The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hackers with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1995 (15) 1996-1999 (17) 2000-2001 (18) 2002 (16) 2003 (24) 2004 (29) 2005 (23) 2006 (26) 2007 (33) 2008 (33) 2009 (16) 2010-2012 (22) 2013-2014 (19) 2015-2016 (24) 2017-2018 (29) 2019-2020 (17) 2021-2022 (17) 2023-2024 (10)
Publication types (Num. hits)
article(181) book(3) incollection(6) inproceedings(196) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 254 occurrences of 176 keywords

Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Kjell Hausken Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Search on Bibsonomy Games The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Sagar Samtani, Ryan Chinn, Hsinchun Chen, Jay F. Nunamaker Jr. Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Obi Ogbanufe, Dan J. Kim 0001 Hackers Delight: Knowledge Sharing Motives. Search on Bibsonomy AMCIS The full citation details ... 2017 DBLP  BibTeX  RDF
20Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens 0001, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano How professional hackers understand protected code while performing attack tasks. Search on Bibsonomy ICPC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Desislav Andreev, Simona Petrakieva, Ina Taralova Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Meg Young, An Yan 0001 Civic Hackers' User Experiences and Expectations of Seattle's Open Municipal Data Program. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
20Adrian Crawley Hiring hackers. Search on Bibsonomy Netw. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Patrick Snyder Playing hackers at their own game. Search on Bibsonomy Netw. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Andrew Russell The innovators: how a group of hackers, geniuses, and geeks created the digital revolution (Isaacson, W.; 2014) [book review]. Search on Bibsonomy IEEE Ann. Hist. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Sagar Behere, Martin Törngren Educating embedded systems hackers: a practitioner's perspective. Search on Bibsonomy SIGBED Rev. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Guilherme Amadio, Benda Xu Portage: Bringing Hackers' Wisdom to Science. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
20Brendan Keogh Hackers and Cyborgs: Binary Domain and Two Formative Videogame Technicities. Search on Bibsonomy Trans. Digit. Games Res. Assoc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20M. Mitchell Waldrop How to hack the hackers: The human side of cybercrime. Search on Bibsonomy Nat. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Nathan Backman Facilitating a Battle Between Hackers: Computer Security Outside of the Classroom. Search on Bibsonomy SIGCSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Markéta Dolejsová Deciphering a Meal through Open Source Standards: Soylent and the Rise of Diet Hackers. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Rohit Goyal, Nicola Dragoni Why Hackers Love eHealth Applications. Search on Bibsonomy HealthyIoT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang 0002, Chunxiao Xing, Weifeng Li 0002, Hsinchun Chen Exploring key hackers and cybersecurity threats in Chinese hacker communities. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Sagar Samtani, Hsinchun Chen Using social network analysis to identify key hackers for keylogging tools in hacker forums. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Andrea Rota Hacking the Web 2.0 : user agency and the role of hackers as computational mediators. Search on Bibsonomy 2016   RDF
20Ryan Seebruck A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Search on Bibsonomy Digit. Investig. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Tim Ring Connected cars - the next targe tfor hackers. Search on Bibsonomy Netw. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Edy Portmann Rezension "Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia". Search on Bibsonomy HMD Prax. Wirtsch. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Nick Webb Hackers, Geniuses, and Geeks Creating the Digital Revolution [Book Review]. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Xiong Zhang 0001, Alex Tsang, Wei T. Yue, Michael Chau The classification of hackers by knowledge exchange behaviors. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Yuling Sun, Silvia Lindtner, Xianghua Ding, Tun Lu, Ning Gu Reliving the Past & Making a Harmonious Society Today: A Study of Elderly Electronic Hackers in China. Search on Bibsonomy CSCW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Brendan Keogh Hackers and Cyborgs: Binary Domain and Two Formative Videogame Technicities. Search on Bibsonomy DiGRA Conference The full citation details ... 2015 DBLP  BibTeX  RDF
