Biohacking Village - Russian Cyber Threats in The Pandemic Era
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | ||
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/49890 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
CyberneticsInformationstheorieWeb syndicationHacker (term)CyberneticsStrategy gameGroup actionSelf-organizationComputer animation
01:06
SoftwareComputerComputer networkCyberneticsOperations researchStability theoryArtificial intelligenceStrategy gameFrequencyDisintegrationPhysical systemSystem programmingINTEGRALPhysical systemSoftwareBusiness informaticsInformationstheorieField (computer science)Food energyElement (mathematics)WeightArtificial neural networkComputer networkCartesian coordinate systemComputer animation
02:17
BuildingRange (statistics)Prime idealControl flowSoftwareOperations researchMathematicsInformationstheorieService (economics)Self-organizationInformation securityTheoryOcean currentTelecommunicationSoftwareDirection (geometry)Surface of revolutionVirtual machineFile formatCyberneticsBusiness informaticsEvent horizonState of matterField (computer science)Statement (computer science)HypothesisStaff (military)Web 2.0Functional (mathematics)Chaos (cosmogony)CodeSubset2 (number)CryptographyPlastikkarteQuicksortObject (grammar)Power (physics)Sinc functionMereologyComputer animation
05:54
Execution unitDivision (mathematics)Magneto-optical driveObservational studyHacker (term)ForceHypermediaProduct (business)SoftwareVolumeInformationstheoriePlastikkarteControl flowOperations researchCyberneticsTelecommunicationComputerComputer networkDrop (liquid)Social softwareOrder (biology)Maß <Mathematik>Execution unitObservational studyCase moddingGroup actionCyberneticsHacker (term)Division (mathematics)Traffic reportingCentralizer and normalizerOperator (mathematics)BuildingRepository (publishing)Forcing (mathematics)InformationstheorieInformation securityVector potentialSoftwareMultilaterationStudent's t-testPhysical systemGame controllerMusical ensembleDomain nameProjective planeStatement (computer science)Software developerSelf-organizationVulnerability (computing)Data managementFile formatDoubling the cubeBitFatou-MengeBusiness informaticsCryptographyIncidence algebraSpektrum <Mathematik>Data structureTelecommunicationComputerWireless LAN
10:50
Menu (computing)Pattern languageRepeating decimalInformation managementHill differential equationNormed vector spaceMotion blurThomas KuhnExecution unitInformationstheorieSource codeGroup actionTerm (mathematics)Virtual machineComputer virusPermanentSurgeryDivision (mathematics)Basis <Mathematik>RoboticsStatement (computer science)Food energyMultimediaMedical imagingField (computer science)Distribution (mathematics)Computer simulationSupercomputerDirection (geometry)Information securityCyberneticsSoftware testingCategory of beingExecution unitBitArmSoftware developerTelecommunicationUniverse (mathematics)Self-organizationSimulationEnterprise architectureElectronic signatureRepresentation (politics)Portable communications deviceSign (mathematics)Projective planeComputer animation
16:17
Information securityInformationstheorieSimulationProduct (business)EncryptionService (economics)Term (mathematics)Hacker (term)Scalable Coherent InterfaceExecution unitComputerLink (knot theory)ForceTablet computerState of matterCryptographyInformationstheorieVery-high-bit-rate digital subscriber lineBlack boxCyberneticsGroup actionIn-System-ProgrammierungRow (database)EmailTelecommunicationData conversionWave packetBitExecution unitInternet service providerContent (media)Tap (transformer)CausalityField (computer science)SoftwareProjective planeLine (geometry)SubsetOperator (mathematics)Real-time operating systemForcing (mathematics)Physical systemSlide ruleService (economics)Resolvent formalismMeasurementDifferent (Kate Ryan album)Hacker (term)Computer animation
19:04
IntranetComputer networkSocial softwareLinker (computing)TwitterTopologyInternetworkingTablet computerSoftwareInformation securityHacker (term)InformationstheorieSelf-organizationService (economics)Execution unitProjective planePower (physics)Server (computing)Link (knot theory)Design by contractOrder (biology)SoftwareLeakEndliche ModelltheorieHypermediaAsynchronous Transfer ModeWeightInternet der DingeKolmogorov complexity
20:53
