Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
106 | Brian A. Pashel |
Teaching students to hack: ethical implications in teaching students to hack at the university level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 197-200, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ethical hacking, student misuse, teaching hacking, hacking |
102 | Lisa Lancor, Robert Workman |
Using google hacking to enhance defense strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007, pp. 491-495, 2007, ACM, 1-59593-361-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Google hacking, education, information security, information assurance, web security, hacking |
66 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 442-447, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
56 | Hangbae Chang, Kyung-kyu Kim, Hosin David Lee, Jungduk Kim |
The Design and Development of a Secure Keystroke System for u Business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 255-261, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Eric Clark |
Hacking as a form of "self-improvement". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2005, Caparica, Portugal, June 27-29, 2005, pp. 397, 2005, ACM, 1-59593-024-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cell phones, digital cameras, firmware, hacking, DVDs |
49 | Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou 0001 |
A Design and Implementation of Profile Based Web Application Securing Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 248-259, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Web application, Anomaly detection, Proxy, Hacking |
45 | Jörg Preuß, Steven Furnell, Maria Papadaki |
Considering the potential of criminal profiling to combat hacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 135-141, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Syed A. Saleem |
Ethical hacking as a risk management technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 201-203, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
45 | Jia Wang, Insup Lee 0001 |
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 512-535, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 146-159, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Ghi Paul Im, Richard L. Baskerville |
A longitudinal study of information system threat categories: the enduring problem of human error. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 36(4), pp. 68-79, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects |
38 | Coen Hacking, Hilde Verbeek 0002, Jan P. H. Hamers, Sil Aarts |
The development of an automatic speech recognition model using interview data from long-term care for older adults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 30(3), pp. 411-417, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
38 | Chris Hacking, Nitesh K. Poona, Nicola Manzan, Carlos Poblete-Echeverría |
Investigating 2-D and 3-D Proximal Remote Sensing Techniques for Vineyard Yield Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 19(17), pp. 3652, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Dipan Kumar Mandal, Srivatsava Jandhyala, Om Ji Omer, Gurpreet S. Kalsi, Biji George, Gopi Neela, Santhosh Kumar Rethinagiri, Sreenivas Subramoney, Lance Hacking, Jim Radford, Eagle Jones, Belliappa Kuttanna, Hong Wang 0003 |
Visual Inertial Odometry At the Edge: A Hardware-Software Co-design Approach for Ultra-low Latency and Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2019, Florence, Italy, March 25-29, 2019, pp. 960-963, 2019, IEEE, 978-3-9819263-2-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Jane F. Hacking, Bruce L. Smith, Shawn L. Nissen, Hannah Allen |
Russian palatalized and unpalatalized coda consonants: An electropalatographic and acoustic analysis of native speaker and L2 learner productions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Phonetics ![In: J. Phonetics 54, pp. 98-108, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Andy Bond, Andrew Hacking, Zoran Milosevic, Andrew Zander |
Specifying and building interoperable eHealth systems: ODP benefits and lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 35(3), pp. 313-328, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Stuart Hacking, Benoit Hudzia |
Improving the live migration process of large enterprise applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTDC@ICAC ![In: Proceedings of the 3rd International Workshop on Virtualization Technologies in Distributed Computing, VTDC@ICAC 2009, Barcelona, Spain, June 15, 2009, pp. 51-58, 2009, ACM, 978-1-60558-580-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Ian Hacking |
Aristotelian Categories And Cognitive Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 126(3), pp. 473-515, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Jan W. M. Jacobs, Roger J. H. Hacking |
An integrated microprogram development methodology based on APL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APL ![In: Proceedings of the international conference on APL: APL in transition, APL 1987, Dallas, TX, USA, May 10-14, 1987., pp. 323-328, 1987, ACM, 0-89791-226-8. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
APL |
38 | Ian Hacking |
What is Strict Implication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Symb. Log. ![In: J. Symb. Log. 28(1), pp. 51-71, 1963. The full citation details ...](Pics/full.jpeg) |
1963 |
DBLP DOI BibTeX RDF |
|
35 | Hyun-Uk Hwang, Minsoo Kim 0002, Bong-Nam Noh |
Expert System Using Fuzzy Petri Nets in Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Advances in Hybrid Information Technology, First International Conference, ICHIT 2006, Jeju Island, Korea, November 9-11, 2006, Revised Selected Papers, pp. 312-322, 2006, Springer, 978-3-540-77367-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
expert system, Computer forensics, inference rule, fuzzy Petri nets, hacking |
35 | Patricia Y. Logan, Allen Clarkson |
