Science topic
Hacking - Science topic
This community was a community of people who had a large interest in computer programming
Questions related to Hacking
The paper The Limitations of Deep Learning in Adversarial Settings explores how neural networks might be corrupted by an attacker who can manipulate the data set that the neural network trains with. The authors experiment with a neural network meant to read handwritten digits, undermining its reading ability by distorting the samples of handwritten digits that the neural network is trained with.
I'm concerned that malicious actors might try hacking AI. For example
- Fooling autonomous vehicles to misinterpret stop signs vs. speed limit.
- Bypassing facial recognition, such as the ones for ATM.
- Bypassing spam filters.
- Fooling sentiment analysis of movie reviews, hotels, etc.
- Bypassing anomaly detection engines.
- Faking voice commands.
- Misclassifying machine learning based-medical predictions.
What adversarial effect could disrupt the world? How we can prevent it?
So, with some difficulties I have been able to do wavelet analysis for a time series datasets that I have. The thing is, all these data sets can be combined to form a year long dataset, with some gaps as big as a month.
A solution to this is to interpolate the data. But considering that my data has a sampling rate of 10 mins with one month gap would not allow to pursue this solution.
For discontinuous(unevenly ) spaced data, instead of FFT, Lomb-scargle periodogram is used. If someone can suggest a hack like that for wavelet analysis, it'd be highly appreciated.
I am currently working on Intrusion Detection System for in-vehicular network and I have studied the HCRL Car Hacking dataset. Is there any python code available for LSTM-based Intrusion Detection System for In-Vehicle CAN Bus Communication?
I am currently working on Intrusion Detection System in in-vehicle system. I have recently gone through the study of HCRL Car Hacking Dataset. I have understood the mechanism of DoS attack and their values mentioned in the excel and also how the message is being classified as normal or infected. The problem I am facing is in the understanding of Fuzzy and Spoofing Attack. How do we classify the message as normal or infected on the basis of random injection of the messages? Is there any specific pattern to identify them on the manual basis?
1-Analysis of the security vulnerabilities of the protocol (MAVLink),
2- Based on the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV (ethical hacking).
mission in progress (ethical hacking). This attack can be empirically validated in a dedicated platform.
3- Development of a cyber attack detection algorithm.
4- Implementation of different encryption algorithms (i.e. AES-CBC, AES-CTR, RC4 and ChaCha20) in order to secure the MAVLINK communication against attacks.
Secure the MAVLINK communication against malicious cyber-attacks.
Through virtual spaces and services, the metaverse can transcend the limitations of time and space, increase the convenience of life, and even create new modes of financial activity and work. But if the nature of the metaverse is an extension of our current online world, then we undoubtedly need to think about the myriad unsolved problems in the current network: problems of hacking, phishing, harassment, information privacy, hate speech, user addiction, etc. See, The Metaverse will also be at risk. What are the social implications of the metaverse?
By referring to some scientific resources we've found that the brain produces Some signals that relate to its activities and monitored by EEG. The question is "Can we force the brain to do some actions by injecting signals (in a direct or indirect way)?".
All you need to know is available at www.P-Curve.com. An almost-new concept that is is being popular in many Meta-Analysis papers. [by Simonsohn, Uri and Nelson, Leif D. and Simmons, Joseph P.]
A recent #review_article and #meta_analysis with #P_Curve and #MRI and #fMRI studies including finally 18 articles about the #fusiform_face_area. (With topics on #publication_bias or #p_hacking , #replication_crisis and #R codes )
Title = P-curving the fusiform face area: Meta-analyses support the expertise hypothesis.
Link = https://www.sciencedirect.com/science/article/abs/pii/S014976341830798X#:~:text=Meta%2Danalyses%20support%20the%20existence,be%20correlated%20with%20behavioural%20performance.
I was searching in the journal "Journal of Computer Virology and Hacking Techniques" webpage
for a Word template but I was only able to find a Latex template.
Does anyone know how to get the Word template?
Has anyone tried before submitting to this journal so they can share the template?
Please help me out with this.
