Search alternatives:
".hack" » ".lack" (Expand Search), ".jack" (Expand Search)
Showing 1 - 20 results of 365 for search '".hack"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Hacking Social Science for the Age of Datafication by Simon Lindgren

    Published 2019-08-01
    “…I argue that the renegotiation of theories and research methods that must be made in order for them to be more relevant and useful, can be fruitfully understood through the metaphor of hacking social science: developing creative ways of exploiting existing tools in alternative and unexpected ways to solve problems …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE by Milana Pisarić

    Published 2023-06-01
    “…In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    The Need for Specific Penalties for Hacking in Criminal Law by Sangkyo Oh, Kyungho Lee

    Published 2014-01-01
    “…In spite of the fact that hacking is a widely used term, it is still not legally established. …”
    Get full text
    Article
  12. 12
  13. 13

    Car Hacking: Accessing and Exploiting the CAN Bus Protocol by Bryson R. Payne

    Published 2019-06-01
    “…However, up to this point there has been a steep learning curve involved in applying cybersecurity research to car hacking. The purpose of this paper is to present a clear, step-by-step process for creating a car-hacking research workstation and to give faculty, students, and researchers the ability to implement car hacking in their own courses and lab environments. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Workshop: Hacking Societies, Habits and Rituals, Berkeley 2019 by Raffaela Giovagnoli, Gianfranco Basti

    Published 2020-05-01
    “…We introduce the workshop “Hacking Societies, Habits and Rituals” to show some important contributions on the topic and aim at stimulating further discussion.…”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Voice Hacking: Using Smartphones to Spread Ransomware to Traditional PCs by Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

    Published 2018-07-01
    “…This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. …”
    Get full text
    Article
  20. 20