Q122090570 | Hackeři |
Q122025398 | Protidžihádistický vigilantismus v kyberprostoru |
Q121995273 | Securita: chci vědět víc |
Q122097343 | Vpád: stručné dějiny ruských hackerů |
Q99557068 | "It's not just hacking for the sake of it": a qualitative study of health innovators' views on patient-driven open innovations, quality and safety |
Q216269 | 23 |
Q47873760 | A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model |
Q59540621 | A nexus of Cyber-Geography and Cyber-Psychology: Topos/“Notopia” and identity in hacking |
Q56902733 | A smart vision of brain hacking |
Q57570492 | ADS: Protecting NTFS from hacking |
Q50309918 | An adolescent case with Internet addiction and hacking: how are we dealing with this diverse spectrum of disorder? |
Q37959094 | An inside job: hacking into Janus kinase/signal transducer and activator of transcription signaling cascades by the intracellular protozoan Toxoplasma gondii |
Q103837719 | Analysis goals, error-cost sensitivity, and analysis hacking: Essential considerations in hypothesis testing and multiple comparisons |
Q56884167 | Anxiety about internet hacking: Results from a community sample |
Q95292806 | Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors |
Q812608 | Bayrische Hackerpost |
Q61654781 | Building and hacking open source hardware |
Q91340075 | Cell Biology: Hacking Alpha Satellites out of the HAC |
Q89715511 | Claims of Russian hacking in BDA elections |
Q57616566 | Co-Curation as Hacking: Biohackers in Copenhagen's Medical Museion |
Q118123148 | Coding freedom : the ethics and aesthetics of hacking |
Q57308988 | Cognitive hacking and intelligence and security informatics |
Q99632099 | Collaboration between Law Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study about ATM Hacking |
Q107919737 | Community structure and trophic relationships of the fish fauna of an estuarine Posidonia Australis seagrass habitat in port hacking, new South Wales |
Q110512483 | Compiler Hacking for Source Code Analysis |
Q70934684 | Computer science: Hacking into the cyberworld |
Q55035320 | Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome. |
Q63196549 | Considering the potential of criminal profiling to combat hacking |
Q106629042 | Cracking the Codes of Black Power Struggles: Hacking, Hacked, and Black Lives Matter |
Q93181812 | Creativity on Demand - Hacking into Creative Problem Solving |
Q88600843 | DIY Biology - hacking goes viral! |
Q108736781 | Dear Yahoo: A Comment on In Re Yahoo Mail Litigation |
Q92973573 | Detecting cognitive hacking in visual inspection with physiological measurements |
Q40732214 | Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times. |
Q88344729 | Encryption and watermark-treated medical image against hacking disease-An immune convention in spatial and frequency domains |
Q95935493 | Enhanced Golic+: Highly effective CRISPR gene targeting and transgene HACKing in Drosophila |
Q56674246 | Ethical Hacking |
Q54139162 | Ethical hacking |
Q56673204 | Evolution of User-generated Translation: Fansubs, Translation Hacking and Crowdsourcing |
Q96648061 | Examination of Hacking and Blunt Force Skeletal Trauma |
Q47426135 | Exploiting bilosomes for delivering bioactive polysaccharide isolated from Enteromorpha intestinalis for hacking hepatocellular carcinoma |
Q58658115 | Failing, hacking, passing: Autism, entanglement, and the ethics of transformation |
Q63549481 | Fashion Hacking |
Q38400239 | Free-space QKD system hacking by wavelength control using an external laser |
Q38640256 | From hacking the human genome to editing organs |
Q80950784 | Gene hacking |
Q46649341 | Gene regulation: hacking the network on a sugar high |
Q57270495 | Genome hacking |
Q38028807 | HACking the centromere chromatin code: insights from human artificial chromosomes. |
Q109853338 | HackCurio |
Q30487726 | HackaMol: An Object-Oriented Modern Perl Library for Molecular Hacking on Multiple Scales |
Q189304 | Hacker Manifesto |
Q106267162 | Hackers and the Dark Net: A Look into Hacking and the Deep Web |
Q66498388 | Hacking |
Q58507956 | Hacking 101: Does It Appear We Are Training The Cyberspace Criminals Of The Future? |
Q107399216 | Hacking 360 Link: A hybrid approach |
Q91761807 | Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors |
Q110511639 | Hacking Adaptation: Updating, Porting, and Forking the Shakespearean Source Code |
Q58572366 | Hacking Aging: A Strategy to Use Big Data From Medical Studies to Extend Human Life |
Q58510961 | Hacking Blackboard: Customizing Access to Library Resources Through the Blackboard Course Management System |
Q57174330 | Hacking CD/DVD/Blu-ray for Biosensing |
Q88727078 | Hacking Cancer Metabolism |
Q47876221 | Hacking DNA copy number for circuit engineering |
Q50421104 | Hacking Hackathons: Preparing the next generation for the multidisciplinary world of healthcare technology. |