20Sune Dueholm Müller, Frank Ulrich The Competing Values of Hackers: The Culture Profile that Spawned the Computer Revolution. Search on Bibsonomy HICSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Amit Rechavi, Tamar Berenblum, David Maimon, Ido Sivan Sevilla Hackers Topology Matter Geography: Mapping the Dynamics of Repeated System Trespassing Events Networks. Search on Bibsonomy ASONAM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Ken Banks Hackers, Fixers and Lone Rangers: The Future of Technology for Development? Search on Bibsonomy ACM DEV The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Mark Stockman, Robert Heile, Anthony Rein An Open-Source Honeynet System to Study System Banner Message Effects on Hackers. Search on Bibsonomy RIIT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Sonia Blizzard Don't feed the hackers: how your attitude to data security could affect business. Search on Bibsonomy Netw. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Sarah Jeong, Colin McSwiggen Hackers!: the myth that warped an industry. Search on Bibsonomy XRDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Sagar Behere, Martin Törngren Educating Embedded Systems Hackers: A practitioner's perspective. Search on Bibsonomy WESE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Maximilian Heimstädt "The Institutionalization of Digital Openness": How NGOs, Hackers and Civil Servants Organize Municipal Open Data Ecosystems. Search on Bibsonomy OpenSym The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Linus Nyman Hackers on Forking. Search on Bibsonomy OpenSym The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Ahmed Abbasi, Weifeng Li 0002, Victor A. Benjamin, Shiyu Hu, Hsinchun Chen Descriptive Analytics: Examining Expert Hackers in Web Forums. Search on Bibsonomy JISIC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Jean-Loup Richet From Young Hackers to Crackers. Search on Bibsonomy Int. J. Technol. Hum. Interact. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Gerard J. Holzmann A Three-Step Program for Recovering Hackers. Search on Bibsonomy Computer The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Xing Gao 0002, Weijun Zhong, Shue Mei A differential game approach to information security investment under hackers' knowledge dissemination. Search on Bibsonomy Oper. Res. Lett. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Johan Söderberg Determining social change: The role of technological determinism in the collective action framing of hackers. Search on Bibsonomy New Media Soc. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Craig M. Dalton Sovereigns, Spooks, and Hackers: An Early History of Google Geo Services and Map Mashups. Search on Bibsonomy Cartogr. Int. J. Geogr. Inf. Geovisualization The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Carlos Sarraute, Olivier Buffet, Jörg Hoffmann 0001 POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
20Jeremiah Blocki, Manuel Blum 0001, Anupam Datta GOTCHA Password Hackers! Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
20Carlos Sarraute, Olivier Buffet, Jörg Hoffmann 0001 Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
20Xing Gao 0002, Weijun Zhong, Shue Mei Information Security Investment When Hackers Disseminate Knowledge. Search on Bibsonomy Decis. Anal. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Zhengchuan Xu, Qing Hu 0003, Chenghong Zhang Why computer talents become computer hackers. Search on Bibsonomy Commun. ACM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Jeremiah Blocki, Manuel Blum 0001, Anupam Datta GOTCHA password hackers! Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Filip Stepánek, Jirí Bucek, Martin Novotný Differential Power Analysis under Constrained Budget: Low Cost Education of Hackers. Search on Bibsonomy DSD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Ricard Ruiz De Querol, Karolin Eva Kappler Looking for the Social Hackers. Search on Bibsonomy VaSCo@WebSci The full citation details ... 2013 DBLP  BibTeX  RDF
20James Conrad Seeking help: the important role of ethical hackers. Search on Bibsonomy Netw. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Behzad Zare Moayedi, Mohammad Abdollahi Azgomi A game theoretic framework for evaluation of the impacts of hackers diversity on security measures. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Drew Conway, John Myles White Machine Learning for Hackers - Case Studies and Algorithms to Get You Started. Search on Bibsonomy 2012   RDF
20Damian Gordon Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk Analysis. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
20Carlos Sarraute, Olivier Buffet, Jörg Hoffmann 0001 POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. Search on Bibsonomy AAAI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Cheng Yang, Jui-Long Hung, Zhangxi Lin Loose password security in Chinese cyber world left the front door wide open to hackers: an analytic view. Search on Bibsonomy ICEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Kok Wei Ooi, Seung-Hyun Kim, Qiu-Hong Wang, Kai Lung Hui Do Hackers Seek Variety? An Empirical Analysis of Website Defacements. Search on Bibsonomy ICIS The full citation details ... 2012 DBLP  BibTeX  RDF
20P. S. Rasmi, Paul Varghese An implementation of a new public key system based on RSA which leads hackers solve multiple hard problems to break the cipher. Search on Bibsonomy ISDA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Ed Skoudis Hackers: Tools and Techniques. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Ed Skoudis Hackers: Attacks and Defenses. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Ed Skoudis Hackers: Hiring Ex-Criminal. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Tracey Caldwell Ethical hackers: putting on the white hat. Search on Bibsonomy Netw. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Vijay S. Mookerjee, Radha V. Mookerjee, Alain Bensoussan 0001, Wei T. Yue When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Scott D. Applegate Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20José P. Zagal Hackers, History, and Game Design: What Racing the Beam Is Not. Search on Bibsonomy Game Stud. The full citation details ... 2011 DBLP  BibTeX  RDF
