Results 11 to 20 of about 205,649 (344)

Generative Street Addresses from Satellite Imagery

open access: yesISPRS International Journal of Geo-Information, 2018
We describe our automatic generative algorithm to create street addresses from satellite images by learning and labeling roads, regions, and address cells. Currently, 75% of the world’s roads lack adequate street addressing systems.
İlke Demir   +7 more
doaj   +1 more source

NATIONAL CYBERSECURITY SYSTEMS OF LEADING COUNTRIES AROUND THE WORLD [PDF]

open access: yesსამართალი და მსოფლიო, 2021
The rapid development of technology in the 21st century has led to the fact that the geopolitical structure of the modern world depends not only on the strength of armies, but also on the proper functioning of cybersecurity systems.
Irakli Nadareishvili, Jemal Lomsadze
doaj   +1 more source

Underwater Hacker Missile Wars: A Cryptography and Engineering Contest [PDF]

open access: yes, 2005
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics and science undergraduates.
Holden, Joshua   +3 more
core   +1 more source

Ağ Toplumunda “Ağ” Dışı Kalan Hackerların Muhalefet Biçimi: Hacker Etiği ve Özgür Yazılım

open access: yesSkad, 2020
Bu makale ile hackerlara geniş perspektiften bakıldığı takdirde etik değerleri üzerinden karşı kültürü temsil edip etmediği, muhalefet biçimi yönüyle direniş kimliğinin olup olmadığını açıklamaktır.
Nurullah Sandilaç
doaj   +1 more source

Collaboration or separation maximizing the partnership between a “Gray hat” hacker and an organization in a two-stage cybersecurity game

open access: yesInternational Journal of Information Management Data Insights, 2022
Vulnerability disclosure is a key topic in cybersecurity. It is a practice ensuring that organizations address and fix vulnerabilities before bad actors can find and exploit them. This study focuses on the “disclose or exploit” dilemma. It presents a two-
Daniel Cohen, Amir Elalouf, Raz Zeev
doaj   +1 more source

El estigma Hacker, entre lo bueno y lo malo

open access: yesInventum Ingeniería, Tecnología e Investigación, 2011
El presente artículo pretende aclarar el hecho que un grupo reducido de personas que ejercen una actividad, profesión u oficio, y el mismo decide actuar de forma reprochable o contraria a la ley, esto no puede ser pretexto para estigmatizar la profesión ...
Federico Iván Gacharná Gacharná
doaj   +1 more source

An Ethical Study of Teaching Malware Writing, Hacking Skills and System Infiltration [PDF]

open access: yesPizhūhish/hā-yi Falsafī- Kalāmī, 2018
Nowadays, the number of courses teaching hacking skills is increasing and has encountered a very warm reception. In some countries, teaching hacking and writing malware has been considered as part of course credits for students of the fields of computer ...
Zaynab Ᾱlebūyeh   +1 more
doaj   +1 more source

¿Qué es la cultura hacker?

open access: yesQuestion, 2022
¿Qué motiva el comportamiento de Anonymous y Hacktivistas? ¿Por qué Edward Snowden denunció los planes de vigilancia masiva de la Agencia Central de Inteligencia (CIA) y de la Agencia de Seguridad Nacional (NSA) de los Estados Unidos?
Nelson Scariot Esquivel
doaj   +1 more source

Flexible learning in a partnership context for beginning teachers [PDF]

open access: yes, 1998
A preliminary inventory was carried out for a sample of male and female student teachers who had email accounts. Preliminary inventory data revealed that the mean number of times per week that males used email was significantly higher than the mean ...
Hacker, Roger, Sova, Brian
core   +2 more sources

Performance, política y activismo digital: las intervenciones del "Colectivo Dominio Público"

open access: yesTelondefondo : Revista de Teoría y Crítica Teatral, 2017
Desde fines de 2015 en adelante, con la asunción del nuevo gobierno encabezado por el presidente Mauricio Macri, viene teniendo lugar un retorno de las políticas neoliberales en la Argentina. Esta coyuntura ha potenciado el trabajo de diversos colectivos
Maximiliano Ignacio de la Puente
doaj   +1 more source

Home - About - Disclaimer - Privacy