Showing 41 - 60 results of 76 for search '"The Hacker"', query time: 0.05s Refine Results
  1. 41

    The Nexus between CDS Premiums and Exchange Rates: Evidence from BRICS Countries and Türkiye by Fatih Güzel, Yüksel İltaş

    Published 2024-12-01
    “…Utilizing the RALS-LM unit root test and the RALS-EG cointegration test, and Hacker and Hatemi-J bootstrap causality test, this research circumvents the limitations commonly associated with traditional econometric approaches. …”
    Get full text
    Article
  2. 42

    TÜRKİYE’DE DÖVİZ KURU OYNAKLIĞI VE HANEHALKI HARCAMALARI ARASINDAKİ İLİŞKİ by Doç. Dr. Hakan Demirgil, Dr. Öğr. Üyesi Süha Çelikkaya

    Published 2019-12-01
    “…Çalışma verileri1998-2017 yılları arasında üçer aylık periyotlar kullanılarak oluşturulmuştur.Döviz kuru belirsizliğine ait değerlerin elde edilmesinde GARCH modelinden faydalanılmıştır.Reel tüketim harcamaları ve döviz kuru belirsizliği arasındaki nedensellikilişkisini incelemek amacıyla Hacker ve Hatemi-J (2006) simetrik ve Hatemi-J(2012) asimetrik nedensellik testleri uygulanmıştır. …”
    Get full text
    Article
  3. 43

    Altın, Borsa, Döviz Piyasalarının Ekonomik Güven Endeksine Etki Sınaması: Türkiye Örneği by Salih Barışık, Engin Dursun

    Published 2021-05-01
    “…Ardından değişkenler arasında nedensellik ilişkileri incelenmek üzere sırasıyla, Toda-Yamamoto ve Boostrapa Dayalı Hacker-Hatemi J Granger Nedensellik Testi, Hatemi ve Roca Asimetrik Nedensellik Testi, Balcılar vd. …”
    Get full text
    Article
  4. 44

    A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation by Abid Mahboob, Muhammad Asif, Muhammad Nadeem, Aysha Saleem, Sayed M. Eldin, Imran Siddique

    Published 2022-01-01
    “…In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise confusion in cipher text and the security of encryption directly depends on the algebraic strength of S-box. To avoid a hacker attack, researchers are focusing on creating dynamic S-boxes that are much stronger. …”
    Get full text
    Article
  5. 45

    THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS by Victoria M. Varenyk, Iryna M. Miro, Zoia S. Pestovska

    Published 2025-01-01
    “…The list of threats has been expanded according to the following criteria: - by the nature of implementation: overt - obsolescence of equipment, programs, technologies; covert - hacker attacks; - by the mechanism of influence: indirect - lack of motivation among teachers for research, advanced training, or the introduction of innovative teaching methods; direct - an overly large administrative apparatus, irrational management structure and division of responsibilities, or insufficient control; - by the place of origin: internal threats, as threats can also originate within the institution - insufficient qualifications of top management, reluctance of teachers to develop, sabotage of new technologies, corruption or bribery, unethical behavior. …”
    Get full text
    Article
  6. 46

    Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal by Chia‐Hung Lin, Jian‐Xing Wu, Neng‐Sheng Pai, Pi‐Yun Chen, Chien‐Ming Li, Ching Chou Pai

    Published 2022-05-01
    “…The average NPCR, UACI, and correlation coefficient (CC) are 96.57%, 35.43%, and 0.005, respectively, between the plain PPG and the encrypted PPG data against hacker attacks. The larger‐the‐better of NPCR and UACI indexes and the smaller‐the‐better of CC index are obtained to evaluate the efficiency of the proposed cryptography method. …”
    Get full text
    Article
  7. 47

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…In a public channel, IoMTS must ensure information security for protection against hacker attacks. Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. …”
    Get full text
    Article
  8. 48

    Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF by Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI

    Published 2022-06-01
    “…Aiming at the problem that APT analysis reports have not been fully utilized, and there is a lack of automation methods to generate structured knowledge and construct feature portraits of the hacker organizations, an automatic knowledge extraction method of APT attacks combining entity recognition and entity alignment is proposed. …”
    Get full text
    Article
  9. 49

    Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data by Abhishek Sharma, May Bantan

    Published 2025-02-01
    “…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). …”
    Get full text
    Article
  10. 50

    Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud by Vikas K. Soman, V. Natarajan

    Published 2024-01-01
    “…The data in the cloud is highly vulnerable and may fall prey to hackers. The hackers tend to attack the data in the public network, deteriorating the range of confidentiality and the authentication of the data. …”
    Get full text
    Article
  11. 51

    Implementation of Coding Theory with The Extended Hamming Code in Steganography by Nurul Jannah, Nur Hamid

    Published 2024-01-01
    “…Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. …”
    Get full text
    Article
  12. 52

    Research towards IoT-oriented universal control system security model by Jin-cui YANG, Bin-xing FANG, Li-dong ZHAI, Fang-jiao ZHANG

    Published 2012-11-01
    “…In Internet of things,the control loop of industrial Ethernet and real-time Ethernet is easily exploited by hackers for malicious attacks,causing serious security incidents in the physical world; a universal control system model (IoTC) was put forward by analysing the working principle of the control system in IoT,on which some disturbing factors the system faces were discussed; for the disturbing factors in the system,one universal control system security model (S-IoTC) was given,adding security authentication module in responding disturbing factor to achieve secure system; the components,safety justice and typical realization process of S-IoTC were also described in detail at last.…”
    Get full text
    Article
  13. 53

    Research on Face Recognition Method by Autoassociative Memory Based on RNNs by Qi Han, Zhengyang Wu, Shiqin Deng, Ziqiang Qiao, Junjian Huang, Junjie Zhou, Jin Liu

    Published 2018-01-01
    “…In order to avoid the risk of the biological database being attacked and tampered by hackers, an Autoassociative Memory (AAM) model is proposed in this paper. …”
    Get full text
    Article
  14. 54

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  15. 55

    A comparison of several intrusion detection methods using the NSL-KDD dataset by hazem salim abdullah

    Published 2024-06-01
    “… The increasing significance of cybersecurity underscores the critical necessity of addressing evolving methods of hackers. This research investigates the way to classify and predict cyber-attacks on the NSL-KDD dataset using intrusion detection methods the investigation contrasts the capabilities of various algorithms, including RNN, MLP, CNN-LSTM, and ANN, in recognizing attacks. …”
    Get full text
    Article
  16. 56

    A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS by Nguyễn Sĩ Hòa, Lại Thị Nhung, Đặng Thanh Hải

    Published 2017-06-01
    “…This is mainly due to the hackers’ progress, the advent of new technologies, and the fact that today’s systems are increasingly complex and it is difficult to manage all risks. …”
    Get full text
    Article
  17. 57

    Analysis of security extension protocol in e-mail system by Jingjing SHANG, Yujia ZHU, Qingyun LIU

    Published 2020-12-01
    “…E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.…”
    Get full text
    Article
  18. 58

    ANTI-WEBSITE DEFACEMENT SYSTEM by Trần Đắc Tốt, Đặng Lê Nam, Phạm Nguyễn Huy Phương

    Published 2018-07-01
    “…Recently the impacts of hackers’ attacks which change the interface and content of Website are particularly serious. …”
    Get full text
    Article
  19. 59

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “…Data from the device can be hacked and modified by hackers. By implementing encryption algorithms on Bluetooth Low Energy devices it can guarantee data confidentiality aspects and can prevent hackers from eavesdropping and stealing data. …”
    Get full text
    Article
  20. 60

    The effect of using Naive Bayes to detect spam email by Sun Zehui

    Published 2025-01-01
    “…However, it has also become a channel for spreading undesirable information, such as content from hackers, viruses, violence, pornography, and superstition. …”
    Get full text
    Article