|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 254 occurrences of 176 keywords
|
|
|
Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli |
Open to Grok. How do Hackers' Practices Produce Hackers?. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
OSS ![In: Open Source Development, Communities and Quality, IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, OSS 2008, September 7-10, 2008, Milano, Italy, pp. 121-129, 2008, Springer, 978-0-387-09683-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 |
Real-Time Emulation of Intrusion Victim in HoneyFarm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 143-154, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
interception proxy, reverse firewall, Honeypot, intrusion |
70 | Iksu Kim, Myungho Kim |
The DecoyPort: Redirecting Hackers to Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 59-68, 2007, Springer, 978-3-540-74572-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos |
Search Engines as a Security Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 34(10), pp. 25-30, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
56 | David Geer |
Hackers Get to the Root of the Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(5), pp. 17-19, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Hackers, Rootkits |
50 | Jörg Preuß, Steven Furnell, Maria Papadaki |
Considering the potential of criminal profiling to combat hacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 135-141, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Alexander E. Voiskounsky, Olga V. Smyslova |
Flow in Computer Hacking: A Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 176-186, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(4), pp. 17-19, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Immersion lithography, Spam, Malware, E-mail, Botnets, Hackers, Semiconductors |
48 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 196-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
45 | Gerry V. Dozier, Douglas Brown, John Hurley, Krystal Cain |
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (1) ![In: Genetic and Evolutionary Computation - GECCO 2004, Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings, Part I, pp. 263-274, 2004, Springer, 3-540-22344-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Sinchul Back, Jennifer LaPrade, Lana Shehadeh, Minju Kim |
Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2019, Stockholm, Sweden, June 17-19, 2019, pp. 410-413, 2019, IEEE, 978-1-7281-3026-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Gregory B. Newby |
Paths to creativity in security careers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 3, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Syed A. Saleem |
Ethical hacking as a risk management technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 201-203, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
37 | Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant |
Semantics-Aware Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 32-46, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(2), pp. 21-23, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IM.Myspace04.AIM, Broadband services, Instant messaging, Internet security, Internet security, Hackers, Domain names |
36 | Cindy Cullen |
Internet vulnerabilities of one-time passcode mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 20th Conference on Local Computer Networks (LCN'95), Minneapolis, Minnesota, USA, October 16-19, 1995, pp. 184-186, 1995, IEEE Computer Society, 0-8186-7162-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification |
33 | Igor V. Kotenko |
Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEEMAS ![In: Multi-Agent Systems and Applications III, 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003, Prague, Czech Republic, June 16-18, 2003, Proceedings, pp. 464-474, 2003, Springer, 3-540-40450-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Daniela K. Rosner, Jonathan Bean |
Learning from IKEA hacking: i'm not one to decoupage a tabletop and call it a day. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 419-422, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ikea, creative tools, design, DIY |
25 | Pei-Te Chen, Chi-Sung Laih |
IDSIC: an intrusion detection system with identification capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(3), pp. 185-197, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs) |
25 | V. Kavitha, K. S. Easwarakumar |
Neural Based Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2004: Trends in Artificial Intelligence, 8th Pacific Rim International Conference on Artificial Intelligence, Auckland, New Zealand, August 9-13, 2004, Proceedings, pp. 429-435, 2004, Springer, 3-540-22817-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Greg Goth, Benjamin Alfonsi |
News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 8-13, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Linda Dailey Paulson |
Stopping Intruders Outside the Gates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(11), pp. 20-22, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Marlene Campbell |
Ethics and computer security: cause and effect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the Sixteenth ACM Annual Conference on Computer Science, Atlanta, Georgia, USA, February 23-25, 1988, pp. 384-390, 1988, ACM, 0-89791-260-8. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
23 | David Alan Grier |
Honor Among Thieves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 42(11), pp. 12-15, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Computing profession, Computers and society, Hackers |
23 | Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung |
A study of online service and information exposure of public companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 85-90, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious hackers, public company, public server, web server, ports, cyber security |
23 | David Alan Grier |
Outposts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(3), pp. 8-10, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
