نتایج جستجو برای: black hack

تعداد نتایج: 141905  

Journal: :DMW - Deutsche Medizinische Wochenschrift 1895

Journal: :Cultural Studies Review 2013

Journal: :Journal of Applied Logic 2006

Journal: :British Journal of Psychiatry 1995

Journal: :CoRR 2017
Daniela Huppenkothen Anthony Arendt David W. Hogg Karthik Ram Jacob VanderPlas Ariel Rokem

Across almost all scientific disciplines, the instruments that record our experimental data and the methods required for storage and data analysis are rapidly increasing in complexity. This gives rise to the need for scientific communities to adapt on shorter time scales than traditional university curricula allow for, and therefore requires new modes of knowledge transfer. The universal applic...

Journal: :Journal of Mental Science 1896

2012
Alex Tsang Xiong Zhang Wei Thoo Yue Michael Chau

It is a consensus that there exists learning barriers to become a skilled hacker. Hack forums are believed to be indispensable venues where to overcome these barriers. However, this belief has not been formally justified in academia. By studying post content, we find evidence of different posting behaviors in hack forums. One interesting result is that there are indeed some learning behaviors e...

2012
Mathias Morbitzer

The MIFARE Classic is the most popular RFID chip, used in public transport as well as cafeterias and other applications. This paper gives an overview of which methods were used to re-engineer the chips, from polishing to analyzing the communication. Within this process, various security weaknesses were discovered. Those allow various attacks, which will be shown in the last part of the paper.

2009
PÉTER BARABÁS P. BARABÁS

Bayesian classifiers provide relatively good performance compared with other more complex algorithms. Misclassification ratio is very low for trained samples, but in the case of outliers the misclassification error may increase significantly. The usage of ‘summation hack’ method in Bayesian classification algorithm can reduce the misclassifications rate for untrained samples. The goal of this p...

2001
Rajesh Krishna Balan Boon Peng Lee K. R. Renjish Kumar Lillykutty Jacob Winston Khoon Guan Seah Akkihebbal L. Ananda

In recent years, wireless networks have become increasingly common and an increasing number of devices are communicating with each other over lossy links. Unfortunately, TCP performs poorly over lossy links as it is unable to differentiate the loss due to packet corruption from that due to congestion. In this paper, we present an extension to TCP which enables TCP to distinguish packet corrupti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید