Showing 1 - 11 results of 11 for search 'Hacker (term)', query time: 0.16s Refine Results
  1. 1
  2. 2
  3. 3

    Uptake and 4-week outcomes of an ‘opt-out’ smoking cessation referral strategy in a London-based lung cancer screening setting by Anthony Edey, Neal Navani, Kitty Chan, Graham Robinson, Janine Zylstra, Paul Robinson, Laura Green, Anand Devaraj, Jane Rowlands, Allan Hackshaw, Carolyn Horst, Arjun Nair, Sam M Janes, Kate Davies, Jeannie Eng, Mamta Ruparel, Samantha L Quaife, Jennifer L Dickson, Magali Taylor, Angshu Bhowmik, Hasti Robbie, Joseph Jacob, Laura Farrelly, Sophie Tisi, Tanya Patrick, Andrew Creamer, Helen Hall, Samanjit Hare, Jon Teague, Samuel M Janes, Esther Arthur-Darkwa, Thea Buchan, Stephen Ellis, Thomas Callender, Rachael Sarpong, John McCabe, Zaheer Mangera, Ethaar El-Emir, Terry O'Shaughnessy, Geoff Bellingan, Nick Screaton, Priyam Verghese, William M Ricketts, Vicky Bowyer, Kylie Gyertson, Fanta Bojang, Claire Levermore, Tania Anastasiadis, Ruth Prendecki, Amyn Bhamani, Malavika Suresh, Judy Airebamen, Alice Cotton, Kaylene Phua, Elodie Murali, Simranjit Mehta, Karen Parry-Billings, Columbus Ife, April Neville, Zahra Hanif, Helen Kiconco, Ricardo McEwen, Dominique Arancon, Nicholas Beech, Derya Ovayolu, Christine Hosein, Sylvia Patricia Enes, Qin April Neville, Aashna Samson, Urja Patel, Fahmida Hoque, Hina Pervez, Sofia Nnorom, Moksud Miah, Julian McKee, Mark Clark, Anant Patel, Sara Lock, Rajesh Banka, Ugo Ekeowa, Charlotte Cash, Tunku Aziz, Alberto Villanueva, Elena Stefan, Charlie Sayer, Navinah Nundlall, Andrew Crossingham, Tanita Limani, Kate Gowers, Andrew Perugia, James Rusius, Anne-Marie Hacker, Monica L Mullin, Evangelos Katsampouris, Chuen R Khaw, Chuen Khaw, Sheetal Karavadra, Alan Shaw, Chris Valerio, Ali Mohammed, Lynsey Gallagher, Mehran Azimbagirad, Burcu Ozaltin, Maureen Browne, Eleanor Hellier, Catherine Nestor

    Published 2025-02-01
    Get full text
    Article
  4. 4

    The Nexus between CDS Premiums and Exchange Rates: Evidence from BRICS Countries and Türkiye by Fatih Güzel, Yüksel İltaş

    Published 2024-12-01
    “…The findings indicate a long-term relationship between CDS premiums and exchange rates in all countries except Turkey. …”
    Get full text
    Article
  5. 5

    Computer Network Attacks and Modern International Law by A. L. Kozik

    Published 2014-04-01
    “…States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. …”
    Get full text
    Article
  6. 6

    Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF by Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI

    Published 2022-06-01
    “…Aiming at the problem that APT analysis reports have not been fully utilized, and there is a lack of automation methods to generate structured knowledge and construct feature portraits of the hacker organizations, an automatic knowledge extraction method of APT attacks combining entity recognition and entity alignment is proposed. …”
    Get full text
    Article
  7. 7
  8. 8

    Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data by Abhishek Sharma, May Bantan

    Published 2025-02-01
    “…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). …”
    Get full text
    Article
  9. 9

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  10. 10

    Analysis of cyber incidents in Senegal from 2005 to 2023 by Ciré Sall

    Published 2024-12-01
    “…Twenty-six incidents were identified, and they were analysed in terms of their frequency, incident type, perpetrator type, and victim type. …”
    Get full text
    Article
  11. 11