blogs, computers and society, computing technology, hackers |
23 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(8), pp. 20-22, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
optoelectronic fiber arrays, antiforensic attacks, hackers, storage technology |
23 | James William Rust |
Corporate management of computer forensics evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 175-178, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
management, information security, computer forensics, hackers, digital evidence, investigation, incident response |
23 | David Geer |
Security Technologies Go Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(6), pp. 18-21, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
computer fraud, security, phishing, hackers |
23 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(7), pp. 24-26, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Globus Alliance, Global Grid Forum, ransomware, essay-grading software, predictive model-building, self-replicating robots, grid computing, robotics, standards, software, microprocessors, Web security, hackers |
23 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(9), pp. 22-24, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology |
23 | Roland L. Trope |
A Warranty of Cyberworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(2), pp. 73-76, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cyberworthiness, software warranty, software makers, security, hackers |
23 | George Chamales |
The Honeywall CD-ROM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(2), pp. 77-79, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
23 | Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer |
Computer Forensics Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(4), pp. 15-23, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
education, forensics, hackers, computer crime |
20 | Sonam Bhardwaj, Mayank Dave |
RAKSHAM: Responsive approach to Knock-off scavenging hackers and attack mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 35(1), January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Cameron John Hoffman, C. Jordan Howell, Robert C. Perkins, David Maimon, Olena Antonaccio |
Predicting new hackers' criminal careers: A group-based trajectory approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 137, pp. 103649, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Ken Owen, Milena M. Head |
Motivation and Demotivation of Hackers in Selecting a Hacking Task. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 63(3), pp. 522-536, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Anum Atique Paracha, Junaid Arshad, Muhammad Mubashir Khan |
S.U.S. You're SUS! - Identifying influencer hackers on dark web social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 107, pp. 108627, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Happe, Jürgen Cito |
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.07057, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nathaniel Knopf |
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication - Robert W. Gehl and Sean T. Lawson (Cambridge, MA, USA: MIT Press, 2022, 344 pp.). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Technol. Soc. Mag. ![In: IEEE Technol. Soc. Mag. 42(1), pp. 13-15, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jing Hou, Xuyu Wang, Amy Z. Zeng |
Inter-Temporal Reward Decisions with Strategic Ethical Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2023, Orlando, FL, USA, October 2-5, 2023, pp. 1-9, 2023, IEEE, 979-8-3503-3945-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Happe, Jürgen Cito |
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2023, San Francisco, CA, USA, December 3-9, 2023, pp. 1669-1680, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Patrick Wake, Sue Black 0001, Jonathan Young |
Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and Procedures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023, pp. 653-658, 2023, IEEE, 979-8-3503-2720-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Marie Thøgersen |
Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023, pp. 39-54, 2023, IEEE, 978-9916-9789-3-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Frank Ulrich, Sune Dueholm Müller, Stephen Flowers |
The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. Assoc. Inf. Syst. ![In: Commun. Assoc. Inf. Syst. 52, pp. 12, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
20 | David Myles Gustavsen |
Book Review: Why Hackers Win: Power and Disruption in the Network Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 24(10), pp. 2374-2376, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yuni Li, Ling Zhao 0001 |
Collaborating with Bounty Hunters: How to Encourage White Hat Hackers' Participation in Vulnerability Crowdsourcing Programs through Formal and Relational Governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 59(4), pp. 103648, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Christian Koch 0009, Katharina Müller, Eldar Sultanow |
Which programming languages do hackers use? A survey at the German Chaos Computer Club. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.12466, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, Zaghloul Saad ElSayed |
Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.01448, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
20 | Kyle Guers, Md Minhaz Chowdhury, Nafiz Rifat |
Card Skimming: A Cybercrime by Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2022 IEEE International Conference on Electro Information Technology, EIT 2022, Mankato, MN, USA, May 19-21, 2022, pp. 575-579, 2022, IEEE, 978-1-6654-8009-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Federico Echenique, Kevin He |
Screening p-Hackers: Dissemination Noise as Bait. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: EC '22: The 23rd ACM Conference on Economics and Computation, Boulder, CO, USA, July 11 - 15, 2022, pp. 791, 2022, ACM, 978-1-4503-9150-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Nitin Naik, Changjing Shang, Paul Jenkins, Qiang Shen 0001 |
