Hacking

Results: 3953



#Item
21Hacking History: Automatic Historical Event Extraction for Enriching Cultural Heritage Multimedia Collections! Roxane Segers1 , Marieke van Erp1 , Lourens van der Meij1 , Lora Aroyo1 , Guus Schreiber1 , Bob Wielinga1 , J

Hacking History: Automatic Historical Event Extraction for Enriching Cultural Heritage Multimedia Collections! Roxane Segers1 , Marieke van Erp1 , Lourens van der Meij1 , Lora Aroyo1 , Guus Schreiber1 , Bob Wielinga1 , J

Add to Reading List

Source URL: iswc2011.semanticweb.org

Language: English - Date: 2011-09-21 04:17:15
    22The Importance of Security Research: Four case studies How hacking automotive vehicles, medical devices, voting machines, and internet of things devices makes them safer. Authors: Joseph Lorenzo Hall, Apratim Vidyarthi,

    The Importance of Security Research: Four case studies How hacking automotive vehicles, medical devices, voting machines, and internet of things devices makes them safer. Authors: Joseph Lorenzo Hall, Apratim Vidyarthi,

    Add to Reading List

    Source URL: cdt.org

      23Is a Digital Geneva Convention in our future? Malicious hacking and cyberattacks have been all over the news lately, from the dangers of Internet of Things products to the allegations of Russian intervention in the U.S.

      Is a Digital Geneva Convention in our future? Malicious hacking and cyberattacks have been all over the news lately, from the dangers of Internet of Things products to the allegations of Russian intervention in the U.S.

      Add to Reading List

      Source URL: d2oc0ihd6a5bt.cloudfront.net

      - Date: 2017-06-28 23:54:09
        24MTO 21.1: Duker, Hacking the Music Theory Classroom

        MTO 21.1: Duker, Hacking the Music Theory Classroom

        Add to Reading List

        Source URL: www.mtosmt.org

        - Date: 2015-03-31 08:03:08
          25Civic Hacking (If you’re a non-geek, ask your neighbor what “hacking” is.) Joshua Tauberer Free Culture Conference October 11, 2008

          Civic Hacking (If you’re a non-geek, ask your neighbor what “hacking” is.) Joshua Tauberer Free Culture Conference October 11, 2008

          Add to Reading List

          Source URL: razor.occams.info

          - Date: 2008-10-12 09:16:28
            26Hacking & Hardening Kubernetes By Example Slides: goo.gl/TNRxtd Demos: goo.gl/fwwbgB

            Hacking & Hardening Kubernetes By Example Slides: goo.gl/TNRxtd Demos: goo.gl/fwwbgB

            Add to Reading List

            Source URL: schd.ws

            - Date: 2017-12-08 12:33:56
              27REPORT  Hacking the Skills Shortage A study of the international shortage in cybersecurity skills  Center for Strategic and

              REPORT Hacking the Skills Shortage A study of the international shortage in cybersecurity skills Center for Strategic and

              Add to Reading List

              Source URL: www.mcafee.com

              - Date: 2017-12-31 10:52:08
                28QS17 Hacking Stress Using biometrics to identify and quantify mental stress Introduction What is stress?

                QS17 Hacking Stress Using biometrics to identify and quantify mental stress Introduction What is stress?

                Add to Reading List

                Source URL: qs17.quantifiedself.com

                - Date: 2017-08-10 20:28:55
                  29Hacking bIOTech  Get your hands on IoT October 18th 2017, Swiss Cyber Storm, Lucern KKL,   compass-security.com

                  Hacking bIOTech Get your hands on IoT October 18th 2017, Swiss Cyber Storm, Lucern KKL, compass-security.com

                  Add to Reading List

                  Source URL: swisscyberstorm.com

                  - Date: 2017-12-04 07:36:26
                    30By  GREGORY CONTI, Guest Editor HACKING AND INNOVATION

                    By GREGORY CONTI, Guest Editor HACKING AND INNOVATION

                    Add to Reading List

                    Source URL: www.rumint.org

                    - Date: 2010-02-27 03:08:06