Computer programDiagramLocal GroupKolmogorov complexityStrategy gameHacker (term)Attribute grammarData managementOperator (mathematics)Projective planeOrder (biology)Process (computing)Kolmogorov complexityMathematicsGame controllerTask (computing)Computer animation
22:25
InformationstheorieComputer virusMaizeExplosionFingerprintCyberneticsInformationstheorieStrategy gameContent (media)Condition numberGroup actionView (database)Self-organizationShared memoryMultiplication signWeb syndicationMusical ensembleInformation securityTraffic reportingChannel capacityHypermediaElement (mathematics)Connectivity (graph theory)Natural languageComputer crime
25:32
Complex (psychology)CyberneticsEuclidean vectorDenial-of-service attackEmailVariety (linguistics)SoftwareHypermediaSocial softwareComputing platformWebsiteComputer networkImage registrationTime domainRemote Access ServiceWeb 2.0Mobile appPhysical systemCorrelation and dependenceHoaxCyberneticsPhysical systemWeb 2.0Virtuelles privates NetzwerkSlide ruleHypermediaComputer virusElement (mathematics)Remote procedure callTrailSoftwareConnectivity (graph theory)Cartesian coordinate systemComputer animation
26:08
Personal digital assistantDomain nameComputerAndroid (robot)Tap (transformer)Gamma functionInformationstheorieSlide ruleNumberVideo gameCartesian coordinate systemSelf-organizationHoaxLevel (video gaming)EmailTrailImage registrationDomain nameGroup actionComputer crimeStrategy gameLink (knot theory)GoogolTouchscreenFrequencyUniverse (mathematics)Computer animation
27:36
Exploit (computer security)Time domainLocal area networkHacker (term)AlgorithmFunction (mathematics)Computer forensicsSoftwareTrojanisches Pferd <Informatik>VotingEncryptionServer (computing)Information securityVirtuelles privates NetzwerkGame controllerTranslation (relic)Computer configurationInternet forumNatural languageMalwareComputing platformService (economics)Product (business)InformationstheorieLevel (video gaming)PasswordVulnerability (computing)MalwareOperator (mathematics)Group actionSelf-organizationHacker (term)HoaxInternet forumFrequencyPatch (Unix)Exploit (computer security)InternetworkingDomain nameCohen's kappaFilm editingOrder (biology)Semiconductor memoryPhysical systemEmailCodeCategory of beingRemote procedure callStrategy gameGame theoryServer (computing)Presentation of a groupGame controllerDeep WebCyberneticsPhysical lawSoftwareTask (computing)WebsiteMultiplication signCommunications protocolAlgorithmEncryptionScripting languageRootComputer animation
32:36
EmailWordMacro (computer science)Self-organizationComputer wormInformationstheorieFunction (mathematics)Motion captureTouchscreenCyberneticsTemplate (C++)Vector spaceOffice suiteLink (knot theory)System identificationNatural languageCodeWeb pageAddress spaceInjektivitätComputer networkScripting languageGroup actionMacro (computer science)InternetworkingGamma functionTemplate (C++)SoftwareEmailCodeSelf-organizationInjektivitätAddress spaceFrequencyGame controllerComputer fileMultiplication signIP addressRemote administrationComputer crimeComputer animation
35:06
Service (economics)Staff (military)Compilation albumPlastikkarteMaizeLink (knot theory)Hacker (term)Local GroupComputerVirtual realitySystem programmingLaptopEmailPasswordInternet service providerComputer crimeInformationstheorieService (economics)Business informaticsGroup actionLink (knot theory)Variety (linguistics)Server (computing)Multiplication signConnected spaceVulnerability (computing)PasswordRemote procedure callEmailForschungszentrum RossendorfEncryption
36:47
EncryptionData modelComputerComputer fileRSA (algorithm)Uniqueness quantificationAdvanced Encryption StandardEmailHacker (term)Local GroupManufacturing execution systemRemote procedure callEmailSelf-organizationPhysical systemVulnerability (computing)Communications protocolGroup actionInformation securityEndliche ModelltheorieHacker (term)Process (computing)Trojanisches Pferd <Informatik>Open setComputer wormInformationstheorieEncryptionVector spaceRecursive descent parserMusical ensemble
38:39
ImplementationDynamic random-access memorySupremumHacker (term)InformationstheorieDeep WebStrategy gameStaff (military)CASE <Informatik>BitInternet forumOrder (biology)ChainDivisorAuthenticationCyberneticsPresentation of a groupPhysical systemElement (mathematics)Web 2.0MalwareSheaf (mathematics)Multiplication signWave packet
Transcript: Englisch(auto-generated)