Teaching students to hack: curriculum issues in information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 157-161, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ethics and computers, education, computer science education, information security, computer security, information assurance, hacking |
35 | Hector Zenil Chavez |
Getting to Know Your Enemy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 5(7), 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
computer hacking, Stuart McClure, Joel Scambray, George Kurtz, computer security, book review |
35 | Yeon-jin Park, Keun-Ho Lee |
Constructing a secure hacking-resistant IoT U-healthcare environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 14(1), pp. 99-106, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Sang-Won Bang, Byeong-Soo Jung, Sang-Cheol Lee |
Research on financial institutional network partition design for anti-hacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 13(4), pp. 257-263, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Kyung-Hwan Cha, Dae-Ki Kang |
Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 13(3), pp. 233-238, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Sunkyung Rhyu, Sang-Yeob Oh |
Hacking and convergence computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 13(4), pp. 239-240, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Sunghyuck Hong |
Secure and light IoT protocol (SLIP) for anti-hacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 13(4), pp. 241-247, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Marsalis T. Gibson, David Babazadeh, Claire J. Tomlin, Shankar Sastry 0001 |
Hacking Predictors Means Hacking Cars: Using Sensitivity Analysis to Identify Trajectory Prediction Vulnerabilities for Autonomous Driving Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.10313, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Richard Beno, Ron Poet |
Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: SIN 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020, pp. 13:1-13:3, 2020, ACM, 978-1-4503-8751-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Leonardo de Araújo |
Hacking Cultural Heritage: the Hackathon as a Method for Heritage Interpretation (Hacking Cultural Heritage: der Hackathon als Methode zur Interpretation des Kulturerbes) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
34 | Youyang Hou, Cliff Lampe |
Sustainable Hacking: Characteristics of the Design and Adoption of Civic Hacking Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C&T ![In: Proceedings of the 8th International Conference on Communities and Technologies, Troyes, France, June 26 - 30, 2017, pp. 125-134, 2017, ACM, 978-1-4503-4854-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Donna Peacock |
From underground hacking to ethical hacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
34 | Alison E. Adam |
Hacking into Hacking: Gender and the Hacker Phenomenon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCAS Comput. Soc. ![In: SIGCAS Comput. Soc. 33(4), pp. 3, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Stuart McClure |
Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (39) ![In: 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems, TOOLS USA 2001, Santa Barbara, CA, USA, July 29 - August 3, 2001, pp. 7, 2001, IEEE Computer Society, 0-7695-1251-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Ugochi Acholonu |
Hacker's mentality: integrating games and hacking to build it fluency among middle school students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDC ![In: Interaction Design and Children, Proceedings of the 9th International Conference on Interaction Design and Children, IDC 2010, Barcelona, Spain, June 9-12, 2010, pp. 323-325, 2010, ACM, 978-1-60558-951-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
task-based learning, digital games, middle-school, IT fluency |
31 | Daniela K. Rosner, Jonathan Bean |
Learning from IKEA hacking: i'm not one to decoupage a tabletop and call it a day. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 419-422, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ikea, creative tools, design, DIY |
31 | Ernest A. Edmonds, Mark Fell |
Two generative pieces: port hacking and DC_release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Creativity & Cognition ![In: Proceedings of the 7th Conference on Creativity & Cognition, Berkeley, California, USA, October 26-30, 2009, pp. 473-474, 2009, ACM, 978-1-60558-865-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
performance, generative art |
31 | Joseph A. Paradiso, John S. Heidemann, Thomas G. Zimmerman |
Hacking Is Pervasive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 7(3), pp. 13-15, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Thomas G. Zimmerman |
Hacking in Industrial Research and Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 7(3), pp. 16-23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Alexander E. Voiskounsky, Olga V. Smyslova |
Flow in Computer Hacking: A Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 176-186, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Paul Thompson |
Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 390, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | George Cybenko, Annarita Giani, Paul Thompson |
Cognitive Hacking: A Battle for the Mind. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(8), pp. 50-56, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Rick Duley, Stanislaw P. Maj |
Cutting Hacking: Breaking from Tradition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE&T ![In: 15th Conference on Software Engineering Education and Training (CSEET'02), 25-27 February 2002, Covington, Kentucky, USA, pp. 224-233, 2002, IEEE Computer Society, 0-7695-1515-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | John A. N. Lee, Gerald Segal, Rosalie Steier |
Positive Alternatives: A Report on an ACM Panel on Hacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 29(4), pp. 297-299, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
28 | David Alan Grier |
