The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hackers with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1995 (15) 1996-1999 (17) 2000-2001 (18) 2002 (16) 2003 (24) 2004 (29) 2005 (23) 2006 (26) 2007 (33) 2008 (33) 2009 (16) 2010-2012 (22) 2013-2014 (19) 2015-2016 (24) 2017-2018 (29) 2019-2020 (17) 2021-2022 (17) 2023-2024 (10)
Publication types (Num. hits)
article(181) book(3) incollection(6) inproceedings(196) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 254 occurrences of 176 keywords

Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
102Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli Open to Grok. How do Hackers' Practices Produce Hackers?. (PDF / PS) Search on Bibsonomy OSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 Real-Time Emulation of Intrusion Victim in HoneyFarm. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interception proxy, reverse firewall, Honeypot, intrusion
70Iksu Kim, Myungho Kim The DecoyPort: Redirecting Hackers to Honeypots. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos Search Engines as a Security Threat. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
56David Geer Hackers Get to the Root of the Problem. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Hackers, Rootkits
50Jörg Preuß, Steven Furnell, Maria Papadaki Considering the potential of criminal profiling to combat hacking. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Alexander E. Voiskounsky, Olga V. Smyslova Flow in Computer Hacking: A Model. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Immersion lithography, Spam, Malware, E-mail, Botnets, Hackers, Semiconductors
48Heejin Jang, Sangwook Kim A Self-Extension Monitoring for Security Management. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare
45Gerry V. Dozier, Douglas Brown, John Hurley, Krystal Cain Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers. Search on Bibsonomy GECCO (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Sinchul Back, Jennifer LaPrade, Lana Shehadeh, Minju Kim Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Gregory B. Newby Paths to creativity in security careers. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Syed A. Saleem Ethical hacking as a risk management technique. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacker, white hat hacker, network security, information security, computer security, system security
37Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant Semantics-Aware Malware Detection. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IM.Myspace04.AIM, Broadband services, Instant messaging, Internet security, Internet security, Hackers, Domain names
36Cindy Cullen Internet vulnerabilities of one-time passcode mechanisms. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification
33Igor V. Kotenko Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks. Search on Bibsonomy CEEMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Daniela K. Rosner, Jonathan Bean Learning from IKEA hacking: i'm not one to decoupage a tabletop and call it a day. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ikea, creative tools, design, DIY
25Pei-Te Chen, Chi-Sung Laih IDSIC: an intrusion detection system with identification capability. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs)
25V. Kavitha, K. S. Easwarakumar Neural Based Steganography. Search on Bibsonomy PRICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Greg Goth, Benjamin Alfonsi News. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Linda Dailey Paulson Stopping Intruders Outside the Gates. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Marlene Campbell Ethics and computer security: cause and effect. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
23David Alan Grier Honor Among Thieves. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Computing profession, Computers and society, Hackers
23Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung A study of online service and information exposure of public companies. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious hackers, public company, public server, web server, ports, cyber security
23David Alan Grier Outposts. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF blogs, computers and society, computing technology, hackers
23Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF optoelectronic fiber arrays, antiforensic attacks, hackers, storage technology
23James William Rust Corporate management of computer forensics evidence. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF management, information security, computer forensics, hackers, digital evidence, investigation, incident response
23David Geer Security Technologies Go Phishing. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF computer fraud, security, phishing, hackers
23Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Globus Alliance, Global Grid Forum, ransomware, essay-grading software, predictive model-building, self-replicating robots, grid computing, robotics, standards, software, microprocessors, Web security, hackers
23Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology
23Roland L. Trope A Warranty of Cyberworthiness. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyberworthiness, software warranty, software makers, security, hackers
23George Chamales The Honeywall CD-ROM. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF honeywall, blackhat, honeypot, hackers, honeynet
23Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer Computer Forensics Education. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF education, forensics, hackers, computer crime