Q85645072 | Hacking Heats Up |
Q84945750 | Hacking History: Redressing Gender Inequities on Wikipedia Through an Editathon |
Q96132893 | Hacking Human Beings with Machine Biology to Increase Lifespan |
Q24645018 | Hacking RNA: Hakai promotes tumorigenesis by enhancing the RNA-binding function of PSF |
Q107399509 | Hacking Summon |
Q107399379 | Hacking Summon 2.0 The Elegant Way |
Q110540880 | Hacking agency: Apps, autism, and neurodiversity |
Q50155063 | Hacking an Algal Transcription Factor for Lipid Biosynthesis. |
Q58197460 | Hacking and the security curriculum |
Q58973920 | Hacking at the Divide Between Polar Science and HPC: Using Hackathons as Training Tools |
Q38119462 | Hacking cell differentiation: transcriptional rerouting in reprogramming, lineage infidelity and metaplasia |
Q55673880 | Hacking code/space: Confounding the code of global capitalism |
Q92356995 | Hacking conservation: how a tech start-up aims to save biodiversity |
Q54090439 | Hacking diabetes: DIY artificial pancreas systems. |
Q44110294 | Hacking drones |
Q85812880 | Hacking health care |
Q39951285 | Hacking hexokinase halts tumor growth |
Q60064241 | Hacking in court |
Q98825460 | Hacking in the public interest: Authority, legitimacy, means, and ends |
Q35574148 | Hacking into bacterial biofilms: a new therapeutic challenge |
Q56510411 | Hacking into the granuloma: Could antibody antibiotic conjugates be developed for TB? |
Q58986742 | Hacking is a crime |
Q50110979 | Hacking macrophage-associated immunosuppression for regulating glioblastoma angiogenesis. |
Q38107818 | Hacking medical devices a review - biomed 2013. |
Q44650468 | Hacking medicine... |
Q56997937 | Hacking memes |
Q37718153 | Hacking on decoy-state quantum key distribution system with partial phase randomization |
Q89331445 | Hacking plant P450s for production of medicine |
Q54360780 | Hacking rules for E. coli. |
Q47390987 | Hacking shock. |
Q99244943 | Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination |
Q97549935 | Hacking systemic lupus erythematosus (SLE): outcomes of the Waterlupus hackathon |
Q91715792 | Hacking teamwork in health care: Addressing adverse effects of ad hoc team composition in critical care medicine |
Q92461605 | Hacking the 'Cellular Immunology Agency': T cells caught in the act |
Q38914687 | Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution |
Q68209445 | Hacking the Brain: Dimensions of Cognitive Enhancement. |
Q92085279 | Hacking the Cancer Genome: Profiling Therapeutically Actionable Long Non-coding RNAs Using CRISPR-Cas9 Screening |
Q59357408 | Hacking the Human: The Prevalence Paradox in Cybersecurity |
Q56770649 | Hacking the JPEG/PDF tree format |
Q50463807 | Hacking the Matrix. |
Q106987575 | Hacking the Research Library: Wikipedia, Trump, and Information Literacy in the Escape Room at Fresno State |
Q58188261 | Hacking the Storage and Preservation of Social Media Data |
Q37079411 | Hacking the code of amyloid formation: the amyloid stretch hypothesis |
Q39836958 | Hacking the genetic code of mammalian cells |
Q33211031 | Hacking the genome |
Q79876878 | Hacking the genome |
Q38477830 | Hacking the health system: using public key infrastructure to protect health information on the Internet. |
Q47355589 | Hacking the hospital environment: young adults designing youth-friendly hospital rooms together with young people with cancer experiences |
Q89756798 | Hacking the host: exploitation of macrophage polarization by intracellular bacterial pathogens |
Q84476893 | Hacking the lights out. Computer viruses have taken out hardened industrial control systems. The electrical power grid may be next |
Q57523469 | Hacking the social life of Big Data |
Q48341114 | Hacking the stem cell niche. |
Q52543714 | Hacking the thylakoid proton motive force for improved photosynthesis: modulating ion flux rates that control proton motive force partitioning into Δψ and ΔpH. |
Q93659222 | Hacking through the fields of electromagnetic mania |
Q93019545 | Hacking women's health: A new methodology |
Q74543821 | Hacking your way through the jungle |
Q84583510 | Hacks, hackers and hacking |
Q92955991 | Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information |
Q91447048 | Healthcare Data Are Remarkably Vulnerable to Hacking: Connected Healthcare Delivery Increases the Risks |
Q118798430 | Help-seeking among Australian ransomware victims |
Q33384563 | High-throughput hacking of the methylation patterns in breast cancer by in vitro transcription and thymidine-specific cleavage mass array on MALDI-TOF silico-chip |
Q58361543 | History versus hacking on probability |
Q58510935 | How I Hacked Packetstorm: A Look at Hacking WWW threads by Means of SQL—Part 2 |
Q58510838 | How I Hacked Packetstorm: A Look at Hacking Wwwthreads by Means of SQL |