Thanks.
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes
I am currently using a 20uL tip to create scratch but apparently, with every new biological replicate exp, I do not get uniform or similar scratch as the previous exp. Any hacks/tips on how to achieve a uniform scratch every time? Also, Pls recommend the best tool/software to accurately measure the widths? Thank you.
Are there any law regulating cybersecurity in medical devices?
The field of research and business applications in the field of obtaining, archiving, analyzing and processing data in Big Data database systems has been developing strongly for several years.
There were hacking theft of personal, sensitive and secret data regarding users of social networks.
Are the results of research known, or are you familiar with publications describing risk management processes in the area of obtaining, archiving, analyzing and processing data in Big Data systems run by technological internet companies such as Google, Facebook, etc.
Technological internet companies such as Google, Facebook, etc. have the ability to obtain classified, sensitive and personal data from the Internet about the users of websites, including search engines and social media portals, who use these information services.
For the needs of these considerations, the issue of the security of classified data stored in Big Data database systems run by internet technology companies managing social media portals should be added.
There have been frequent thefts made by cybercriminals who, from these Big Data systems, stole classified and sensitive information about hundreds of thousands or millions of users of particular social media portals.
The development of social media portals therefore generates an increased risk of theft of data on users of social media portals.
Therefore, technological internet companies that run social media portals but also other companies that collect large amounts of data about users of specific, information services should continually develop and improve risk management systems for potential data loss from Big Data information resources.
Due to the above, in many companies, especially in large corporations, integrated risk management systems are built and improved.
Integrated risk management systems combine risk management processes in various areas of a company, institution or other organization.
One of the areas of risk management, the importance of which in many companies is growing, is risk management in the area of obtaining, archiving, analyzing and processing data in Big Data database systems.
In view of the above, I am asking you: Is the risk of cybercriminal attacks on Big Data database systems that contain personal data of social media portal users growing?
Please, answer, comments. I invite you to the discussion.
Online mobile banking is dynamically developing because pro-development factors continue to outweigh the factors limiting this development.
The main development factors are the reduction of operating costs for banks and facilitating remote access to banking services, including mobile payments to clients.
Currently, the only barrier to development can be increased activity of cybercriminals stealing data from online banking clients, hacking into online bank accounts of customers and robbing clients of financial means. However, banks have so far quickly identified this type of cybercrime incidents and have been gradually improving their mobile banking security systems.
Another factor limiting the development of online mobile banking may be the number of bank customers interested in this type of banking.
What are the other key determinants of the development of mobile banking?
Please answer
Thank you very much
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
In recent weeks/months, I have received literally dozens of notices from Elsevier to indicate that a journal that was added to its centralized online submission and peer review tracking system, called EVISE, has now been transferred to Editorial Manager (EM), which is owned by Aries Systems Corporation. Much time was used adding journals to EVISE, only now to see that time wasted as journals get shifted. In some / many (?) cases of the transfers to EM, we have to waste time adding new details. I contacted Elsevier about this and got no response. So, my questions to any academic who might know about this, are:
1. Is EVISE being phased out?
2. Is there a security risk or technical or other problems with EVISE?
3. Have there been instances of hacking that might have compromised the integrity of journal submission? This is because one EVISE account (username + password) allows for access to multiple journals.
If others have experienced this, please share.
What if I make my machine stuck with a physical hardware switch when someone attacks my computer ? Can it be a good feature as all access is based on NIC card and what if I disable it when a hacker tries to hack my computer ?
AI Safety Issues can be categorized into five main classes including "Safe Exploration", "Scalable oversight", Avoiding “reward hacking” and “wire heading”, "Avoiding negative side effects" and "Robustness to distributional shift" (Amodei et al. (2016). Concrete Problems in AI Safety).
Can we categorize safety assurance of Evolutionary Optimisation Algorithms (e.g. Genetic Algorithm) as Safe Exploration?
Is there any approach for quantitative safety evaluation of such algorithms?
Thanks for your time and consideration.
