Suggested Topics within your search.
Suggested Topics within your search.
- Biology 1
- DNA 1
- English language 1
- Grammar 1
- Handbooks, manuals, etc 1
- Report writing 1
- Rhetoric 1
-
21
Preclinical evaluation of the potential PARP-imaging probe [carbonyl-11C]DPQ
Published 2025-01-01Get full text
Article -
22
-
23
-
24
Quantitative accuracy of preclinical in ovo PET/MRI: influence of attenuation and quantification methods
Published 2025-01-01Get full text
Article -
25
-
26
-
27
Dataset of speech produced with delayed auditory feedbackOpen Science FrameworkOpen Science Framework
Published 2025-04-01Get full text
Article -
28
-
29
-
30
-
31
-
32
-
33
-
34
-
35
Entre piratas y fantasmas: ciberespacio y contracultural
Published 1999-06-01“… El hacker más famosos Kevin Mitnick, logró alterar la información de muchas empresas como : New York Times, Nokia, que tuvieron un gran costo para las autoridades pertinentes. …”
Get full text
Article -
36
A general attack model based on Android system vulnerability
Published 2016-10-01“…The experiment result shows that the general model is able to accurately describe the process of hacker attacks using Android system vulnerabilities. …”
Get full text
Article -
37
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01“…With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.…”
Get full text
Article -
38
INTERNET INFLUENCE ON INTERNATIONAL POLITICS
Published 2013-08-01“…New forms of international conflicts, including information war, network wars, hacker attacks etc. are one of the negative results of the fast internet and information technologies development.At the same time development of information technology poses new challenges to international and national security, which can only be reduced through collective efforts of the international community.…”
Get full text
Article -
39
Computer Network Attacks and Modern International Law
Published 2014-04-01“…States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. …”
Get full text
Article -
40
PHILOSOPHICAL-ANTROPOLOGICAL ASPECTS OF A PROBLEM OF SEARCH EXTRA-TERRESTRIAL OF CIVILIZATIONS
Published 2013-09-01“…The positive and negative scripts of dialogue with ETAI, problem «of high quality of a signal» and «SETI-hacker», connected with ETAI as by the subject of space dialogue are considered. …”
Get full text
Article