搜索结果: 1-10 共查到“工学 hackers”相关记录10条 . 查询时间(0.078 秒)
Reliability measures of electrical grid has risen to a new norm as it involves physical security and cybersecurity. Threats to either can trigger instability, leading to blackouts and economic losses....
If you're a hacker, you gather as much data as you can on your targets, in search of something valuable.If you're researcher Hsinchun Chen, you gather as much data as you can on the hackers.Chen, a...
Watch Out:If you’ve got a smart watch,hackers could get your data
Watch Out you’ve got a smart watch hackers could get your data
2015/9/18
They’re the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at the University of Illinois at Urbana-Champaign.Using a ...
Researchers work to counter a new class of coffee shop hackers
counter a new class coffee shop hackers
2015/1/20
If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wi-fi, think again. The bad guys may be able to see what you’re doin...
Cybersecurity: It's about way more than countering hackers(图)
Cybersecurity countering hackers
2014/12/1
It's tense in the situation room. A cyber attack on the electrical grid in New York City has plunged Manhattan into darkness on a day that happens to be the coldest in the year. Concurrently, the cell...
It's tense in the situation room. A cyber attack on the electrical grid in New York City has plunged Manhattan into darkness on a day that happens to be the coldest in the year. Concurrently, the cell...
A game theoretic framework for evaluation of the impacts of hackers diversity on security measures
Security Modelling Quantitative security evaluation Markov chains Game theory
2012/4/22
Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of i...
The aim of the paper is to look at the way hackers act and ways in which society can protect itself. The paper will show the current views and attitudes of hackers in an Australian context. The paper ...
Virtuous Hackers: developing ethical sensitivity in a community of practice
Virtuous Hackers ethical sensitivity
2009/12/7
It is estimated that losses due to computer break-ins by malicious 'crackers' (who might be external intruders or disgruntled employees intent on personal gain or revenge) are costing companies billio...
《Hackers,Heroes of the Computer Revolution》(图)
Hackers,Heroes of the Computer Revolution Steven Levy
2009/5/31
ng of the word "any."
Dick Sunderland Chalk-complexioned MBA who believed that firm managerial bureaucracy was a worth goal, but as president of Sierra On-Line found that hackers didn't think that ...