Does Hacking in softwares, has any creative angle ? is it proper creativity or we need to change the Direction of ideation ?
does hacking also promotes the creation of other software solutions.? if yes should we accept it correct.
As an ADMINISTRATIVE NOTICE, RG seems to have human oversight, software problems, and lack of control of entry. RG may have been hacked, which is common under COVID. Things will likely get worse, next. But, we don't have to bear it.
This and other discussions on RG are hereby suspended.
Indian government launch the arogya setu app for tracking the covid-19 I fection and alert the user .
But I have a question what if some one is providing false information to app, does it will create a loophole? For example- A man hacked Google Maps to cause cause virtual traffic jam with 99 phones. Berlin: Call it bizarre but a German artist Simon Weckert has posted a video on YouTube, showing how he "hacked" Google Maps with 99 smartphones and a wagon to create "virtual traffic jams" on the streets of Berlin.
will it affect the community if app shows fake infection?
Hey guys,
I am a MSc student who is looking for a cyber security project for my dissertation.
I am really trying to find a practical concept related to penetration testing or ethical hacking but I do not know a lot about the filed and I'm struggling to find an idea. My goal would be to learn more about pen testing while doing this project.
Our university has suggested penetration testing on IoT devices but other people have chosen this project already.
Has anybody got any other ideas?
Thank you all.
The python library TensorFlow (TF) is proving to have many powerful applications (https://www.tensorflow.org/about/case-studies). What TF programming 'hacks', generalized or specific applications are you interested in?
I have devised a system of simply embedding data directly into cryptocurrency transactions. It is quite flexible and powerful because it can be triggered from light clients/smart phones. I call it DiMECASH and have a site devoted to displaying the messages that I write:. https://dime.cash/doge
Generally, it is a hack, but then so are op_return codes.
9sJAZZxHANDSxJAZZxHANDSzzzzzZmzWcE
This is an example that works on Doge. Mixed with a system of checksums embedded as Satoshi codes, this becomes very powerful and flexible.
I am looking for collaborators. I think this is disruptive in it's simplicity.
I am looking for case studies of actual privacy risks. At the core of privacy and data protection impact assessments, we find the concept of 'risk' meaning - in this case - the probability of a threat to personal data and the possible harm or damage caused by this threat. E.g. I fall victim to a phishing attack and the attacker gains access to my bank account, the actual harm being that my account is emptied. Another example would be that my account at a social media platform is hacked and my identity is used to "go shopping".
Now, one finds a lot of literature on privacy (PIA) and data protection impact assessments (e.g. the edited volume by Wright and De Hert (2012) on PIA), on the potential risks of low levels of data security (e.g. Rosner, Kenneally (2018): Clearly Opaque: Privacy Risks of the Internet of Things), on technological and organization standards (e.g. ISO 27001 on Information security management), or on the regulatory frameworks of privacy and data protection (e.g. everything on the details of the GDPR in the EU). But I have a hard time to find research results evaluating actual risks similar to your risk to fall victim to a traffic accident, have your home being broken into, or get cancer.
I would welcome any hint to empirical publications on actual privacy risk analysis be it from medical, social, internet-based or any other research that you consider as most important. I am *not* looking for literature on how to conduct privacy and data protection impact assessments or standards for this purpose. Thank you.
Is EO suitable only to provide global food production monitoring or it can help also to farmers in developing countries? Is the resolution of current EO limitation? Where EO could help to farmers? What could be killing applications? Are this climatic analysis or some other analysis? This and more other questions we are trying to answer in EO4Agri projects http://www.eo4agri.eu/ . See our gap analysis report https://www.researchgate.net/publication/336022413_EO4AGRI_D22-Initial-Workshop-User-Requirements-and-Gap-Analysis-in-Different-Sectors-Report-v10 and try to help us identify additional possibilities or comment our conclusion. During the project we already discussed our ideas with African community during Nairobi INSPIRE Hack https://www.plan4all.eu/2019/04/team-1-progress-report-i/
Multi-factor authentication (MFA) adds a layer of security that allows companies to protect against the leading cause of data breach — compromised credentials. Users provide extra information or factors when they access corporate applications, networks and servers. Is Multi-factor authentication can be hacked? Yes/No and How?
