Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Ioanis Nikolaidis |
Honeypots, tracking hackers [Book Reviews]. |
IEEE Netw. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Antonio Marturano |
Molecular biologists as hackers of human data: Rethinking IPR for bioinformatics research. |
J. Inf. Commun. Ethics Soc. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Alexander E. Voiskounsky, Olga V. Smyslova |
Flow-Based Model of Computer Hackers' Motivation. |
Cyberpsychology Behav. Soc. Netw. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Richard D. Austin |
Hackers, Viruses, DoS, Oh No! |
Int. CMG Conference |
2003 |
DBLP BibTeX RDF |
|
20 | Igor V. Kotenko, Alexey Alexeev, Evgeny Man'kov |
Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Renata Matkeviciene |
What do you think about hackers? - Review of: Steven Furnell. Cybercrime: vandalizing the information society. Boston, MA: Addison-Wesley, 2002. 316p. ISBN 0-201-72159-7. |
Inf. Res. |
2002 |
DBLP BibTeX RDF |
|
20 | Paula Roberts, Jenny Webber |
Virtuous Hackers: developing ethical sensitivity in a community of practice. |
Australas. J. Inf. Syst. |
2002 |
DBLP BibTeX RDF |
|
20 | Alan D. Smith, William T. Rupp |
Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. |
Inf. Manag. Comput. Secur. |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Peter H. Salus, Anton Chuvakin |
Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway. |
login Usenix Mag. |
2002 |
DBLP BibTeX RDF |
|
20 | E. Eugene Schultz |
Taking a stand on hackers. |
Comput. Secur. |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Gorm Salomonsen |
Protection Against Hackers on Client Computers for e-Voting Systems. |
DEXA Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
20 | George Ghinea |
Defending Your Digital Assets against Hackers, Crackers, Spies and Thieves. |
Softw. Focus |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Tim Jordan |
Book Review: Hackers: Crime in the Digital Sublime. |
New Media Soc. |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Bill Hancock |
Suspected Hackers Arrested in Russian Credit-Card Fraud. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Bill Hancock |
Hackers Breach Firewall. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Bill Hancock |
Japan Web Hackers Use Chinese and US Servers. |
Comput. Secur. |
2000 |
DBLP BibTeX RDF |
|
20 | Bill Hancock |
Home PC's Targeted by Hackers (Duh!). |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Bill Hancock |
Generation X Hackers? |
Comput. Secur. |
2000 |
DBLP BibTeX RDF |
|
20 | Bill Hancock |
Hackers Still Love to Attack the Pentago. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Peter Stephenson |
Hiring Hackers. |
Inf. Secur. J. A Glob. Perspect. |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Gerald L. Kovacich |
Hackers: Freedom fighters of the 21st Century. |
Comput. Secur. |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Karl J. Flusche |
Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore! |
Inf. Secur. J. A Glob. Perspect. |
1998 |
DBLP DOI BibTeX RDF |
|
20 | David Bainbridge 0002 |
Law report - I: Cannot employees also be hackers? |
Comput. Law Secur. Rev. |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Tom Mulhall |
Where have all the hackers gone?: Part 5 - Conclusions. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Tom Mulhall |
Where have all the hackers gone?: Part 3 - Motivation and deterrence. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Tom Mulhall |
Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Tom Mulhall |
Where have all the hackers gone?: Part 4 - Legislation. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Tom Mulhall |
Where have all the hackers gone?: Part 6 - Appendices and bibliography. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Tom Mulhall |
Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Rob Kling |
Beyond outlaws, hackers and pirates. |
SIGCAS Comput. Soc. |
1996 |
DBLP DOI BibTeX RDF |
|
20 | Rob Kling |
Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals. |
Computerization and Controversy, 2nd Ed. |
1996 |
DBLP DOI BibTeX RDF |
|
20 | Andrew W. Appel |
Axiomatic Bootstrapping: A Guide for Compiler Hackers. |
ACM Trans. Program. Lang. Syst. |
1994 |
DBLP DOI BibTeX RDF |
bootstrapping |
20 | Nigel Chapman, Maria Fox 0001, Elpida Keravnou, Matthew Lee 0005, Mark Levene, Derek Long, Peter Rounce, Ray Offen, Paul A. Samet, Russel L. Winder |
'Slick Systems' and 'Happy Hackers': experience with group projects at UCL. |
Softw. Eng. J. |
1993 |
DBLP DOI BibTeX RDF |
|
20 | Belden Menkus |
"Hackers": Know the adversary. |
Comput. Secur. |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Richard C. Hollinger |
Hackers: computer heroes or electronic highwaymen? |
SIGCAS Comput. Soc. |
1991 |
DBLP DOI BibTeX RDF |
|
20 | G. Hughes |
Computer crime: the liability of hackers. |
Aust. Comput. J. |
1990 |
DBLP BibTeX RDF |
|
20 | Pamela Samuelson |
Can Hackers Be Sued for Damages Caused by Computer Viruses? |
Commun. ACM |
1989 |
DBLP BibTeX RDF |
|
20 | Harold Joseph Highland |
Hackers revisited. |
Comput. Secur. |
1988 |
DBLP DOI BibTeX RDF |
|
20 | Harold Joseph Highland |
Open Sesame-Hackers welcome. |
Comput. Secur. |
1988 |
DBLP DOI BibTeX RDF |
|
20 | I. S. Herschberg |
The hackers' comfort. |
Comput. Secur. |
1987 |
DBLP DOI BibTeX RDF |
|
20 | David Bellin |
Young Hackers (abstract): geniuses or criminal? |
ACM Conference on Computer Science |
1986 |
DBLP DOI BibTeX RDF |
|
20 | David Bellin |
High school hackers: heroes or criminals? |
SIGCAS Comput. Soc. |
1985 |
DBLP DOI BibTeX RDF |
|
12 | Elankayer Sithirasenan, Nasser Almahdouri |
Using WiMAX for effective business continuity during and after disaster. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
emergency networks, authentication, business continuity |
12 | Rick Wash |
Folk models of home computer security. |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
folk models, home security, mental models |
12 | Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson |
ASSURE: automated support for secure and usable requirements engineering. |
ISSTA |
2010 |
DBLP DOI BibTeX RDF |
security requirements-based testing, security requirements, usable requirements |
12 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Richard A. DeMillo |
Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. |
WISE |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Guido Schryen, Rouven Kadura |
Open source vs. closed source software: towards measuring security. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
closed source software, security, metrics, open source software |
12 | Vicky G. Papadopoulou, Andreas Gregoriades |
Network Security Validation Using Game Theory. |
OTM Workshops |
2009 |
DBLP DOI BibTeX RDF |
Game Theory, Network Security, Non-functional requirements |
12 | Andy King |
Untangling Reverse Engineering with Logic and Abstraction. |
ICLP |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin |
Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Frequent Episodes Mining, Honeypot systems, Network Security |
12 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. |
ATC |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
12 | Eric Paulos |
The rise of the expert amateur: DIY culture and citizen science. |
UIST |
2009 |
DBLP DOI BibTeX RDF |
DIY culture, citizen science |
12 | Andrew Brownsword |
Reflecting on development processes in the video game industry. |
ICSE Companion |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Siu Fung Yeung, John C. S. Lui |
Dynamic Bayesian approach for detecting cheats in multi-player online games. |
Multim. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Linda Wilbanks |
When Black Hats Are Really White. |
IT Prof. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | David Alan Grier |
Harry and Georgie. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
12 | George Lawton |
Is It Finally Time to Worry about Mobile Malware? |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Andrew "bunnie" Huang |
Chumby: An Experiment in Hackable Pervasive Computing. |
IEEE Pervasive Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Andrew G. Brooks, Joe Grand |
Engineered Reality: Prototyping Inventions for Television. |
IEEE Pervasive Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Björn Hartmann, Scott Doorley, Scott R. Klemmer |
Hacking, Mashing, Gluing: Understanding Opportunistic Design. |
IEEE Pervasive Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull |
Combating the Insider Cyber Threat. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Hung-Min Sun, King-Hang Wang |
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
12 | Frank McCown, Michael L. Nelson |
Usage analysis of a public website reconstruction tool. |
JCDL |
2008 |
DBLP DOI BibTeX RDF |
search engine caches, digital preservation, web archiving |
12 | Dayong Ye, Quan Bai, Minjie Zhang, Zhen Ye |
P2P Distributed Intrusion Detections by Using Mobile Agents. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Christian Schläger, Ludwig Fuchs, Günther Pernul |
Intensive Programme on Information and Communication Security. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
IPICS, E-learning, IT Security |
12 | Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen |
Defending On-Line Web Application Security with User-Behavior Surveillance. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Web attacks, Markov model, User behavior, Web security, Web application security |
