371/journal.pone.0281938.
Full textJordan, Tim. "A genealogy of hacking." Convergence: The International Journal of Research into New Media Technologies 23, no. 5 (April 6, 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.
Full textUl Haq, Hafiz Burhan, Muhammad Zulkifl Hassan, Muhammad Zunnurain Hussain, Rabia Aslam Khan, Sabreena Nawaz, Hassan Raza Khokhar, and Mahnoor Arshad. "The Impacts of Ethical Hacking and its Security Mechanisms." Pakistan Journal of Engineering and Technology 5, no. 4 (December 29, 2022): 29–35. http://dx.doi.org/10.51846/vol5iss4pp29-35.
Full textBooth, Jack. "Hacking and Hackerspaces." New Formations 94, no. 94 (March 1, 2018): 180–82. http://dx.doi.org/10.3898/newf:94.rev05.2018.
Full textOtt. "Hacking the System." Journal of Feminist Studies in Religion 31, no. 2 (2015): 140. http://dx.doi.org/10.2979/jfemistudreli.31.2.140.
Full textSavaget, Paulo, Steve Evans, Frank Tietze, and Ali Kharrazi. "Hacking System Change." Academy of Management Proceedings 2019, no. 1 (August 1, 2019): 11579. http://dx.doi.org/10.5465/ambpp.2019.11579abstract.
Full textRasch, Elisabet Dueholm. "Hacking the System." Contention 10, no. 1 (June 1, 2022): 65–80. http://dx.doi.org/10.3167/cont.2022.100106.
Full textPal (Bera), Sova. "Overview of Hacking." IOSR Journal of Computer Engineering 18, no. 04 (April 2016): 90–92. http://dx.doi.org/10.9790/0661-1804049092.
Full textSchrödel, Tobias. "Hacking für manager..." Wirtschaftsinformatik und Management 2, no. 5 (October 2010): 20–23. http://dx.doi.org/10.1007/bf03248286.
Full textSchneier, Bruce. "Robot Hacking Games." IEEE Security & Privacy 20, no. 1 (January 2022): 119–20. http://dx.doi.org/10.1109/msec.2021.3121885.
Full textTarek El-Ariss. "HACKING THE MODERN:." Comparative Literature Studies 47, no. 4 (2010): 533. http://dx.doi.org/10.5325/complitstudies.47.4.0533.
Full textSchoonmaker, Sara. "HACKING THE GLOBAL." Information, Communication & Society 15, no. 4 (May 2012): 502–18. http://dx.doi.org/10.1080/1369118x.2012.665938.
Full textEmspak, Jesse. "Hacking Heats Up." Scientific American 313, no. 1 (June 16, 2015): 18–19. http://dx.doi.org/10.1038/scientificamerican0715-18.
Full textHou, Youyang, and Dakuo Wang. "Hacking with NPOs." Proceedings of the ACM on Human-Computer Interaction 1, CSCW (December 6, 2017): 1–16. http://dx.doi.org/10.1145/3134688.
Full textEvanko, Daniel. "Hacking the genome." Nature Methods 3, no. 7 (July 2006): 495. http://dx.doi.org/10.1038/nmeth0706-495.
Full text