Login / Signup
Hacking into Hacking: Gender and the Hacker Phenomenon.
Alison E. Adam
Published in:
SIGCAS Comput. Soc. (2003)
Keyphrases
</>
penetration testing
intelligence and security informatics
security threats
data sets
neural network
database
feature selection
computer networks
security mechanisms