Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Naveed ahmed
Leeds Metropolitan University
Verified email at student.leedsbeckett.ac.uk
Cited by 29239
Hacking
Artificial Intelligence
Pentesting
Rohit Kumar
Student
Cited by 12022
Hacking
Space science
Majer
Cited by 8067
Hacking
William Cheswick
University of Pennsylvania
Verified email at cheswick.com
Cited by 6424
security
visualization
hacking
Seungjoo Kim
Professor at the School of Cybersecurity in Korea University
Verified email at korea.ac.kr
Cited by 4784
Security Engineering
Cryptography
Blockchain
Hacking
Tim Jordan
University College London
Verified email at ucl.ac.uk
Cited by 4583
Digital Cultures
Internet Studies
Hacking
Hacktivism
Social Movements and Protest
Rui Miguel Silva
Professor do Instituto Politécnico de Beja
Verified email at ipbeja.pt
Cited by 2819
Segurança Informática
Segurança em Redes Informáticas
Hacking
Ali Saif
Student of Commerce, University of the Punjab
Verified email at einnovention.co.uk
Cited by 2561
Onology
Hacking
Cryptocurrency trades
Health and fitness
Technology
Vincent Fernandez
@HackerVincentf
Verified email at softype.com
Cited by 1760
Hacking
Web Penetration Tester
jatoth srinivas
(student)diploma in computer science
Cited by 1542
latatest technology
networking
programing
hacking
science
1 - 10
Privacy
Terms
Help
About Scholar
Search help