[PDF][PDF] Composition patterns of hacking

S Bratus, J Bangert, A Gabrovsky… - … on Cyber Patterns, 2012 - academia.edu
… Many activities labeled as hacking lack sophistication. In this paper we discuss not hacking,
but … 1Discussed in the hacker community since at least early 2000s, see [2] for a brief history …

Hacking the Curriculum, Disabling Composition Pedagogy: The Affordances of Writing Studio Design.

B Garrett - Composition Forum, 2018 - ERIC
… can "hack" standard curricular spaces and institute more inclusive writing pedagogies. One
form of hacking can … off-shoot from normative composition instruction. Writing Studio disables …

Hacking design: Novelty and diachronic emergence

T Ireland, E Zaroukas - Architectural Theory Review, 2012 - Taylor & Francis
… a difference we consider how patterns of spatial formation may … To do this we introduce the
idea of hacking, as a way of … between specific levels of composition. What this means is that …

The illicit ecosystem of hacking: A longitudinal network analysis of website defacement groups

RC Perkins, M Ouellet, CJ Howell… - Social Science …, 2023 - journals.sagepub.com
… rich insight into the interpersonal dynamics of hackers, research on the unique ecosystems
… of hackers’ ecosystems by incorporating the group affiliations which link hackers to one …

Compiler hacking for source code analysis

G Antoniol, M Di Penta, G Masone, U Villano - Software Quality Journal, 2004 - Springer
… , in that they provide pattern-matching languages and a way … possibility of using visitor design
patterns to visit the AST for … types makes the query composition very simple. Given an AST, …

Hacking Composition: Rethinking Codeswitching in Writing Discourse

S Rabbi - 2014 - JSTOR
… He also highlights a striking assumption by composition as a field: that we have prematurely
adopted a pedagogy developed through research on spoken language varieties without …

Knowledge of limitations: Hacking practices and creativity ideologies in chipmusic

M Polymeropoulou - Volume!, 2019 - cairn.info
… AcidJazzed evening is an alternation of three main music blocks; three thematic patterns.
Block A is the primary melody and dominates the composition. The sequence is A/B/A/B/C/A/AB…

[PDF][PDF] Hacking, mashing, gluing: a study of opportunistic design and development

B Hartmann, S Doorley, SR Klemmer - Pervasive Computing, 2006 - academia.edu
… ” of parts in novel ways, rather than the composition of additional new musical material. …
design patterns for software engineers [12] and glueware often instantiates these patterns in …

Yoneda hacking: The algebra of attacker actions

G Bakirtzis, F Genovese, CH Fleming - ACM Transactions on Cyber …, 2022 - dl.acm.org
… attacks by itself, attack pattern databases (for example, MITRE … Formal composition rules
could overcome some of the new … by providing formal composition and traceability between the …

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge

M Ceccato, P Tonella, C Basile, P Falcarin… - Empirical Software …, 2019 - Springer
… The exact composition of the hacker teams, such as the name and the number of the hacker
… concepts, a clear pattern of tampering with the data emerges: hackers set a breakpoint in the …