Results 291 to 300 of about 205,649 (344)
Some of the next articles are maybe not open access.
IEEE Security & Privacy, 2003
The US Department of Homeland Security and the TSA have been attacked by their first hacker. He wasn't a terrorist; he wasn't out to take over the planes. He isn't even a criminal; he didn't try to extort money. He was a hacker, plain and simple. He wanted to test the security screeners' efficacy, to demonstrate that our airport security measures are ...
openaire +1 more source
The US Department of Homeland Security and the TSA have been attacked by their first hacker. He wasn't a terrorist; he wasn't out to take over the planes. He isn't even a criminal; he didn't try to extort money. He was a hacker, plain and simple. He wanted to test the security screeners' efficacy, to demonstrate that our airport security measures are ...
openaire +1 more source
HGHAN: Hacker group identification based on heterogeneous graph attention network
Information Sciences, 2022Yijia Xu, Zhonglin Liu
exaly
Hacker Definitions in Information Systems Research
Journal of Computer Information Systems, 2022Adriane B Randolph
exaly
How to react to hacker types and asset types in security decision-making
Expert Systems With Applications, 2023Yong Wu, Tao Dai
exaly