Your thoughts?
After the use of paper hack tools such as sci-hub the majority of journals prefer the open-access format where the authors pay the publication to be shared. Do you think we ll still have pay to download publications where the authors don't pay the journal?
I'm trying to find a detailed procedure (reaction or experimental section) or manual for doing a certain process or operating an instrument
Can you please share some tricks or keywords or database address to use to fulfill my aim
Hello to everyone:
I'm studying an active fault and I'm trying to use the SL or Hack Index (Hack, 1972). I've read a lot of papers that use this index, and I understand the theory, but I don't know how to compute it or applied it with the computer.
I have the DEM, the watershed, the main stream, etc. all on GIS, so now I need to compare the SL index profile and the elevation profile and find knickpoints.
Thank you!!!
Sebastián
Let's discuss a scenario where a thief sends an email with a fake link, hoping a user will click it. And the link could install malicious software, malware, in the user's computer. And the malware could transmit sensitive information back to the thief, you know, such as passwords. And this is fairly typical. Phishing schemes are becoming very common, because if you send them out to 10,000 people, you're probably gonna have 500 to 700 people who are dumb enough to click on them. How frequent and effective is Phishing schemes?
In connection with the development of cybercrime on the Internet, the security systems for transfer and processing of data, financial transactions, electronic banking, etc. carried out on the Internet are improved. In addition to electronic banking, the key information security in the internal IT systems of central state institutions is protected. Cybercriminal attacks on cyber-banking systems and hacker attacks aimed at companies to extort ransom for decrypting data encrypted by computer viruses on disks (cybercriminal ransomware attacks) and hack attacks from abroad on key central institutions, ministries and other institutions of the public administration sector and enterprises of strategic branches of the national economy.
In connection with the above, I am asking you:
Do you think, for security reasons, everything that happens on the Internet should be analyzed by the public security services?
Please answer
Best wishes
Quite an interesting article in the latest edition of Wired magazine which argues that we need to re-secure the blockchain. The article argues that hackers will use quantum computing technologies to hack supposedly unhackable blockchains and that the two technological forces must come together. Can we push for collaboration between these two seemingly competing technologies ?
CASIA v 2.0 database is actually available at http://forensics.idealtest.org/casiav2/
But, google says it is hacked and some malware is there in the site.
Please suggest me how I can download the dataset?
Anybody Please share the dataset offline.
Thanks in advance.
If software and hardware could prevent every security threat, there would be no intrusions, hacking, malware, or ransomware – yet there is news about new attacks almost daily. Why? Security is a process, not a product. The most effective cybersecurity operations require 24/7 monitoring with a Security Operations Center (SOC), separation of true security threats and information from the benign, and immediate response.
source: https://www.onshore.com/managed-security-services-panoptic-cyberdefense/cybersecurity-in-banking/
Determine Inherent Risk Profile Management can determine the institution’s overall Inherent Risk Profile based on the number of applicable statements in each risk level for all activities (Figure 2). For example, when a majority of activities, products, or services fall within the Moderate Risk Level, management may determine that the institution has a Moderate Inherent Risk Profile. Each category may, however, pose a different level of inherent risk. Therefore, in addition to evaluating the number of instances that an institution selects for a specific risk level, management may also consider evaluating whether the specific category poses additional risk.
Is there a dataset already available to use?
I tried this with http://www.zone-h.com and apparently this collection should be handled manually, which unfortunately is very time-consuming. Is there a better way to collect this information?
I was working with a client-server project based on UDP and 802.11 as a link and physical layer. There, Client was trying to probe some packets in the wireless channel to gauge channel condition. This function is required to set up the transmission speed & estimate packet drop rate in my client application. To carry out that function, It is required to measure the number of re-transmission that is occurring in IEEE 802.11. In the transport layer, there won't be any re-transmission as UDP is used but if the wireless channel is bad (no acknowledgement from the receiver MAC) the IEEE802.11 wifi NIC will re-transmit. How should I measure the number of re-transmission in IEEE 802.11 layer? Say for 200 packets from application how many re-transmission in IEEE 802.11 layer?