20Sonam Bhardwaj, Mayank Dave RAKSHAM: Responsive approach to Knock-off scavenging hackers and attack mitigation. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Cameron John Hoffman, C. Jordan Howell, Robert C. Perkins, David Maimon, Olena Antonaccio Predicting new hackers' criminal careers: A group-based trajectory approach. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Ken Owen, Milena M. Head Motivation and Demotivation of Hackers in Selecting a Hacking Task. Search on Bibsonomy J. Comput. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Anum Atique Paracha, Junaid Arshad, Muhammad Mubashir Khan S.U.S. You're SUS! - Identifying influencer hackers on dark web social networks. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Andreas Happe, Jürgen Cito Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Nathaniel Knopf Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication - Robert W. Gehl and Sean T. Lawson (Cambridge, MA, USA: MIT Press, 2022, 344 pp.). Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Jing Hou, Xuyu Wang, Amy Z. Zeng Inter-Temporal Reward Decisions with Strategic Ethical Hackers. Search on Bibsonomy CNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Andreas Happe, Jürgen Cito Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Patrick Wake, Sue Black 0001, Jonathan Young Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and Procedures. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Marie Thøgersen Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts. Search on Bibsonomy CyCon The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Frank Ulrich, Sune Dueholm Müller, Stephen Flowers The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2022 DBLP  BibTeX  RDF
20David Myles Gustavsen Book Review: Why Hackers Win: Power and Disruption in the Network Society. Search on Bibsonomy New Media Soc. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Yuni Li, Ling Zhao 0001 Collaborating with Bounty Hunters: How to Encourage White Hat Hackers' Participation in Vulnerability Crowdsourcing Programs through Formal and Relational Governance. Search on Bibsonomy Inf. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Christian Koch 0009, Katharina Müller, Eldar Sultanow Which programming languages do hackers use? A survey at the German Chaos Computer Club. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, Zaghloul Saad ElSayed Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web). Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
20Kyle Guers, Md Minhaz Chowdhury, Nafiz Rifat Card Skimming: A Cybercrime by Hackers. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Federico Echenique, Kevin He Screening p-Hackers: Dissemination Noise as Bait. Search on Bibsonomy EC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Nitin Naik, Changjing Shang, Paul Jenkins, Qiang Shen 0001 D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. Search on Bibsonomy IEEE Trans. Emerg. Top. Comput. Intell. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Michael Iantorno Book Review: Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism. Search on Bibsonomy New Media Soc. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Cheng Huang 0003, Yongyan Guo, Wenbo Guo 0011, Ying Li HackerRank: Identifying key hackers in underground forums. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Thomas Haigh When hackers were heroes. Search on Bibsonomy Commun. ACM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20David Maimon, C. Jordan Howell, George W. Burruss Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Mario Silic, Paul Benjamin Lowry Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20H. Van Dyke Parunak Social Simulation for Non-hackers. Search on Bibsonomy MABS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Michael Bitzer, Bastian Stahl, Jacqueline Strobel Empathy for Hackers - an IT Security Risk Assessment Artifact for Targeted Hacker Attacks. Search on Bibsonomy ECIS The full citation details ... 2021 DBLP  BibTeX  RDF
20Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. Search on Bibsonomy ISI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Bruce Schneier Invited Talk: The Coming AI Hackers. Search on Bibsonomy CSCML The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Rui Peng 0001, Hui Xiao, Jianjun Guo, Chen Lin Optimal defense of a distributed data storage system against hackers' attacks. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Yong Wu, Junlin Duan, Tao Dai 0006, Dong Cheng Managing Security Outsourcing in the Presence of Strategic Hackers. Search on Bibsonomy Decis. Anal. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Ravi Sen, Ajay Verma, Gregory R. Heim Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Jaime Arias 0001, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Teofil Sidoruk, Mariëlle Stoelinga Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems. Search on Bibsonomy ICFEM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Ling Zhao 0001, Yuni Li Collaborating with White Hat Hackers: A Study of Vulnerability Crowdsourcing Program from Control Perspective. Search on Bibsonomy PACIS The full citation details ... 2020 DBLP  BibTeX  RDF