Q109952955 | INKLUSION I DET DIGITALE FÆLLESSKAB: Hacking af open source-software og progressiv politik i New York City |
Q59260733 | Ian Hacking, Why Is There Philosophy of Mathematics at All?, Cambridge: Cambridge University Press, 2014. Pp. xv + 290. ISBN 978-1-107-65815-8. £17.99 (paperback) |
Q57173949 | Immune Cell Hacking: Challenges and Clinical Approaches to Create Smarter Generations of Chimeric Antigen Receptor T Cells |
Q58534219 | Intervention: Hacking history, from analogue to digital and back again |
Q56521948 | Is Anonymous a New Form of Luddism?: A Comparative Analysis of Industrial Machine Breaking, Computer Hacking, and Related Rhetorical Strategies |
Q75037203 | Jamming With Edward |
Q50648413 | Less noise, more hacking: how to deploy principles from MIT's hacking medicine to accelerate health care. |
Q47203531 | Macroscopic and stereomicroscopic comparison of hacking trauma of bones before and after carbonization. |
Q44875146 | Macroscopic characteristics of hacking trauma |
Q59283096 | Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model |
Q113493162 | May Contain Hackers 2022 |
Q33181904 | Microscopic characteristics of hacking trauma. |
Q81201297 | NYPL Labs: Hacking the Library |
Q97648972 | Neurocognitive hacking A new capability in cyber conflict? |
Q100429229 | Neuromodulatory hacking: a review of the technology and security risks of spinal cord stimulation |
Q60636685 | Neuroscience: Hacking the brain to overcome fear |
Q3345582 | Noway |
Q56008584 | On the mangrove and saltmarsh vegetation near Sydney, New South Wales, with special reference to Cabbage Tree Creek, Port Hacking |
Q51519263 | Optimised quantum hacking of superconducting nanowire single-photon detectors. |
Q43244849 | P hacking in biology: An open secret |
Q28750102 | Patriot |
Q89357405 | Peptide design: Hacking hemagglutinin |
Q89555169 | Phenotypic Adaption of Pseudomonas aeruginosa by Hacking Siderophores Produced by Other Microorganisms |
Q59047756 | Plan to outlaw hacking |
Q92373355 | Prescribing Time to Temporize Burnout: Are We Hacking at the Branches, or Striking at the Root? |
Q47602326 | Primum non nocere or primum facere meliorem? Hacking the brain in the 21st century |
Q50001621 | Protein evolution: Hacking an enzyme. |
Q62427140 | Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks |
Q62538045 | Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems |
Q61833354 | Quantum hacking: attacking practical quantum key distribution systems |
Q33694738 | Quantum key distribution with hacking countermeasures and long term field trial |
Q74202743 | Researchers split over NSA hacking |
Q56021496 | Results of an exploration of aboriginal rock- shelters at Port Hacking |
Q48503295 | Retraction: Hacking on decoy-state quantum key distribution system with partial phase randomization. |
Q33221027 | Scanning electron microscopy analysis of experimental bone hacking trauma. |
Q92229720 | Sequencer Hacking Unlocks Quantitative Protein Studies |
Q108736772 | Silencing the Call to Arms: A Shift Away From Cyber Attacks as Warfare |
Q109594176 | Software Startup Education: Gamifying Growth Hacking |
Q109297764 | Software startup education: gamifying growth hacking |
Q58488348 | Solutions and frictions in civic hacking: collaboratively designing and building wait time predictions for an immigration office |
Q41720776 | Splicing: HACking into the unfolded-protein response |
Q39264898 | Synthetic Immunology: Hacking Immune Cells to Expand Their Therapeutic Capabilities |
Q95486786 | TOO VULNERABLE TO ATTACK: Multitude of medical devices pose hacking threats for providers |
Q62111505 | The Inverse Gambler's Fallacy and Cosmology—A Reply to Hacking |
Q73835532 | The hacking cough |
Q31213901 | The hidden face of the Internet |
Q55650674 | The need for specific penalties for hacking in criminal law. |
Q63196536 | The security and privacy impact of criminalising the distribution of hacking tools |
Q104746880 | Therapeutic targeting of TGF-β in cancer: hacking a master switch of immune suppression |
Q56039184 | Tools & toys: Hacking the Nokia N800 |
Q99585306 | Transcending the brain: is there a cost to hacking the nervous system? |
Q57299406 | Trolling, hacking and the 2016 US presidential election |
Q63437356 | Virtuous human hacking: The ethics of social engineering in penetration-testing |
Q44310046 | Viruses and the 26S proteasome: hacking into destruction |
Q47204995 | Wake-up call. Fraud may come later in historic Utah hacking case |
Q1371726 | Watch Dogs |
Q24455756 | Watch Dogs 2 |
Q64534648 | Watch Dogs: Legion |
Q92387580 | [Hacking into a pacemaker; risks of smart healthcare devices] |
Q68802892 | [Some possibilities of identifying hacking, stabbing and cutting weapons] |
Q113880369 | hacker convention |
Q87421102 | thebroken |