نتایج جستجو برای: hack

تعداد نتایج: 658  

2016
V. Suganya

Phishing is a threat that acquire sensitive information such as username, password etc through online. Phishing often takes place in email spoofing or instant messaging .Phishing email contains messages like ask the users to enter the personal information so that it is easy for hackers to hack the information. This paper presents an overview about various phishing attacks and various techniques...

2013
Eun-Sun Ryu Mi Jin Kim Hyun-Soo Shin Yang-Hee Jang Hack Sun Choi Inho Jo Richard J. Johnson Duk-Hee Kang

Eun-Sun Ryu, Mi Jin Kim, Hyun-Soo Shin, Yang-Hee Jang, Hack Sun Choi, Inho Jo, Richard J. Johnson, and Duk-Hee Kang Division of Nephrology, Department of Internal Medicine, Ewha Womans University School of Medicine, Ewha Medical Research Center, Seoul, Korea; Department of Molecular Medicine, Ewha Womans University School of Medicine, Ewha Medical Research Center, Seoul, Korea; and Division of ...

2014
Seung Beom Han Jae Wook Lee Dong-Gun Lee Nack-Gyun Chung Bin Cho Dae Chul Jeong Jin Han Kang Hack-Ki Kim

transplantation in Korean children under relatively short-term acyclovir prophylaxis Seung Beom Han, MD; Jae Wook Lee, MD, PhD; Dong-Gun Lee, MD, PhD; NackGyun Chung, MD, PhD; Bin Cho, MD, PhD; Dae Chul Jeong, MD, PhD; Jin Han Kang, MD, PhD; Hack-Ki Kim, MD, PhD; Department of Pediatrics, College of Medicine, The Catholic University of Korea, Seoul, South Korea; Division of Infectious Diseases,...

2014
William R. Marczak John Scott-Railton Morgan Marquis-Boire Vern Paxson

Repressive nation-states have long monitored telecommunications to keep tabs on political dissent. The Internet and online social networks, however, pose novel technical challenges to this practice, even as they open up new domains for surveillance. We analyze an extensive collection of suspicious files and links targeting activists, opposition members, and nongovernmental organizations in the ...

Journal: :J. Comb. Optim. 2005
Ramkumar Chinchani Duc T. Ha Anusha Iyer Hung Q. Ngo Shambhu J. Upadhyaya

We study the hardness of approximation for the MINIMUM HACKING problem, which roughly can be described as the problem of finding the best way to compromise some target nodes given a few initial compromised nodes in a network. We give three reductions to show that MINIMUM HACKING is not approximable to within where , for any ! " $#% . In particular, the reductions are from a PCP, from the MINIMU...

2011
Robert David Steele

It is for me a huge honor to be invited to deliver the counterbalancing view within this distinguished gathering of counter-terrorism experts. 1 Let me begin by emphasizing what I consider to be the " three strikes " or in international terms, the " side-out " of government counter-terrorism thinking today. STRIKE ONE: Terrorism is a symptom, not a root cause or threat. Going after Al Qaeda has...

Journal: :CoRR 2014
Esteban Fuentes Hector E. Martinez

We present SClib, a simple hack that allows easy and straightforward evaluation of C functions within Python code, boosting flexibility for better tradeoff between computation power and feature availability, such as visualization and existing computation routines in SciPy. We also present two cases were SClib has been used. In the first set of applications we use SClib to write a port to Python...

2003
Jonathan Bannet David W. Price Algis Rudys Justin Singer Dan S. Wallach

A representative democracy depends on a universally trusted voting system for the election of representatives; voters need to believe that their votes count, and all parties need to be convinced that the winner and loser of the election were declared legitimately. Direct recording electronic (DRE) voting systems are increasingly being deployed to fill this role. Unfortunately, doubts have been ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید