Results 11 to 20 of about 205,649 (344)
Generative Street Addresses from Satellite Imagery
We describe our automatic generative algorithm to create street addresses from satellite images by learning and labeling roads, regions, and address cells. Currently, 75% of the world’s roads lack adequate street addressing systems.
İlke Demir +7 more
doaj +1 more source
NATIONAL CYBERSECURITY SYSTEMS OF LEADING COUNTRIES AROUND THE WORLD [PDF]
The rapid development of technology in the 21st century has led to the fact that the geopolitical structure of the modern world depends not only on the strength of armies, but also on the proper functioning of cybersecurity systems.
Irakli Nadareishvili, Jemal Lomsadze
doaj +1 more source
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest [PDF]
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics and science undergraduates.
Holden, Joshua +3 more
core +1 more source
Ağ Toplumunda “Ağ” Dışı Kalan Hackerların Muhalefet Biçimi: Hacker Etiği ve Özgür Yazılım
Bu makale ile hackerlara geniş perspektiften bakıldığı takdirde etik değerleri üzerinden karşı kültürü temsil edip etmediği, muhalefet biçimi yönüyle direniş kimliğinin olup olmadığını açıklamaktır.
Nurullah Sandilaç
doaj +1 more source
Vulnerability disclosure is a key topic in cybersecurity. It is a practice ensuring that organizations address and fix vulnerabilities before bad actors can find and exploit them. This study focuses on the “disclose or exploit” dilemma. It presents a two-
Daniel Cohen, Amir Elalouf, Raz Zeev
doaj +1 more source
El estigma Hacker, entre lo bueno y lo malo
El presente artículo pretende aclarar el hecho que un grupo reducido de personas que ejercen una actividad, profesión u oficio, y el mismo decide actuar de forma reprochable o contraria a la ley, esto no puede ser pretexto para estigmatizar la profesión ...
Federico Iván Gacharná Gacharná
doaj +1 more source
An Ethical Study of Teaching Malware Writing, Hacking Skills and System Infiltration [PDF]
Nowadays, the number of courses teaching hacking skills is increasing and has encountered a very warm reception. In some countries, teaching hacking and writing malware has been considered as part of course credits for students of the fields of computer ...
Zaynab Ᾱlebūyeh +1 more
doaj +1 more source
¿Qué motiva el comportamiento de Anonymous y Hacktivistas? ¿Por qué Edward Snowden denunció los planes de vigilancia masiva de la Agencia Central de Inteligencia (CIA) y de la Agencia de Seguridad Nacional (NSA) de los Estados Unidos?
Nelson Scariot Esquivel
doaj +1 more source
Flexible learning in a partnership context for beginning teachers [PDF]
A preliminary inventory was carried out for a sample of male and female student teachers who had email accounts. Preliminary inventory data revealed that the mean number of times per week that males used email was significantly higher than the mean ...
Hacker, Roger, Sova, Brian
core +2 more sources
Performance, política y activismo digital: las intervenciones del "Colectivo Dominio Público"
Desde fines de 2015 en adelante, con la asunción del nuevo gobierno encabezado por el presidente Mauricio Macri, viene teniendo lugar un retorno de las políticas neoliberales en la Argentina. Esta coyuntura ha potenciado el trabajo de diversos colectivos
Maximiliano Ignacio de la Puente
doaj +1 more source

