The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hacking with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1963-1998 (16) 1999-2001 (15) 2002-2003 (29) 2004 (23) 2005 (28) 2006 (23) 2007 (25) 2008 (21) 2009 (24) 2010 (17) 2011-2012 (27) 2013 (38) 2014 (46) 2015 (45) 2016 (73) 2017 (63) 2018 (58) 2019 (64) 2020 (61) 2021 (56) 2022 (66) 2023 (83) 2024 (42)
Publication types (Num. hits)
article(613) book(7) data(1) incollection(5) inproceedings(311) phdthesis(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 184 occurrences of 135 keywords

Results
Found 951 publication records. Showing 943 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Ahmed Falah, Lei Pan 0002, Feifei Chen 0001 A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills. Search on Bibsonomy TALE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Andy Lilly IMSI catchers: hacking mobile communications. Search on Bibsonomy Netw. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Barry A. T. Brown, Susanne Bødker, Kristina Höök Does HCI scale?: scale hacking and the relevance of HCI. Search on Bibsonomy Interactions The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Youyang Hou, Dakuo Wang Hacking with NPOs: Collaborative Analytics and Broker Roles in Civic Data Hackathons. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Nir Kshetri, Jeffrey M. Voas Hacking Power Grids: A Current Problem. Search on Bibsonomy Computer The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Hal Berghel Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election. Search on Bibsonomy Computer The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Jon D. Elhai, Jason C. Levine, Brian J. Hall Anxiety about electronic data hacking: Predictors and relations with digital privacy protection behavior. Search on Bibsonomy Internet Res. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Carlos Bermejo, Pan Hui 0001 Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
17Kjell Hausken Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Search on Bibsonomy Games The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer 0001, Srdjan Capkun Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
17Jon D. Elhai, Sangmi Chai, Aliaksandr Amialchuk, Brian J. Hall Cross-cultural and gender associations with anxiety about electronic data hacking. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Georg Thomas, Oliver K. Burmeister, Greg Low Issues of Implied Trust in Ethical Hacking. Search on Bibsonomy ACIS The full citation details ... 2017 DBLP  BibTeX  RDF
17Mookyu Park, Junwoo Seo, Kyoungmin Kim 0001, Moosung Park, Kyungho Lee Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders. Search on Bibsonomy MIST@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Michel Dubois 0003, Eric Filiol Hacking of the AES with Boolean Functions. Search on Bibsonomy ICISSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Camille Baker, Kate Sicchio Hacking the Body 2.0: Ethics in Wearable Tech, Etextiles Design and Data Collection in Performance. Search on Bibsonomy HCI (30) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone Car hacking identification through fuzzy logic algorithms. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Anna Filippova, Brad Chapman, R. Stuart Geiger, James D. Herbsleb, Arun Kalyanasundaram, Erik H. Trainer, Aurelia Moser, Arlin Stoltzfus Hacking and Making at Time-Bounded Events: Current Trends and Next Steps in Research and Event Design. Search on Bibsonomy CSCW Companion The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Matthias Korn, Susann Wagenknecht Friction in Arenas of Repair: Hacking, Security Research, and Mobile Phone Infrastructure. Search on Bibsonomy CSCW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Makoto Nakaya, Masahiro Okawa, Masahiro Nakajima, Hiroyuki Tominaga A Support Environment and a Trial Practice of Hacking Contest with Attack and Defense Style on a Game Website. Search on Bibsonomy IV The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Kemal Hajdarevic, Adna Kozic, Indira Avdagic, Zerina Masetic, Nejdet Dogru Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator. Search on Bibsonomy ICAT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Kanwalinderjit Gagneja, Luis Gabriel Jaimes Computational Security and the Economics of Password Hacking. Search on Bibsonomy FNSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Giorgio Di Natale, Marie-Lise Flottes, Sophie Dupuis, Bruno Rouzeyre Hacking the Control Flow error detection mechanism. Search on Bibsonomy IVSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang Hacking in Darkness: Return-oriented Programming against Secure Enclaves. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2017 DBLP  BibTeX  RDF
17Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg Live Lesson: Netsim: Network simulation and hacking for high schoolers. Search on Bibsonomy ASE @ USENIX Security Symposium The full citation details ... 2017 DBLP  BibTeX  RDF
17Nadimpalli V. R. Mahadev Building a Secure Hacking Lab in a Small University. Search on Bibsonomy ITiCSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Jane Wyngaard, Heather J. Lynch, Jaroslaw Nabrzyski, Allen Pope, Shantenu Jha Hacking at the Divide Between Polar Science and HPC: Using Hackathons as Training Tools. Search on Bibsonomy IPDPS Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Madeline Balaam, Lone Koefoed Hansen, Catherine D'Ignazio, Emma Simpson, Teresa Almeida, Stacey Kuznetsov, Mike Catt, Marie Louise Juul Søndergaard Hacking Women's Health. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Mookyu Park, Moosung Park, Kyungho Lee Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident. Search on Bibsonomy WISA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Olga Babko-Malaya, Rebecca Cathey, Steve Hinton, David Maimon, Taissa Gladkova Detection of hacking behaviors and communication patterns on social media. Search on Bibsonomy IEEE BigData The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Filippo Pierozzi The Hacking Team Case: Quis Custodiet Ipsos Custodes? Issues and Challenges for a More Efficient Partnership Between Private Industry and Intelligence Agencies (in Italian). Search on Bibsonomy ITASEC The full citation details ... 2017 DBLP  BibTeX  RDF
17Gabriella Coleman Hacking Computer Science History: A Cultural Intervention. Search on Bibsonomy UIST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Giuseppe Di Leo, Consolatina Liguori, Vincenzo Paciello, Antonio Pietrosanto, Paolo Sommella I3DermoscopyApp: Hacking Melanoma thanks to IoT technologies. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
17Yien Wang, Jianhua Yang Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool. Search on Bibsonomy AINA Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Yasmeen Alufaisan, Yan Zhou 0001, Murat Kantarcioglu, Bhavani Thuraisingham Hacking social network data mining. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Ronald Loui, Will Hope Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer 0001, Srdjan Capkun Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Marko Wolf, Robert Lambert Hacking Trucks - Cybersecurity Risks and Effective Cybersecurity Protection for Heavy Duty Vehicles. Search on Bibsonomy Automotive - Safety & Security The full citation details ... 2017 DBLP  BibTeX  RDF
17Boaz Miller What is Hacking's argument for entity realism? Search on Bibsonomy Synth. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Mehdi Dadkhah, Mohammad Lagzian, Glenn Borchardt The Game of Hacking Academic Websites. Search on Bibsonomy World Digit. Libr. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Jeff Boykin, Melissa Harbour, Colin Taper, Brian Brandenburg, Ray Pastore Book Review: Hacking Society: How Reality Is Broken Constructs Gaming as a Necessary Cure-All. Search on Bibsonomy Games Cult. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Marcello Ienca, Pim Haselager Hacking the brain: brain-computer interfacing technology and the ethics of neurosecurity. Search on Bibsonomy Ethics Inf. Technol. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Mark Bilandzic Connected learning in the library as a product of hacking, making, social diversity and messiness. Search on Bibsonomy Interact. Learn. Environ. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Spencer Jordan Hacking the streets: 'Smart' writing in the smart city. Search on Bibsonomy First Monday The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Katrien Dreessen, Selina Schepers, Danny Leen From Hacking Things to Making Things. Rethinking making by supporting non-expert users in a FabLab. Search on Bibsonomy IxD&A The full citation details ... 2016 DBLP  BibTeX  RDF
17Alison Powell Hacking in the public interest: Authority, legitimacy, means, and ends. Search on Bibsonomy New Media Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Lilly U. Nguyen Infrastructural action in Vietnam: Inverting the techno-politics of hacking in the global South. Search on Bibsonomy New Media Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Jeremy Hunsinger, Andrew Schrock The democratization of hacking and making. Search on Bibsonomy New Media Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Andrew R. Schrock Civic hacking as data activism and advocacy: A history from publicity to open government data. Search on Bibsonomy New Media Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer 0001, Srdjan Capkun Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
17Michel Dubois 0003, Eric Filiol Hacking of the AES with Boolean Functions. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
17Maurice Schellekens Car hacking: Navigating the regulatory landscape. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Zouheir Trabelsi, Margaret McCoey Ethical Hacking in Information Security Curricula. Search on Bibsonomy Int. J. Inf. Commun. Technol. Educ. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Sumen Rai, Mary Griffiths 'Useful' civic hacking for environmental sustainability: knowledge transfer and the International Space Apps Challenge. Search on Bibsonomy J. Community Informatics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Jon D. Elhai, Brian J. Hall Anxiety about internet hacking: Results from a community sample. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Nitin Jain, Gregory S. Kanter Upconversion-based receivers for quantum hacking-resistant quantum key distribution. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Stuart Lipoff Hacking the House Chapter 3: Nonstop Internet. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Stuart Lipoff Hacking the House Chapter 2: The Boston VoIP doorbell. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Stuart Lipoff Hacking the House: Chapter 1 - The Chicago doorbell. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Marie Vasek, John Wadleigh, Tyler Moore 0001 Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Baha Abu-Shaqra, Rocci Luppicini Technoethical Inquiry into Ethical Hacking at a Canadian University. Search on Bibsonomy Int. J. Technoethics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Adekemi Olufunmilola Omotubora Comparative perspectives on cybercrime legislation in Nigeria and the UK - a case for revisiting the "hacking" offences under the Nigerian Cybercrime Act 2015. Search on Bibsonomy Eur. J. Law Technol. The full citation details ... 2016 DBLP  BibTeX  RDF
17Sam Abbott-McCune, Lisa A. Shay Techniques in hacking and simulating a modem automotive controller area network. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Giovanni Vigna Binary Analysis for Autonomous Hacking: Invited Abstract. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia 0001 Hacking the DBMS to Prevent Injection Attacks. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
17Craig Anslow, Stuart Marshall, James Noble 0001, Robert Biddle Hacking with multi-touch for Java (MT4j). Search on Bibsonomy Mobile!@SPLASH The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Mee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim WHAP: Web-hacking profiling using Case-Based Reasoning. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Alexander Mikhaylov, Richard Frank Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes. Search on Bibsonomy EISIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Susann Wagenknecht, Matthias Korn Hacking as Transgressive Infrastructuring: Mobile Phone Networks and the German Chaos Computer Club. Search on Bibsonomy CSCW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Yelizaveta Burakova, Bill Hass, Leif Millar, André Weimerskirch Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
17Saad Abdullah Alsunbul, Phu Dung Le, Jan Newmarch, Jefferson Tan A Dynamic Security Model for Addressing Hacking Risk Factors. Search on Bibsonomy ISD The full citation details ... 2016 DBLP  BibTeX  RDF
17Zrinka Lovric Svehla, Ivan Sedinic, Luka Pauk Going white hat: Security check by hacking employees using social engineering techniques. Search on Bibsonomy MIPRO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Elie Bursztein I am a legend: Hacking hearthstone using statistical learning methods. Search on Bibsonomy CIG The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Abram Hindle Hacking NIMEs. Search on Bibsonomy NIME The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Hilary Berger, Andrew Jones Cyber Security & Ethical Hacking For SMEs. Search on Bibsonomy KMO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Sultan Al Sharif, Farkhund Iqbal, Thar Baker, A. Khattack White-Hat Hacking Framework for Promoting Security Awareness. Search on Bibsonomy NTMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Edna Tan, Angela Calabrese Barton Hacking a Path In and Through STEM: Unpacking the STEM Identity Work of Historically Underrepresented Youth in STEM. Search on Bibsonomy ICLS The full citation details ... 2016 DBLP  BibTeX  RDF
