Learn about hacker types and the difference between hackers and crackers.
Also find me here:
Baeldung Author
Hana Rhim
I am a passionate researcher and experienced writer in the field of Information technology and Communications with a bachelor’s degree in computer sciences engineering. I have published several articles in international revues and conferences as well as on web platforms for IT. The area of my research interests includes computational intelligence and optimization methods, distributed communication in computer networks, and Cyber Security.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Security (5)
- Networking (3)
- Algorithms (2)
- Math and Logic (1)
- Artificial Intelligence (1)
What Are Cryptojacking Attacks?
Filed under Security
Learn about cryptojacking attacks and their potential dangers.
What Are Key Derivation Functions?
Filed under Security
What do we use a KDF for in cryptography?
What Are Impersonation Attacks?
Filed under Networking, Security
Learn what impersonation attacks are.
Security: Interruption vs. Interception vs. Modification vs. Fabrication
Filed under Networking, Security
Learn about four types of cybersecurity attacks: interruption, interception, modification, and fabrication.
What Is Quality of Service in Networking ?
Filed under Networking
Learn about the ways to define and measure the quality of service in networking.
Tabu Search
Filed under Algorithms
Learn more about Tabu Search.
Combinatorial Optimization
Filed under Math and Logic
Learn more about Combinatorial Optimization Problems
How Does Particle Swarm Optimization Work?
Filed under Algorithms, Artificial Intelligence
Introduction to Particle Swarm Optimization.