D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Emerg. Top. Comput. Intell. ![In: IEEE Trans. Emerg. Top. Comput. Intell. 5(6), pp. 893-907, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Michael Iantorno |
Book Review: Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 23(6), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Cheng Huang 0003, Yongyan Guo, Wenbo Guo 0011, Ying Li |
HackerRank: Identifying key hackers in underground forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 17(5), pp. 155014772110151, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Haigh |
When hackers were heroes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 64(4), pp. 28-34, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | David Maimon, C. Jordan Howell, George W. Burruss |
Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 125, pp. 106943, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Mario Silic, Paul Benjamin Lowry |
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 23(2), pp. 329-341, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | H. Van Dyke Parunak |
Social Simulation for Non-hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MABS ![In: Multi-Agent-Based Simulation XXII - 22nd International Workshop, MABS 2021, Virtual Event, May 3-7, 2021, Revised Selected Papers, pp. 1-14, 2021, Springer, 978-3-030-94547-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Michael Bitzer, Bastian Stahl, Jacqueline Strobel |
Empathy for Hackers - an IT Security Risk Assessment Artifact for Targeted Hacker Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 29th European Conference on Information Systems - Human Values Crisis in a Digitizing World, ECIS 2021, Marrakech, Morocco, 2020, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
20 | Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen |
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2021, San Antonio, TX, USA, November 2-3, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-3838-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Bruce Schneier |
Invited Talk: The Coming AI Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCML ![In: Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings, pp. 336-360, 2021, Springer, 978-3-030-78085-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Rui Peng 0001, Hui Xiao, Jianjun Guo, Chen Lin |
Optimal defense of a distributed data storage system against hackers' attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 197, pp. 106790, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Yong Wu, Junlin Duan, Tao Dai 0006, Dong Cheng |
Managing Security Outsourcing in the Presence of Strategic Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Anal. ![In: Decis. Anal. 17(3), pp. 235-259, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Ravi Sen, Ajay Verma, Gregory R. Heim |
Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Manag. Inf. Syst. ![In: J. Manag. Inf. Syst. 37(1), pp. 191-216, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Jaime Arias 0001, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Teofil Sidoruk, Mariëlle Stoelinga |
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering - 22nd International Conference on Formal Engineering Methods, ICFEM 2020, Singapore, Singapore, March 1-3, 2021, Proceedings, pp. 3-19, 2020, Springer, 978-3-030-63405-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Ling Zhao 0001, Yuni Li |
Collaborating with White Hat Hackers: A Study of Vulnerability Crowdsourcing Program from Control Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: 24th Pacific Asia Conference on Information Systems, PACIS 2020, Dubai, UAE, June 22-24, 2020, pp. 80, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Aleksandra Pawlicka, Michal Choras, Marek Pawlicki |
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pp. 55:1-55:11, 2020, ACM, 978-1-4503-8833-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Mohammad Aref Al-Ramahi, Izzat Alsmadi, Joshua Davenport |
Exploring hackers assets: topics of interest as indicators of compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotSoS ![In: Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2020, Lawrence, Kansas, USA, September 22-24, 2020, pp. 5:1-5:4, 2020, ACM, 978-1-4503-7561-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Segundo Moisés Toapanta Toapanta, Raúl Francisco Pérez González, Maximo Giovani Tandazo Espinoza, Luis Enrique Mafla Gallegos |
Analysis of the Software Most Used by Hackers to Carry Out Penetration Testing in Public Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLIS ![In: Machine Learning and Artificial Intelligence - Proceedings of MLIS 2020, Virtual Event, October 25-28, 2020., pp. 107-114, 2020, IOS Press, 978-1-64368-136-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Keenan Skelly |
It's a war out there: why malicious hackers are beating businesses to the punch - and what we can do about it. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2019(8), pp. 6-8, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens 0001, Bjorn De Sutter |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 24(1), pp. 240-286, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Siew H. Chan, Suparak Janjarasjit |
Insight into hackers' reaction toward information security breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Manag. ![In: Int. J. Inf. Manag. 49, pp. 388-396, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan |
Open hiding for truncating hackers - a block truncation and wavelet approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 78(8), pp. 9951-9969, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Desislav Andreev, Simona Petrakieva, Ina Taralova |
A Novel Approach for Protection of Accounts' Names against Hackers Combining Cluster Analysis and Chaotic Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.04548, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
20 | Nicholas Charles Patterson, Michael Hobbs, Frank Jiang 0001, Lei Pan 0002 |
Cyber security insights into self-proclaimed virtual world hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1908.11010, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
20 | Jaime Arias 0001, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Mariëlle Stoelinga |
