نتایج جستجو برای: black hack

تعداد نتایج: 141905  

Journal: :First Monday 2022

The concept ‘contentious expertise’ is proposed to account for technological expertise applied in controversies. Activists from the Chaos Computer Club, a German hacker group, adapted contentious when they built so-called clone of mobile phone SIM card 1998, and used publicly make call — free charge. activists blamed secret design cards, subsequently, was changed made fully public. activists’ t...

Journal: :Mechanical Engineering 2017

Journal: :Academic Emergency Medicine 2018

Journal: :Journal of «Almaz – Antey» Air and Space Defence Corporation 2021

Journal: :Computer 2016
J Voas K Schaffer

We asked 7 experts 7 questions to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems. We are continually reminded of the 1996 paper by Tony Hoare "How did Software Get So Reliable Without Proof?" [1] In that vein, how did we get so insecure with proof? Given daily press announcements concerning new malware, data breaches, and privacy...

Journal: :Scientific American 1910

2017
Meike Nauta Mena B. Habib Maurice van Keulen

Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features associated with behavioural change such as changes in language, source, URLs, retweets, frequency an...

2015
Philippe Schlenker Emmanuel Chemla Kate Arnold Klaus Zuberbühler

Male putty-nosed monkeys have two main alarm calls, pyows and hacks. While pyows have a broad distribution suggestive of a general call, hacks are often indicative of eagles. In a series of articles, Arnold and Zuberbühler showed that putty-nosed monkeys sometimes produce distinct pyow-hack sequences made of a small number of pyows followed by a small number of hacks; and that these are predict...

Journal: :Computer Networks 2002
Rajesh Krishna Balan Boon Peng Lee K. R. Renjish Kumar Lillykutty Jacob Winston Khoon Guan Seah Akkihebbal L. Ananda

In recent years, wireless networks have become increasingly common and an increasing number of devices are communicating with each other over lossy links. Unfortunately, TCP performs poorly over lossy links as it is unable to differentiate the loss due to packet corruption from that due to congestion. In this paper, we present an extension to TCP which enables TCP to distinguish packet corrupti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید