The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hackers with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1995 (15) 1996-1999 (17) 2000-2001 (18) 2002 (16) 2003 (24) 2004 (29) 2005 (23) 2006 (26) 2007 (33) 2008 (33) 2009 (16) 2010-2012 (22) 2013-2014 (19) 2015-2016 (24) 2017-2018 (29) 2019-2020 (17) 2021-2022 (17) 2023-2024 (10)
Publication types (Num. hits)
article(181) book(3) incollection(6) inproceedings(196) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 254 occurrences of 176 keywords

Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Tiantian Qin, Judee K. Burgoon An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Hongbin Lu, Kai Zheng 0003, Bin Liu 0001, Changhua Sun A Robust Approach for Matching Mixed Casesensitive and Case-insensitive Patterns. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Gregory P. Schaffer Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Bradley S. Rubin, Donald Cheung Computer Security Education and Research: Handle with Care. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12William Suchan, Edward Sobiesk Strengthening the Weakest Link in Digital Protection. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Tom Cross Academic freedom and the hacker ethic. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Prahlad Fogla, Wenke Lee Evading network anomaly detection systems: formal reasoning and practical techniques. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF polymorphic blending attack, anomaly detection, mimicry attack
12Yacine Bouzida, Frédéric Cuppens Detecting Known and Novel Network Intrusions. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12A. Murali M. Rao Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Stefan A. Robila, James W. Ragucci Don't be a phish: steps in user education. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF education, information security, phishing, computer education
12Fran Berman One hundred years of data. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Sanjeev Kumar, Montasir Azad, Orifiel Gomez, R. Valdez Can Microsoft's Service Pack2 (SP2) Security Software Prevent SMURF Attacks? Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu Hacking Tricks Toward Security on Network Environments. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing
12Peter Phuong Vo, Chau Maggie Vo FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption using flipping, shifting operations, mapping
12Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
12Martin Mink, Felix C. Freiling Is attack better than defense?: teaching information security the right way. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF offensive techniques, security lab, summerschool, computer forensics, security education, empirical measurement
12Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit Monitoring hacker activity with a Honeynet. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications
12Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim Securing Wi-Fi Networks. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless hacking, wireless security, virtual private networks, Wi-Fi networks
12Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon SAFE-OPS: An approach to embedded software security. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Software protection, HW/SW codesign
12James A. McHugh, Fadi P. Deek An incentive system for reducing malware attacks. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Kumar Chellapilla, Kevin Larson, Patrice Y. Simard, Mary Czerwinski Designing human friendly human interaction proofs (HIPs). Search on Bibsonomy CHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF completely automated public turing tests to tell computers and humans apart (CAPTCHAs), visual letter recognition, evaluation, computer vision, human perception, human interaction proofs (HIPs)
12Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana Critical Analysis and New Perspective for Securing Voice Networks. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF VoIP, GSM, Security mechanisms, SRTP
12João Durães, Henrique Madeira A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code. Search on Bibsonomy LADC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ram Dantu, Prakash Kolan Risk Management Using Behavior Based Bayesian Networks. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Nikolai Joukov, Erez Zadok Adding Secure Deletion to Your Favorite File System. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Unintended data recovery, Security
12Nicolas Loriant, Marc Ségura-Devillechaise, Jean-Marc Menaud Server Protection through Dynamic Patching. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Bruce Hartpence Teaching wireless security for results. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack/defend, teaching, wireless security
12Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok An electric fence for kernel buffers. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, file systems, buffer overflow
12M. H. Kuo An Intelligent Agent-Based Framework for Collaborative Information Security. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Charles U. Martel, Glen Nuckolls, Premkumar T. Devanbu, Michael Gertz 0001, April Kwong, Stuart G. Stubblebine A General Model for Authenticated Data Structures. Search on Bibsonomy Algorithmica The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Authentic publication, Security, Data structures, Database integrity
12Kevin Borders, Atul Prakash 0001 Web tap: detecting covert web traffic. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels
12Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari Flexible Software Protection Using Hardware/Software Codesign Techniques. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Magnus Almgren, Erland Jonsson Using Active Learning in Intrusion Detection. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, active learning
12Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac Accountable Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Jae-Woo Lee Security Agent Model Using Interactive Authentication Database. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Jae-Woo Lee Client Authentication Model Using Duplicated Authentication Server Systems. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Steven K. Brawn, R. Mark Koan, Kelly Caye Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x
12Ueli M. Maurer The Role of Cryptography in Database Security. Search on Bibsonomy SIGMOD Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Zouheir Trabelsi, Hamza Rahmani, Kamel Kaouech, Mounir Frikha Malicious Sniffing Systems Detection Platform. Search on Bibsonomy SAINT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ikuo Takahashi Legal System and Computer Forensics Business. Search on Bibsonomy SAINT Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 Application of Content Computing in Honeyfarm. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF honeyfarm, distributed computing, Network security, content delivery network
12Mihai Christodorescu, Somesh Jha Testing malware detectors. Search on Bibsonomy ISSTA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malware, obfuscation, adaptive testing, anti-virus
12Yannick Monnet, Marc Renaudin, Régis Leveugle Asynchronous Circuits Sensitivity to Fault Injection. Search on Bibsonomy IOLTS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Karthik N. Kannan, Rahul Telang, Hao Xu Economic Analysis of the Market for Software Vulnerability Disclosure. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ming-Ni Wu, Min-Hui Lin 0001, Chin-Chen Chang 0001 A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF LSB substitution, genetic algorithm, image hiding
12Ram Dantu, Kall Loper, Prakash Kolan Risk Management using Behavior based Attack Graphs. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Erik Jan Marinissen Security vs. Test Quality: Can We Really Only Have One at a Time? Search on Bibsonomy ITC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Jeremiah K. Jones, Gordon W. Romney Honeynets: an educational resource for IT security. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education
12Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF user education, access control, social engineering, physical security
12Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala Static Analyzer of Vicious Executables (SAVE). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Steven J. Vaughan-Nichols How Trustworthy Is Trusted Computing? Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12David J. Scott, Richard Sharp Specifying and Enforcing Application-Level Web Security Policies. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Application-level Web security, security policy description languages, component-based design
12Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen High-Assurance Synthesis of Security Services from Basic Microservices. Search on Bibsonomy ISSRE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Microservices, Software architecture, Software composition, Security service
12Hongxia Jin, Jeffery Lotspiech Proactive Software Tampering Detection. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Mario Di Raimondo, Rosario Gennaro Provably Secure Threshold Password-Authenticated Key Exchange. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Ja-Min Koo, Sung-Bae Cho Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Gabriele Spenger Authentication, Identification Techniques, and Secure Containers - Baseline Technologies. Search on Bibsonomy Digital Rights Management The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater Memories: A Survey of Their Secure Uses in Smart Cards. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure memories, Smart cards, Tamper resistance, Side channels, Secure hardware
12Celia Pearce, Robert Nideffer, Eddo Stern, Anne-Marie Schleiner, Brody Condon Game art. Search on Bibsonomy SI3D The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer A Stateful Intrusion Detection System for World-Wide Web Servers. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, World-Wide Web, Intrusion Detection
12Sri Kumar, Vladimir Marbukh A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12George E. Kalb, Gerald M. Masson Continuous Process Improvement and the Risk to Information Assurance. Search on Bibsonomy IEEE Softw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Greg Hoglund, Gary McGraw Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software. Search on Bibsonomy IEEE Softw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough On-the-fly web content integrity check boosts users's confidence. Search on Bibsonomy Commun. ACM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12David J. Scott, Richard Sharp Abstracting application-level web security. Search on Bibsonomy WWW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF application-Level web security, security policy description language, component-based design
12Radu Grosu, Erez Zadok, Scott A. Smolka, Rance Cleaveland, Yanhong A. Liu High-confidence operating systems. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Kwong H. Yung Detecting Long Connection Chains of Interactive Terminal Sessions. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF connection chain, terminal session, delayed acknowledgment, reply echo, echo delay, intrusion detection, network security, computer security, network protocol, Stepping stone
12Randy C. Marchany, Joseph G. Tront E-commerce Security Issues. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF e-commerce, Network Security, e-business, internet security, computer virus
12Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong Learning Fingerprints for a Database Intrusion Detection System. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Donghua Xu, Chenghuai Lu, André L. M. dos Santos Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Sandra Kay Miller Facing the Challenge of Wireless Security. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Yang-Seo Choi, Dong-il Seo, Sung Won Sohn A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12William E. Johnston, Sumit Talwar, Keith R. Jackson Overview of Security Considerations for Computational and Data Grids. Search on Bibsonomy HPDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Julien Boeuf, Julien P. Stern An Analysis of One of the SDMI Candidates. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes Are We Forgetting the Risks of Information Technology? Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Richard J. Hughes, Colin P. Williams Quantum Computing: The Final Frontier? Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Alex Biryukov, Adi Shamir, David A. Wagner 0001 Real Time Cryptanalysis of A5/1 on a PC. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Alok R. Chaturvedi, Mukul Gupta, Shailendra Raj Mehta, Wei T. Yue Agent-based Simulation Approach to Information Warfare in the SEAS Environment. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Robert N. Smith, Sourav Bhattacharya Operating firewalls outside the LAN perimeter. Search on Bibsonomy IPCCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Robert N. Smith, Sourav Bhattacharya A Protocol and Simulation for Distributed Communicating Firewalls. Search on Bibsonomy COMPSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Firewall Cascade, Firewall Leak, Simulation, Java, Fault-Tolerance, Network Security, Emulation, Firewall, Security Management
12Eduardo B. Fernández Coordination of Security Levels for Internet Architectures. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Pietro Iglio TrustedBox: A Kernel-Level Integrity Checker. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF integrity checker
12Michael Condict, Dejan S. Milojicic, Franklin Reynolds, Don Bolinger Towards a world-wide civilization of objects. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
12T. F. Higginbotham Prospectives on computer science: twenty-five years of observations. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
12John A. N. Lee, Gerald Segal, Rosalie Steier Positive Alternatives: A Report on an ACM Panel on Hacking. Search on Bibsonomy Commun. ACM The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #388 of 388 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license