20Aleksandra Pawlicka, Michal Choras, Marek Pawlicki Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Mohammad Aref Al-Ramahi, Izzat Alsmadi, Joshua Davenport Exploring hackers assets: topics of interest as indicators of compromise. Search on Bibsonomy HotSoS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Segundo Moisés Toapanta Toapanta, Raúl Francisco Pérez González, Maximo Giovani Tandazo Espinoza, Luis Enrique Mafla Gallegos Analysis of the Software Most Used by Hackers to Carry Out Penetration Testing in Public Organizations. Search on Bibsonomy MLIS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Keenan Skelly It's a war out there: why malicious hackers are beating businesses to the punch - and what we can do about it. Search on Bibsonomy Netw. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens 0001, Bjorn De Sutter Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Siew H. Chan, Suparak Janjarasjit Insight into hackers' reaction toward information security breach. Search on Bibsonomy Int. J. Inf. Manag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan Open hiding for truncating hackers - a block truncation and wavelet approach. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Desislav Andreev, Simona Petrakieva, Ina Taralova A Novel Approach for Protection of Accounts' Names against Hackers Combining Cluster Analysis and Chaotic Theory. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
20Nicholas Charles Patterson, Michael Hobbs, Frank Jiang 0001, Lei Pan 0002 Cyber security insights into self-proclaimed virtual world hackers. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
20Jaime Arias 0001, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Mariëlle Stoelinga Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
20Helen Thackray Hackers gonna hack: investigating the effect of group processes and social identities within online hacking communities Search on Bibsonomy 2019   RDF
20Mehdi Dadkhah, Mohammad Lagzian, Glenn Borchardt Academic Information Security Researchers: Hackers or Specialists? Search on Bibsonomy Sci. Eng. Ethics The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Olivier Boireau Securing the blockchain against hackers. Search on Bibsonomy Netw. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Morgan G. Ames Hackers, Computers, and Cooperation: A Critical History of Logo and Constructionist Learning. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Natalija Vlajic, Daiwei Zhou IoT as a Land of Opportunity for DDoS Hackers. Search on Bibsonomy Computer The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Shannon Rooney Interactive journalism: Hackers, data, and code. Search on Bibsonomy New Media Soc. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Kjell Hausken Proactivity and Retroactivity of Firms and Information Sharing of Hackers. Search on Bibsonomy IGTR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Bin Mai, Shailesh Kulkarni When Hackers Err: The Impacts of False Positives on Information Security Games. Search on Bibsonomy Decis. Anal. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Rebecca Slayton Certifying "ethical hackers". Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, Moshe Chai Barukh Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. Search on Bibsonomy PACIS The full citation details ... 2018 DBLP  BibTeX  RDF
20Zahid Maqbool, V. S. Chandrasekhar Pammi, Varun Dutt Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts. Search on Bibsonomy CyberSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Eiad Yafi, Katya Yefimova, Karen E. Fisher Young Hackers: Hacking Technology at Za'atari Syrian Refugee Camp. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Zechun Cao, Shou-Hsuan Stephen Huang Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Baidyanath Biswas, Arunabha Mukhopadhyay, Gaurav Gupta 0004 "Leadership in Action: How Top Hackers Behave" A Big-Data Approach with Text-Mining and Sentiment Analysis. Search on Bibsonomy HICSS The full citation details ... 2018 DBLP  BibTeX  RDF
20Ericsson Marin, Jana Shakarian, Paulo Shakarian Mining Key-Hackers on Darkweb Forums. Search on Bibsonomy ICDIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Andrew J. Park, Richard Frank, Alexander Mikhaylov, Myf Thomson Hackers Hedging Bets: A Cross-Community Analysis of Three Online Hacking Forums. Search on Bibsonomy ASONAM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Ditte Laursen, Henriette Roued-Cunliffe, Stig Svenningsen Challenges and Perspectives on the Use of Open Cultural Heritage Data Across Four Different User Types: Researchers, Students, App Developers and Hackers. Search on Bibsonomy DHN The full citation details ... 2018 DBLP  BibTeX  RDF
20Lewis Henderson National infrastructure - the next step for seasoned hackers. Search on Bibsonomy Netw. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Adam Vincent State-sponsored hackers: the new normal for business. Search on Bibsonomy Netw. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Zahid Maqbool, Nidhi Makhijani, V. S. Chandrasekhar Pammi, Varun Dutt Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly. Search on Bibsonomy Hum. Factors The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens 0001, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano How Professional Hackers Understand Protected Code while Performing Attack Tasks. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
20Kjell Hausken Information Sharing Among Cyber Hackers in Successive Attacks. Search on Bibsonomy IGTR The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Xiaolong Bai, Luyi Xing, Nan Zhang 0018, XiaoFeng Wang 0001, Xiaojing Liao, Tongxin Li, Shi-Min Hu 0001 Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 388 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license