20Neal Leavitt Researchers Fight to Keep Implanted Medical Devices Safe from Hackers. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF IMDs, insulin pumps, cardiac pacemakers, cardiac defibrillators, security, wireless communications, Implantable medical devices
20Matthew J. Warren, Shona Leitch Hacker Taggers: A new type of hackers. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Steven Levy Hackers - Heroes of the Computer Revolution. Search on Bibsonomy 2010   RDF
20Luan Bui The, Van Nguyen Khanh GameGuard: a windows-based software architecture for protecting online games against hackers. Search on Bibsonomy SoICT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Da-Yu Kao, Frank Fu-Yuan Huang, Shiuh-Jeng Wang Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Philippe Teuwen How to Make Smartcards Resistant to Hackers' Lightsabers? Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
20Behzad Zare Moayedi, Mohammad Abdollahi Azgomi A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors. Search on Bibsonomy DASC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Mosin I. Hasan, Nilesh B. Prajapati An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malware, Psychology, Spyware, Social Engineering
20Carla Diana Feature - How I learned to stop worrying and love the hackers. Search on Bibsonomy Interactions The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Hossein Jahankani, Branko Antonijevic, Terry Hugh Walcott Tools protecting stakeholders against hackers and crackers: an insight review. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20M. J. Warren Hackers and Cyber Terrorists. Search on Bibsonomy Encyclopedia of Information Ethics and Security The full citation details ... 2007 DBLP  BibTeX  RDF
20Edward H. Freeman Computer Hackers and Search and Seizure: United States v. Jarrett. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Gerry V. Dozier, Douglas Brown, Haiyu Hou, John Hurley Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Randall Young, Lixuan Zhang, Victor R. Prybutok Hacking into the Minds of Hackers. Search on Bibsonomy Inf. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sergey Bratus What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Nicolas Auray, Danielle Kaminsky The professionalisation paths of hackers in IT security: The sociology of a divided identity. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sergey Bratus Hacker Curriculum : How Hackers Learn Networking. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Dawson R. Engler A System's Hackers Crash Course: Techniques that Find Lots of Bugs in Real (Storage) System Code. Search on Bibsonomy FAST The full citation details ... 2007 DBLP  BibTeX  RDF
20Ivan P. L. Png, Chen-Yu Wang The Deterrent Effect of Enforcement Against Computer Hackers: Cross-Country Evidence. Search on Bibsonomy WEIS The full citation details ... 2007 DBLP  BibTeX  RDF
20Kevin S. Floyd, Susan J. Harrington, Prachi Hivale The autotelic propensity of types of hackers. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Ken Korman Exploring the digital universe: can an alliance of scientists, academics, and non-profit organizations reclaim the web from disinterested hackers and purely commercial interests?. Search on Bibsonomy eLearn Mag. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jochen Koubek Zur Kulturgeschichte des Hackers. Search on Bibsonomy LOG IN The full citation details ... 2006 DBLP  BibTeX  RDF
20Charles P. Pfleeger, Shari Lawrence Pfleeger Why We Won't Review Books by Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ivan P. L. Png, Candy Q. Tang, Qiu-Hong Wang Hackers, Users, Information Security. Search on Bibsonomy WEIS The full citation details ... 2006 DBLP  BibTeX  RDF
20Paul Graham Hackers and Founders. Search on Bibsonomy USENIX Annual Technical Conference, General Track The full citation details ... 2006 DBLP  BibTeX  RDF
20Mark Curphey Web services: Developers dream or hackers heaven? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Sandor Vegh The media's portrayal of hacking, hackers, and hacktivism before and after September 11. Search on Bibsonomy First Monday The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Neal Leavitt Mobile Phones: The Next Frontier for Hackers? Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, cell phones, wireless security, viruses
20Neal Leavitt Instant Messaging: A New Target for Hackers. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security risks, instant messaging, phishing, malicious code
20Paul A. Taylor From hackers to hacktivists: speed bumps on the global superhighway? Search on Bibsonomy New Media Soc. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Helen Nissenbaum Hackers and the contested ontology of cyberspace. Search on Bibsonomy New Media Soc. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Mike Burmester, Yvo Desmedt Is hierarchical public-key certification the next target for hackers? Search on Bibsonomy Commun. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Paul Graham Hackers and painters - big ideas from the computer age. Search on Bibsonomy 2004   RDF
20Matthew J. Warren, William Hutchinson Australian Hackers and Ethics. Search on Bibsonomy Australas. J. Inf. Syst. The full citation details ... 2003 DBLP  BibTeX  RDF
20Lance Spitzner The Honeynet Project: Trapping the Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets
20Bruce Schneier Airplane Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 388 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license