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1906.05283, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
20 | Helen Thackray |
Hackers gonna hack: investigating the effect of group processes and social identities within online hacking communities ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
20 | Mehdi Dadkhah, Mohammad Lagzian, Glenn Borchardt |
Academic Information Security Researchers: Hackers or Specialists? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Eng. Ethics ![In: Sci. Eng. Ethics 24(2), pp. 785-790, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Olivier Boireau |
Securing the blockchain against hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2018(1), pp. 8-11, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Morgan G. Ames |
Hackers, Computers, and Cooperation: A Critical History of Logo and Constructionist Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 2(CSCW), pp. 18:1-18:19, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Natalija Vlajic, Daiwei Zhou |
IoT as a Land of Opportunity for DDoS Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 51(7), pp. 26-34, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Shannon Rooney |
Interactive journalism: Hackers, data, and code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 20(2), pp. 837-839, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Kjell Hausken |
Proactivity and Retroactivity of Firms and Information Sharing of Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGTR ![In: IGTR 20(1), pp. 1750027:1-1750027:30, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Bin Mai, Shailesh Kulkarni |
When Hackers Err: The Impacts of False Positives on Information Security Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Anal. ![In: Decis. Anal. 15(2), pp. 90-109, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Rebecca Slayton |
Certifying "ethical hackers". ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 47(4), pp. 145-150, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, Moshe Chai Barukh |
Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: 22nd Pacific Asia Conference on Information Systems, PACIS 2018, Yokohama, Japan, June 26-30, 2018, pp. 230, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | Zahid Maqbool, V. S. Chandrasekhar Pammi, Varun Dutt |
Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4565-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Eiad Yafi, Katya Yefimova, Karen E. Fisher |
Young Hackers: Hacking Technology at Za'atari Syrian Refugee Camp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, Montreal, QC, Canada, April 21-26, 2018, 2018, ACM, 978-1-4503-5621-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Zechun Cao, Shou-Hsuan Stephen Huang |
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018, pp. 475-480, 2018, IEEE, 978-1-5386-4388-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Baidyanath Biswas, Arunabha Mukhopadhyay, Gaurav Gupta 0004 |
"Leadership in Action: How Top Hackers Behave" A Big-Data Approach with Text-Mining and Sentiment Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 51st Hawaii International Conference on System Sciences, HICSS 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018, pp. 1-10, 2018, ScholarSpace / AIS Electronic Library (AISeL). The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | Ericsson Marin, Jana Shakarian, Paulo Shakarian |
Mining Key-Hackers on Darkweb Forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIS ![In: 1st International Conference on Data Intelligence and Security, ICDIS 2018, South Padre Island, TX, USA, April 8-10, 2018, pp. 73-80, 2018, IEEE, 978-1-5386-5762-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek |
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pp. 374-391, 2018, IEEE Computer Society, 978-1-5386-4353-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Andrew J. Park, Richard Frank, Alexander Mikhaylov, Myf Thomson |
Hackers Hedging Bets: A Cross-Community Analysis of Three Online Hacking Forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASONAM ![In: IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, Barcelona, Spain, August 28-31, 2018, pp. 798-805, 2018, IEEE Computer Society, 978-1-5386-6051-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Ditte Laursen, Henriette Roued-Cunliffe, Stig Svenningsen |
Challenges and Perspectives on the Use of Open Cultural Heritage Data Across Four Different User Types: Researchers, Students, App Developers and Hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DHN ![In: Proceedings of the Digital Humanities in the Nordic Countries 3rd Conference, DHN 2018, Helsinki, Finland, March 7-9, 2018., pp. 412-418, 2018, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | Lewis Henderson |
National infrastructure - the next step for seasoned hackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2017(3), pp. 8-10, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Adam Vincent |
State-sponsored hackers: the new normal for business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2017(9), pp. 10-12, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Zahid Maqbool, Nidhi Makhijani, V. S. Chandrasekhar Pammi, Varun Dutt |
Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 59(3), pp. 420-431, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens 0001, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano |
How Professional Hackers Understand Protected Code while Performing Attack Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1704.02774, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
20 | Kjell Hausken |
Information Sharing Among Cyber Hackers in Successive Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGTR ![In: IGTR 19(2), pp. 1750010:1-1750010:33, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Xiaolong Bai, Luyi Xing, Nan Zhang 0018, XiaoFeng Wang 0001, Xiaojing Liao, Tongxin Li, Shi-Min Hu 0001 |
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 15(2), pp. 42-49, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 388 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|