Harry and Georgie. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(7), pp. 5-8, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Ramkumar Chinchani, Duc T. Ha, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya |
On the Hardness of Approximating the Min-Hack Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 9(3), pp. 295-311, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
hardness of threat analysis, computer security |
28 | Slim Rekhis, Noureddine Boudriga |
A formal logic-based language and an automated verification tool for computer forensic investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 287-291, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
S-TLA+, S-TLC, formal forensic investigation, temporal logic of security actions |
28 | Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto |
Exploiting Self-Modification Mechanism for Program Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 3-6 November 2003, Dallas, TX, USA, Proceedings, pp. 170-, 2003, IEEE Computer Society, 0-7695-2020-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee |
Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 31-40, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Quyen L. Nguyen, Arun Sood |
A Comparison of Intrusion-Tolerant System Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 24-31, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability |
22 | John Paul Dunning |
Taming the Blue Beast: A Survey of Bluetooth Based Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(2), pp. 20-27, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security taxonomy, mobile computing, wireless communications, Bluetooth, hacking |
22 | Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang |
Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 704-707, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network |
22 | Amanda Williams, Daniela Karin Rosner |
Wiimote hackery studio proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TEI ![In: Proceedings of the 4th International Conference on Tangible and Embedded Interaction 2010, Cambridge, MA, USA, January 24-27, 2010, pp. 365-368, 2010, ACM, 978-1-60558-841-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wii nunchuk, diy, hacking, wii remote |
22 | Juan M. Solá-Sloan, Isidoro Couvertier-Reyes |
A TCP offload engine emulator for estimating the impact of removing protocol processing from a host running Apache HTTP server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, San Diego, California, USA, March 22-27, 2009, 2009, SCS/ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
TCP offload, TOE, hacking Apache, protocol offload, TCP/IP, web servers |
22 | Jamie Allen, Areti Galani, Kazuhiro Jo |
An ecology of practice: chiptune marching band. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Creativity & Cognition ![In: Proceedings of the 7th Conference on Creativity & Cognition, Berkeley, California, USA, October 26-30, 2009, pp. 347-348, 2009, ACM, 978-1-60558-865-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
performance, community, user studies, art, diy, hacking |
22 | Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung |
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 307-313, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cash, chip card, deployed systems, reliability, anonymity, availability, advertising, electronic cash, hacking, fraud, credit card |
22 | Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo |
Analysis of Computer Intrusions Using Sequences of Function Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(2), pp. 137-150, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis |
22 | Elizabeth M. Losh |
Assembly lines: web generators as hypertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hypertext ![In: HYPERTEXT 2007, Proceedings of the 18th ACM Conference on Hypertext and Hypermedia, September 10-12, 2007, Manchester, UK, pp. 115-122, 2007, ACM, 978-1-59593-820-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
PHP hacking, hypertext theory, participatory culture, web generators, web 2.0 |
22 | Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim |
Securing Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(7), pp. 28-34, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
wireless hacking, wireless security, virtual private networks, Wi-Fi networks |
22 | Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach |
Hack-a-Vote: Security Issues with Electronic Voting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(1), pp. 32-37, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
election fraud, security, electronic voting, hacking |
22 | Susan W. Brenner |
U.S. Cybercrime Law: Defining Offenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 6(2), pp. 115-132, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
stalking, child pornography, cybercrime, hacking, fraud, terrorism |
22 | Erik Johansson, Mikael Pettersson, Konstantinos Sagonas, Thomas Lindgren |
The development of the HiPE system: design and experience report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 4(4), pp. 421-436, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Programming language implementation, Virtual machines and compilation methods, Functional programming, Concurrent programming, Erlang, Hacking |
19 | Mila Dalla Preda, Michele Ianni |
Exploiting number theory for dynamic software watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 41-51, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna |
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 195-202, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan |
Networking and cryptography library with a non-repudiation flavor for blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 1-14, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Alexander V. Babash |
Attacks on the simple substitution cipher with the calculation of their reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 213-218, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Sergey Prokopev |