Or Is there any kernel hack that will stop the IEEE802.11 re-transmission feature?
Today due to the hacking exploits, data security is a major concern for both consumers and companies.
The sheer potential scale of AI’s reach in consumer and IoT applications makes security even more crucial.
From recent study people now are deeply concerned about security (85%) and where their data is stored in the network, be it in edge devices or the cloud.
#artificialIntellicence #machine #companis #IOT #Security #Network #edge #device #cluod #Intelligenza #Artificiale #sicurezza #dispositivo #Randieri #Intellisystem #IntellisystemTechnologies
Cochlear implants help those with hearing loss. These devices demonstrate that in principle implantable electronic devices can improve human functioning. It seems we are headed for an era when cognition can be improved by implanted computers. Maybe the implants will come with wifi, enabling the user to access information available on the internet. Artificial enhancement of intelligence has been explored, for example, in the story Flowers for Algernon and in the movie depiction of it, Charly. We are getting closer to electronic implants. (See for example, http://www.innovationmanagement.se/2018/03/23/the-vast-benefits-of-tech-implants-in-the-human-brain/). Suppose it becomes possible. What would happen if someone could hack into people’s brains via their implanted wifi connections? Will science begin to advance exponentially? Will it cure dementia? Are there committees of the wise looking at these issues?
I am having a difficulty in implementing the Permutation Renormalization and Bootstrap method described by Faust et al in Microbial Co-occurrence Relationships in the Human Microbiome. My key difficulty appears to be in resolving visibly distinguishable communities with igraph. Community detection finds distinct communities (Louvain method), but I am still having trouble generating network plots with clearly distinct clusterings/communities of nodes. The networks "look" random and have densely packed edges.
While I thought this was to be expected given the number of nodes in my network is 2700, using the method created by Faust et al just doesn't seem to mark enough correlations as insignificant. I've even tried taboos like p-value hacking and setting percentile thresholds on the resulting nodes that are marked as "significant" in an effort to cut down on nodes.
To give an idea of the network's scale, I used a subset of my abundance data consisting only of 1,500 OTUs out of the original 2700 (by setting the rowsum abundance threshold to 12) when following only the protocol in the literature I get a network with 500,000 edges (In networks constructed with all 2700 OTUs or close to, that number approaches 3,000,000). The testing only appears to be removing roughly half of all edges. I am also removing all negative edges as I am interested in co-occurence only at this point in time.
I further pruned this network by setting a 99th percentile threshold on the correlation strengths of the significant correlations. I was then able to get a network of ~5,000-10,000 edges depending on the specific threshold. I'd like to say that the network is sufficient but this is obviously not the case. Is there any insight anyone can give me with this problem? Should I use the method in Faust to only remove correlations due to compositional effects and then perform a percentile threshold on the remaining correlations?
Today due to the hacking exploits, data security is a major concern for both consumers and companies.
The sheer potential scale of AI’s reach in consumer and IoT applications makes security even more crucial.
From recent study people now are deeply concerned about security (85%) and where their data is stored in the network, be it in edge devices or the cloud.
#AI #Machines #Personal #Information #security #both #consumer #applications #network #cloud #devices
Almost every properly configured commercial system will have only one TCP/IP port open to the Internet: Port 80.
Since this is the only way into the system, hackers will try many different ways to compromise it via this port. Surprisingly, there are only about 80 to 90 different hack queries in common use over the last 6 years, or so.
Commonly available IDS/IPS systems seem to only fall into one category, which keeps a blacklist of several hundred thousand malicious addresses, to which it refers every time a query appears on port 80. To stay current, the blacklist is updated every few days.
Since there are only about 80 distinct hack query formats, doesn't it make more sense to evaluate the threat by examining the query?
