全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Hicham Hammouchi , Othmane Cherqi , Ghita Mezzour ...
来源:[J].Procedia Computer Science, 2019, Vol.151, pp.1004-1009
摘要:Abstract(#br)Data breaches represent a permanent threat to all types of organizations. Although the types of breaches are different, the impacts are always the same. This paper focuses on analyzing over 9000 data breaches made public since 2005 that led to the loss of 11,5 b...
来源:[J].Biometric Technology Today, 2020, Vol.2020 (3), pp.12-12
摘要:The much-criticised US facial recognition firm Clearview AI – which offers a database of over 3 billion faces to police forces worldwide – has been hacked and had its entire client list stolen.
作者:Yong Wu , Junlin Duan , Tao Dai ...
来源:[J].Decision Analysis, 2020
摘要:Nowadays, firms tend to outsource security operations to professional managed security service providers (MSSPs) as a result of the sophistication of strategic hackers. Thus, how an MSSP makes security decisions according to a strategic hacker’s action is worth researching. ...
作者:賴曉黎(Shao-Lee Lai)
来源:[J].資訊社會研究, 2004, (6), pp.149-172Airiti
摘要:This article discusses one important behavior of Internet: downloading. Why do people share their informations, softwares, movies and music etc. with others on Internet? We find hackers’ “gift culture” is the archetype of all sharing on Internet. Also, the author tries ...
作者:岳文波 , 鲍正德 , 唐娅雯
来源:[J].计算机系统网络和电信, 2019, Vol.1 (2)USP
摘要:...这篇文章主要介绍了网络安全的定义和网络安全特征,浅析了诛如黑客犯罪、计算机网络病毒,计算机物理设备不稳定等网络安全隐患和这些隐患所带来的危害,预测了用户可以采用一些方法好比提高防火墙...
作者:王振宇
来源:[J].计算机系统网络和电信, 2019, Vol.1 (2)USP
摘要:...特别是计算机信息系统,其利用通信网络实现互联互通,数据通过互联网进行远程传输、远程访问和资源共享的过程中,黑客和不法分子也在利用其实施网络渗透、窃密甚至攻击。随着社会各行各业互联网...
作者:邱 俊峰 , 李 林
来源:[J].计算机系统网络和电信, 2019, Vol.1 (4)USP
摘要:...网上的黑客利用不同手段的攻击原理来破解或者 “偷盗”等恶意行为。SQL注入就是现在随处可见,而且也是比较常见的一种攻击方式,熟知其原理能够让我们有效的防范这个部分的恶意攻击。
作者:關詩珮(Uganda Sze Pui KWAN)
来源:[J].中國現代文學, 2016, (30), pp.5-20Airiti
摘要:Humanoid Software is a widely acclaimed science fiction written by the Hong Kong writer Albert Tam in 2010. The story reflects the haunting belief that human being in one day will be subservient to technology. Within a limited amount of hours of imitating its master's behavi...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×