Cryptographic protocol conformance testing based on domain-specific state machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 249-259, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Ritik Mehta, Olha Jurecková, Mark Stamp 0001 |
A natural language processing approach to Malware classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 173-184, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Vrinda Malhotra, Katerina Potika, Mark Stamp 0001 |
A comparison of graph neural networks for malware classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 53-69, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Nguyen Minh Tu, Viet Hung Nguyen, Nathan Shone |
Using deep graph learning to improve dynamic analysis-based malware detection in PE files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 153-172, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Christian Catalano, Franco Tommasi |
Persistent MobileApp-in-the-Middle (MAitM) attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 27-39, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Rohit Dube |
Faulty use of the CIC-IDS 2017 dataset in information security research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 203-211, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili |
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 95-111, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Eldar Boltachev |
Correction to: Potential cyber threats of adversarial attacks on autonomous driving models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 315, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Alexey Kurochkin, Denis Fomin |
MGM beyond the birthday bound. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 231-235, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Akram Khalesi, Zahra Ahmadian |
Provably minimum data complexity integral distinguisher based on conventional division property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 113-125, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | François Dupont |
A new Shamir's three pass random matrix ciphering mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 237-248, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Evgeniy K. Alekseev, Sergey Kyazhin, Stanislav Smyshlyaev |
The threat of forcing the identical roles for authenticated key establishment protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 225-230, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Jesper Bergman, Oliver Popov |
Recognition of tor malware and onion services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 261-275, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle |
Demonstration of new attacks on three healthcare network protocols in a lab environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 301-314, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia |
Use of cryptography in malware obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 135-152, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
Explainable Ransomware Detection with Deep Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 317-330, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Anatoly Konkin, Sergey Zapechnikov |
Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 219-224, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Hafiz Usama Ishtiaq, Areeb Ahmed Bhutta, Adnan Noor Mian |
DHCP DoS and starvation attacks on SDN controllers and their mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 15-25, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Anna Epishkina, Sergey Zapechnikov, Anna Belozubova |
Historical notes on Russian cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 277-293, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna |
Partial key exposure attack on RSA using some private key blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 185-193, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Dmitry Zakharov, M. Pudovkina |
Full round impossible differentials for Feistel ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 295-300, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Grigory B. Marshalko, Svetlana Koreshkova |
Protection against adversarial attacks with randomization of recognition algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 127-133, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Hashida Haidros Rahima Manzil, S. Manohar Naik |
Android ransomware detection using a novel hamming distance based feature selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 71-93, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
Picker Blinder: a framework for automatic injection of malicious inter-app communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(2), pp. 331-346, June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Manmeet Singh, Maninder Singh, Sanmeet Kaur |
Identifying bot infection using neural networks on DNS traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(4), pp. 549-563, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi |
A security vulnerability predictor based on source code metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(4), pp. 615-633, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Alireza Sadeghi-Nasab, Vahid Rafe |
A comprehensive review of the security flaws of hashing algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(2), pp. 287-302, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(4), pp. 635, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp 0001 |
Generative adversarial networks and image-based malware classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(4), pp. 579-595, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yoshihiro Oyama, Hirotaka Kokubo |
Forced continuation of malware execution beyond exceptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(4), pp. 483-501, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, Mark Stamp 0001 |
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(1), pp. 1-16, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(4), pp. 639, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(2), pp. 199-215, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|