That's how we designed our IPS
I am trying to fit graphene in very with very poor laser lanes and am trying to put the peaks in the right place. However, many times, the data has a lot of noise, and it is very hard to eliminate these errors. Basically, I am manually trying to unselect a few data points that are obviously noise and hope the peaks to go to the right place. It does not always work though. If you know something else that I can do, let me know please.
Protandim and NRF2 stimulator do that. Any researcher want to add some thing, I cordially invite them. I am very thankful to your suggestion.
I am a cyber security expert and have worked in corporate penetration testing/ethical hacking teams. I am interested in the scheduling and capacity problem in determining the elements required to scale individual and team operations for optimum coverage and efficiency. There is a mystique to cyber security, but in reality, cyber security in general and security testing itself are skillsets that can be detected, taught, developed and put to use to get work done. I'm interested in applying literature on the scheduling problem to implement scaling and efficiency in this new application.
I would like to know the process of creating a Hack's stream gradient index map using only ArcGIS software.
I would like to hack a digital burette (Brand Titrette) and a pH meter connected to a platinum electrode with which I am measuring electrical potential during a titration. I would like to integrate data from the digital burette and the meter so that I can automate data entry into an excel spreadsheet and streamline data collection used to generate a titration curve (x-axis: volume, y-axis: potential) that would be used to identify the equivalence point of the titration.
Can anyone recommend a hack that I could use for this purpose? Let me know what other information would be helpful.
Thank you, JS
These days many attackers are using mechanisms of making fraudulent phone calls (vishing) to collect vital information of people and then use them to trace their credentials and finally hack their credit and debit cards for money thefts. Another very prevalent ways of web application hacking is through phishing. There prevalent ways to tackle these are mostly precautionary, however, these precautions are mostly non-waranted from a lay man or a non-commoner or a less versed cyber user. We need more automated ways of handling them.
how to wordpress site paypall plugin hacking link ?
There are lots of hacking way to hack the internet server, i want to prevent my server by those types of hacking. How ?
As we known till now Virtualization has reduce the cost of buying operating system and IT equipment's for many companies, I am looking at how easy it is to hack live migration in a Linux cloud with different tools such as Xin and KVM to exploit vulnerabilities in the cloud.
How can we receive data shown on the screen in queue management prior to reaching the screen so that it can be transmitted over a long distance.?
Hello,
I am working on congestion control in IoT. I have found that CoAP is able to handle it. It works on UDP.
I have some question about MQTT.
1) Can MQTT able to handle congestion? If yes, then How?
2) MQTT uses TCP as a underlying transport protocol. It uses fully TCP or do some hacks in it and use it.
These questions are important for my work.
Thanks
Vishal
I would like to know where I can find a good open source urls dataset that represent different kind of web attacks that could be generate a defacement in a web page
What are the current security threats and vulnerabilities cloud users such as organizations and companies are facing? could you suggest me research papers, reports or documents related with the question?
Can someone reccomend me some ethnographic works in coding (software engineering) and hacking?
Thanks.
The source code of a program often contains a number of constants. Sometime, these constants are well used to create a ROP attack. In general, how do these constants play a significant role in being leveraged to create a successful exploit?
Reflection allows creating an instance of a class having private constructor, this is a loop hole of Java, is there any purpose behind this feature/bug?
According to cisco enterprise mobility, it is stated that "Even if port security is not an option to stop MAC flooding in wireless networks, the MAC flooding attack is unsuccessful when launched by a wireless user. The reason for this is the 802.11 protocol itself. The association to an AP is MAC-based; this means that the AP bridges (translational bridge) traffic coming only from or going to known users or known MACs. If a MAC flooding attack is launched from a wireless user, all the 802.11 frames with random source MAC addresses that are not associated to the AP are dropped. The only frame allowed is the one with the MAC of the malicious user, which the switch has probably already learned. Thus, the operation of the access point prevents the switch from being susceptible to MAC flooding attacks."
I am going through the literature survey for DHCP attacks. I would be thankful if someone provide me some reference for the same.
Studying malwares behaviour might be complicated but after we do behaviour analysis of malware, what advantages can we get?