Results 1 to 10 of about 188,047 (198)

Hacker types, motivations and strategies: A comprehensive framework

open access: yesComputers in Human Behavior Reports, 2022
Understanding and predicting cyber malfeasance is an emerging area of research with the increase in cybercrimes and heightened awareness about cybersecurity in recent years.
Samuel Chng
exaly   +3 more sources

Predicting Cyber-Events by Leveraging Hacker Sentiment

open access: yesInformation (Switzerland), 2018
Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces.
Ashok Deb   +2 more
exaly   +3 more sources

Etica hacker?

open access: yesDigitCult@Scientific Journal on Digital Cultures, 2020
Negli anni in cui si sviluppano le tecnologie digitali, sorgono gruppi di persone che si definiscono hacker. Oggi il termine hacker viene utilizzato per identificare persone collegate alle tecnologie digitali con significati diversi.
Marco Ciurcina
doaj   +2 more sources

Hacker attacks as a form of syber terrorism [PDF]

open access: yesMegatrend Revija, 2021
As we are referred intensively and inevitably to all the contents that are important to us on the Internet, the number of hacker attacks is by the logic of things, more and more frequent.
Klisarić Sanja
doaj   +1 more source

Amphipyra kautti (Lep., Noctuidae, Amphipyrinae), new species for the Iranian fauna [PDF]

open access: yesنامه انجمن حشره‌شناسی ایران, 2022
In this paper, Amphipyra kautti Hacker, 2002 which was collected from Zagros Mountain ranges is newly reported for the fauna of Iran. Another species from Amphipyrinae which was collected during our survey is also presented.Sampling was carried out by ...
Mehdi Esfandiari, Mohammad Mahdi Rabieh
doaj   +1 more source

Large-scale measurement of aggregate human colocation patterns for epidemiological modeling

open access: yesEpidemics, 2023
To understand and model public health emergencies, epidemiologists need data that describes how humans are moving and interacting across physical space. Such data has traditionally been difficult for researchers to obtain with the temporal resolution and
Shankar Iyer   +9 more
doaj   +1 more source

El flâneur de Benjamin como esqueumorfismo del hacker contemporáneo

open access: yesSaberes y Prácticas: Revista de Filosofía y Educación, 2023
Este artículo retoma la potencia de la figura del flâneur que Walter Benjamin toma de Charles Baudelaire a la luz de los efectos que han tenido los desarrollos de la tecnología en las grandes urbes contemporáneas.
Helena Maldonado Goti
doaj   +1 more source

Features of Adaptation of English Borrowings in Chinese (Using of Word ‘Hacker’)

open access: yesНаучный диалог, 2021
The peculiarities of adaptation of anglicisms in the Chinese language are considered. It is shown that the penetration of English linguistic units into the Chinese language is a modern trend, especially in the field of computer technology.
Xue Chen
doaj   +1 more source

An Evaluation of the Decision by World Athletics on Whether or Not to Ban the Nike Vapor Fly Racing Shoe in 2020

open access: yesEntertainment and Sports Law Journal, 2020
Nike developed the VaporFly 4% racing shoe as part of the 2017 Breaking-2 Project. The designation of 4% within the VaporFly name, as well as results from elite and recreational runners, indicate that the shoe provides a conferred advantage of 4% in race
Daniel Gracey, Thomas James O'Grady
doaj   +2 more sources

Inclusivism, Perspectivism and Pluralistic Tendencies in the History of Indian Culture

open access: yesRUDN Journal of Philosophy, 2022
This article provides a survey of approaches and conceptual means elaborated in recent decades in the studies of pluralistic tendencies in Indian culture.
Evgeniya A. Desnitskaya
doaj   +1 more source

Home - About - Disclaimer - Privacy