Zobrazeno 1 - 10
of 3 968
pro vyhledávání: '"P‐hacking"'
Autor:
Romagna, Marco, Leukfeldt, Rutger E.
Publikováno v:
Journal of Crime & Justice; Oct2024, Vol. 47 Issue 4, p511-529, 19p
Autor:
BONCEA ADRIAN, STEGĂROIU CARINA-ELENA
Publikováno v:
Analele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, Vol 1, Iss 5, Pp 354-360 (2024)
Technological evolution has encouraged migrating more and more towards the smart tech in every domain of human life activity, from being able to order a cab and watch the route followed on our smartphones to using our smartwatches to pay for grocerie
Externí odkaz:
https://doaj.org/article/e5dfebba8f3f445b8fc7a0dfbc289ed3
Autor:
Samuel N. John, Etinosa Noma-Osaghae, Danjuma Sunday Shadrach, Adati Elkanah Chahari, Chiroma Libra Wamdeo, Ime Ukeme Udioko
Publikováno v:
Academy Journal of Science and Engineering, Vol 18, Iss 2, Pp 139-156 (2024)
n the rapidly evolving landscape of digital communication, ensuring data security remains a paramount concern. This research proposes a hybrid encryption technique that combines the strengths of Elliptic Curve Cryptography (ECC) and the Data Encrypti
Externí odkaz:
https://doaj.org/article/581122bba7d642dba5dc2ef5f36c838a
Autor:
Thomas F. Johnson, Benno I. Simmons, Joseph Millard, Tanya Strydom, Alain Danet, Amy R. Sweeny, Luke C. Evans
Publikováno v:
Methods in Ecology and Evolution, Vol 15, Iss 10, Pp 1771-1773 (2024)
Abstract Large‐language models (LLMs) have the potential to accelerate research in ecology and evolution, cultivating new insights and innovation. However, whilst revelling in the plethora of opportunities, researchers need to consider that LLM use
Externí odkaz:
https://doaj.org/article/708aa34e6fe045b196097f22d157fe4b
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 3, Pp 410-448 (2024)
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by practitioners within the industry or underground communities. Similarly, academic researchers have also contributed to developing security tools. However, the
Externí odkaz:
https://doaj.org/article/f85a105f61314b72b081b1a9ece2f3d3
Autor:
Daphne Esquivel-Sada
Publikováno v:
Socio-anthropologie, Vol 49, Pp 81-98 (2024)
In the wake of the global bio-hacker endeavour to appropriate biotechnologies for one’s own ends, this article looks into the relation of bio-hackers to living materials. My aim is to contribute to the discussion on living materials by perusing the
Externí odkaz:
https://doaj.org/article/256db804746d4b3fa0aac04591d4eec1
Publikováno v:
International Journal of Ethics and Society, Vol 6, Iss 2, Pp 9-19 (2024)
Introduction: One of the important topics in the field of information technology is hacking the information systems of societies, that is, finding the security weaknesses of a system to penetrate and access its information. which can be done with var
Externí odkaz:
https://doaj.org/article/5f64a6cadfad43828bf623cbad5a5231
Publikováno v:
KSII Transactions on Internet & Information Systems; Jun2024, Vol. 18 Issue 6, p1619-1637, 19p
Autor:
Michael Dorin
Publikováno v:
South Sustainability, Vol 5, Iss 1 (2024)
Teaching ethical hacking requires access to a safe and controlled environment where students can practice skills presented to them. This can be a problem since many modern students attend class remotely, which makes lab access challenging. Virtualiza
Externí odkaz:
https://doaj.org/article/e56eb168abee44ffb3a0d71f6ee0f456
Autor:
Azadeh Rooholamini, Mahla Salajegheh
Publikováno v:
BMC Medical Education, Vol 24, Iss 1, Pp 1-16 (2024)
Abstract Background While the concept of hacking in education has gained traction in recent years, there is still much uncertainty surrounding this approach. As such, this scoping review seeks to provide a detailed overview of the existing literature
Externí odkaz:
https://doaj.org/article/cd9b598ef71b41a8946cda3b4c073ff2