17Toshiyuki Shimono A hacking toolset for big tabular files (Codenames: Bin4tsv, Kabutomushi). Search on Bibsonomy IEEE BigData The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Ryoko Ueoka, Ali AlMutawa, Hikaru Katsuki Emotion hacking VR (EH-VR): amplifying scary VR experience by accelerating real heart rate using false vibrotactile biofeedback. Search on Bibsonomy SIGGRAPH ASIA Emerging Technologies The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Saad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan 0002 A network defense system for detecting and preventing potential hacking attempts. Search on Bibsonomy ICOIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Jianhua Yang, Yien Wang, Thomas Reddington Integrate Hacking Technique into Information Assurance Education. Search on Bibsonomy AINA Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Kathryn E. Merrick, Medria K. D. Hardhienata, Kamran Shafi, Jiankun Hu Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems. Search on Bibsonomy SSCI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Austin S. Lee, Dhairya Dand MeMod: A Modular Hacking and Programming Toolkit For Everyday Objects. Search on Bibsonomy TEI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Alwin de Rooij Hacking into the emotion-creativity link : two new approaches to interactive systems that influence the relationship between emotion and creativity. Search on Bibsonomy 2016   RDF
17Andrea Rota Hacking the Web 2.0 : user agency and the role of hackers as computational mediators. Search on Bibsonomy 2016   RDF
17Paolo Cardullo 'Hacking multitude' and Big Data: Some insights from the Turkish 'digital coup'. Search on Bibsonomy Big Data Soc. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Jennifer Pybus, Mark Coté, Tobias Blanke Hacking the social life of Big Data. Search on Bibsonomy Big Data Soc. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Demian Riccardi, Jerry M. Parks, Alexander Johs, Jeremy C. Smith HackaMol: An Object-Oriented Modern Perl Library for Molecular Hacking on Multiple Scales. Search on Bibsonomy J. Chem. Inf. Model. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Nicole Radziwill, Jessica Romano, Diane Shorter, Morgan C. Benton The Ethics of Hacking: Should It Be Taught? Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
17Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Filippo Bonchi, Damien Pous Hacking nondeterminism with induction and coinduction. Search on Bibsonomy Commun. ACM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Nikolaos Tsalis, Dimitris Gritzalis Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015). Search on Bibsonomy Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17George Stergiopoulos, Dimitris Gritzalis Hacking and Penetration Testing with Low Power Devices. Search on Bibsonomy Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Hosein Jafarkarimi, Alex Tze Hiang Sim, Robab Saadatdoost, Jee Mei Hee Individual Characteristics and Hacking, Piracy, Online Gambling and Pornography Use among Students: A Study in Malaysia. Search on Bibsonomy Int. J. Cyber Behav. Psychol. Learn. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Sarah E. Fox, Rachel Rose Ulgado, Daniela K. Rosner Hacking Culture, Not Devices: Access and Recognition in Feminist Hackerspaces. Search on Bibsonomy CSCW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Knut H. Rolland, Gheorghita Ghinea, Tor-Morten Grønli Ambidextrous Enterprise Architecting: Betting on the Future and Hacking Path-dependencies. Search on Bibsonomy ECIS The full citation details ... 2015 DBLP  BibTeX  RDF
17Sasan Jafarnejad, Lara Codeca, Walter Bronzi, Raphaël Frank, Thomas Engel 0001 A Car Hacking Experiment: When Connectivity Meets Vulnerability. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Jose Manuel Martin-Valencia, Hipólito Guzmán-Miranda, Miguel Angel Aguirre Echánove FPGA-based mimicking of cryptographic device hacking through fault injection attacks. Search on Bibsonomy ICIT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Mirjana Prpa, Karen Cochrane, Bernhard E. Riecke Hacking Alternatives in 21st Century: Designing a Bio-Responsive Virtual Environment for Stress Reduction. Search on Bibsonomy MindCare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Hwajeong Seo, Zhe Liu 0001, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim 0001 Open Sesame! Hacking the Password. Search on Bibsonomy WISA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Alwin de Rooij, Philip J. Corr, Sara Jones 0001 Emotion and Creativity: Hacking into Cognitive Appraisal Processes to Augment Creative Ideation. Search on Bibsonomy Creativity & Cognition The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 943 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license