Results 21 to 30 of about 233,719 (314)
Prior research in cyber deception has investigated the effectiveness of the timing of deception on human decisions using simulation tools. However, there exists a gap in the literature on how the availability of subnets and port-hardening influence human
Shashank Uttrani +2 more
doaj +1 more source
Criminalità e cyberspazio, alcune riflessioni in materia di cybercriminalità [PDF]
Lo sviluppo tecnologico avvenuto negli ultimi anni ha trasformato la società in uno “spazio iperconnesso” determinando terreno fertile per la proliferazione di nuove forme di criminalità.
Tonellotto M.
doaj +1 more source
An Exploration of the Psychological Impact of Hacking Victimization
Cybercrime has rapidly grown in prevalence and potential for harm and disruption for victims. Studies have examined the adverse psychological impact of cybercrime for victims; however, the specific effects for victims of hacking are unexplored.
Alexa Palassis +2 more
doaj +1 more source
The universally shared values of improving health and well-being of populations make health a suitable diplomacy tool that transcends populations.
Rifat Atun +2 more
doaj +1 more source
Systemizers are better code-breakers: self-reported systemizing predicts code-breaking performance in expert hackers and naïve participants [PDF]
Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to
Colin eMcLean +5 more
core +4 more sources
Questionable research practices (QRPs) in the statistical analysis of data and in the presentation of the results in research papers include HARKing, cherry-picking, P-hacking, fishing, and data dredging or mining.
C. Andrade
semanticscholar +1 more source
RedHerd: Offensive Cyberspace Operations as a Service
Nowadays, time, scope and cost constraints along with knowledge requirements and personnel training constitute blocking restrictions for effective Offensive Cyberspace Operations (OCO).
Giovanni Pecoraro +2 more
doaj +1 more source
How to cite this article Raj AT, Patil S, Sarode S, Sarode G. P-hacking. J Contemp Dent Pract 2017;18(8):633-634.
A Thirumal, Raj +3 more
openaire +2 more sources
Car Hacking and Defense Competition on In-Vehicle Network
—Cybersecurity competitions can promote the importance of security and discover talented researchers. We hosted the Car Hacking: Attack & Defense Challenge from September 14, 2020 to November 27, 2020, and many security companies and researchers ...
Hyunjae Kang +5 more
semanticscholar +1 more source
How to maintain a business continuity despite cyber incidents? [PDF]
Modern IT systems can bring a lot of advantages in terms of electronic commerce and governance as well as an automatic process control within industry, traffic and the other ways of classical and critical infrastructure.
Đekić Milica D.
doaj +1 more source

