Showing 1 - 6 results of 6 for search 'hacker (term)', query time: 0.03s Refine Results
  1. 1
  2. 2
  3. 3

    Uptake and 4-week outcomes of an ‘opt-out’ smoking cessation referral strategy in a London-based lung cancer screening setting by Anthony Edey, Neal Navani, Kitty Chan, Graham Robinson, Janine Zylstra, Paul Robinson, Laura Green, Anand Devaraj, Jane Rowlands, Allan Hackshaw, Carolyn Horst, Arjun Nair, Sam M Janes, Kate Davies, Jeannie Eng, Mamta Ruparel, Samantha L Quaife, Jennifer L Dickson, Magali Taylor, Angshu Bhowmik, Hasti Robbie, Joseph Jacob, Laura Farrelly, Sophie Tisi, Tanya Patrick, Andrew Creamer, Helen Hall, Samanjit Hare, Jon Teague, Samuel M Janes, Esther Arthur-Darkwa, Thea Buchan, Stephen Ellis, Thomas Callender, Rachael Sarpong, John McCabe, Zaheer Mangera, Ethaar El-Emir, Terry O'Shaughnessy, Geoff Bellingan, Nick Screaton, Priyam Verghese, William M Ricketts, Vicky Bowyer, Kylie Gyertson, Fanta Bojang, Claire Levermore, Tania Anastasiadis, Ruth Prendecki, Amyn Bhamani, Malavika Suresh, Judy Airebamen, Alice Cotton, Kaylene Phua, Elodie Murali, Simranjit Mehta, Karen Parry-Billings, Columbus Ife, April Neville, Zahra Hanif, Helen Kiconco, Ricardo McEwen, Dominique Arancon, Nicholas Beech, Derya Ovayolu, Christine Hosein, Sylvia Patricia Enes, Qin April Neville, Aashna Samson, Urja Patel, Fahmida Hoque, Hina Pervez, Sofia Nnorom, Moksud Miah, Julian McKee, Mark Clark, Anant Patel, Sara Lock, Rajesh Banka, Ugo Ekeowa, Charlotte Cash, Tunku Aziz, Alberto Villanueva, Elena Stefan, Charlie Sayer, Navinah Nundlall, Andrew Crossingham, Tanita Limani, Kate Gowers, Andrew Perugia, James Rusius, Anne-Marie Hacker, Monica L Mullin, Evangelos Katsampouris, Chuen R Khaw, Chuen Khaw, Sheetal Karavadra, Alan Shaw, Chris Valerio, Ali Mohammed, Lynsey Gallagher, Mehran Azimbagirad, Burcu Ozaltin, Maureen Browne, Eleanor Hellier, Catherine Nestor

    Published 2025-02-01
    Get full text
    Article
  4. 4

    Computer Network Attacks and Modern International Law by A. L. Kozik

    Published 2014-04-01
    “…States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. …”
    Get full text
    Article
  5. 5

    Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data by Abhishek Sharma, May Bantan

    Published 2025-02-01
    “…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). …”
    Get full text
    Article
  6. 6