12 | Hui Liu, Zhitang Li |
Methodology of Network Intrusion Detection System Penetration Testing. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan |
A hypervisor-based system for protecting software runtime memory and persistent storage. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor |
12 | Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza |
Advanced Collage CAPTCHA. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart), Collage CAPTCHA, Non-OCR-Based CAPTCHA |
12 | Zhengbing Hu, Zhitang Li, Junqi Wu |
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Eelco Dolstra, Jurriaan Hage, Bastiaan Heeren, Stefan Holdermans, Johan Jeuring, Andres Löh, Clara Löh, Arie Middelkoop, Alexey Rodriguez, John van Schie |
Report on the tenth ICFP programming contest. |
ICFP |
2008 |
DBLP DOI BibTeX RDF |
reverse engineering, programming contest |
12 | Ross J. Anderson |
Security, Functionality and Scale? (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Manuel Mendonça, Nuno Ferreira Neves |
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. |
EDCC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar |
Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Shafi Goldwasser |
Program Obfuscation and One-Time Programs. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Chris Grier, Shuo Tang, Samuel T. King |
Secure Web Browsing with the OP Web Browser. |
SP |
2008 |
DBLP DOI BibTeX RDF |
security, browser, web security |
12 | Guo-Lun Luo, Henry Ker-Chang Chang |
A new online auction with convertible authenticated encryption and authentication. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Wen-Gong Shieh, Jianmin Wang, Wen-Bing Horng |
Secure remote control model for information appliances. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Emmanuel Velasco, Weifeng Chen 0001, Ping Ji 0002, Raymond Hsieh |
Wireless Forensic: A New Radio Frequency Based Locating System. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Fahim Akhter |
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Securing information content using new encryption method and Steganography. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Karen Heyman |
New Attack Tricks Antivirus Software. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
antivirus software, dynamic code obfuscation, DCO attacks |
12 | George Lawton |
Web 2.0 Creates Security Challenges. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
Web 2.0, security and privacy |
12 | Manuel Mendonça, Nuno Ferreira Neves |
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee |
Cyber Threat Trend Analysis Model Using HMM. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Håvard D. Johansen, Dag Johansen, Robbert van Renesse |
FirePatch: Secure and Time-Critical Dissemination of Software Patches. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Régis Leveugle, Abdelaziz Ammari, V. Maingot, E. Teyssou, Pascal Moitrel, Christophe Mourtel, Nathalie Feyt, Jean-Baptiste Rigaud, Assia Tria |
Experimental evaluation of protections against laser-induced faults and consequences on fault modeling. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jayamsakthi Shanmugam, M. Ponnavaikko |
A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
12 | Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal |
A Reflection-Based Framework for Content Validation. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines |
Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
offline analysis, Rootkits, rootkit detection, live analysis |
12 | Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang |
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Forensics and Evidence, internet attacks, website systems |
12 | Weider D. Yu, Savitha Murthy |
PPMLP: A Special Modeling Language Processor for Privacy Policies. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Rick Wash |
Incentive design for home computer security. |
CHI Extended Abstracts |
2007 |
DBLP DOI BibTeX RDF |
botnets |
12 | Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang |
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Forensic Features, Identifying Users, Data Mining, Intrusion Detection |
12 | G. V. S. Raju 0001, Rehan Akbani |
Authentication in Wireless Networks. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti |
E-Risk Management through Self Insurance: An Option Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
e-risk, option model, self-insurance, e-commerce, security breach |
12 | Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass |
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee |
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|