Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Ahmed Falah, Lei Pan 0002, Feifei Chen 0001 |
A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills. |
TALE |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Andy Lilly |
IMSI catchers: hacking mobile communications. |
Netw. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Barry A. T. Brown, Susanne Bødker, Kristina Höök |
Does HCI scale?: scale hacking and the relevance of HCI. |
Interactions |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Youyang Hou, Dakuo Wang |
Hacking with NPOs: Collaborative Analytics and Broker Roles in Civic Data Hackathons. |
Proc. ACM Hum. Comput. Interact. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Nir Kshetri, Jeffrey M. Voas |
Hacking Power Grids: A Current Problem. |
Computer |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Hal Berghel |
Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election. |
Computer |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jon D. Elhai, Jason C. Levine, Brian J. Hall |
Anxiety about electronic data hacking: Predictors and relations with digital privacy protection behavior. |
Internet Res. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Carlos Bermejo, Pan Hui 0001 |
Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
17 | Kjell Hausken |
Security Investment, Hacking, and Information Sharing between Firms and between Hackers. |
Games |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer 0001, Srdjan Capkun |
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
17 | Jon D. Elhai, Sangmi Chai, Aliaksandr Amialchuk, Brian J. Hall |
Cross-cultural and gender associations with anxiety about electronic data hacking. |
Comput. Hum. Behav. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Georg Thomas, Oliver K. Burmeister, Greg Low |
Issues of Implied Trust in Ethical Hacking. |
ACIS |
2017 |
DBLP BibTeX RDF |
|
17 | Mookyu Park, Junwoo Seo, Kyoungmin Kim 0001, Moosung Park, Kyungho Lee |
Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders. |
MIST@CCS |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Michel Dubois 0003, Eric Filiol |
Hacking of the AES with Boolean Functions. |
ICISSP |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Camille Baker, Kate Sicchio |
Hacking the Body 2.0: Ethics in Wearable Tech, Etextiles Design and Data Collection in Performance. |
HCI (30) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
Car hacking identification through fuzzy logic algorithms. |
FUZZ-IEEE |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Anna Filippova, Brad Chapman, R. Stuart Geiger, James D. Herbsleb, Arun Kalyanasundaram, Erik H. Trainer, Aurelia Moser, Arlin Stoltzfus |
Hacking and Making at Time-Bounded Events: Current Trends and Next Steps in Research and Event Design. |
CSCW Companion |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Matthias Korn, Susann Wagenknecht |
Friction in Arenas of Repair: Hacking, Security Research, and Mobile Phone Infrastructure. |
CSCW |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Makoto Nakaya, Masahiro Okawa, Masahiro Nakajima, Hiroyuki Tominaga |
A Support Environment and a Trial Practice of Hacking Contest with Attack and Defense Style on a Game Website. |
IV |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Kemal Hajdarevic, Adna Kozic, Indira Avdagic, Zerina Masetic, Nejdet Dogru |
Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator. |
ICAT |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Kanwalinderjit Gagneja, Luis Gabriel Jaimes |
Computational Security and the Economics of Password Hacking. |
FNSS |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Giorgio Di Natale, Marie-Lise Flottes, Sophie Dupuis, Bruno Rouzeyre |
Hacking the Control Flow error detection mechanism. |
IVSW |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jae-Hyuk Lee, Jin Soo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, Brent ByungHoon Kang |
Hacking in Darkness: Return-oriented Programming against Secure Enclaves. |
USENIX Security Symposium |
2017 |
DBLP BibTeX RDF |
|
17 | Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg |
Live Lesson: Netsim: Network simulation and hacking for high schoolers. |
ASE @ USENIX Security Symposium |
2017 |
DBLP BibTeX RDF |
|
17 | Nadimpalli V. R. Mahadev |
Building a Secure Hacking Lab in a Small University. |
ITiCSE |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jane Wyngaard, Heather J. Lynch, Jaroslaw Nabrzyski, Allen Pope, Shantenu Jha |
Hacking at the Divide Between Polar Science and HPC: Using Hackathons as Training Tools. |
IPDPS Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Madeline Balaam, Lone Koefoed Hansen, Catherine D'Ignazio, Emma Simpson, Teresa Almeida, Stacey Kuznetsov, Mike Catt, Marie Louise Juul Søndergaard |
Hacking Women's Health. |
CHI Extended Abstracts |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Mookyu Park, Moosung Park, Kyungho Lee |
Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident. |
WISA |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Olga Babko-Malaya, Rebecca Cathey, Steve Hinton, David Maimon, Taissa Gladkova |
Detection of hacking behaviors and communication patterns on social media. |
IEEE BigData |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Filippo Pierozzi |
The Hacking Team Case: Quis Custodiet Ipsos Custodes? Issues and Challenges for a More Efficient Partnership Between Private Industry and Intelligence Agencies (in Italian). |
ITASEC |
2017 |
DBLP BibTeX RDF |
|
17 | Gabriella Coleman |
Hacking Computer Science History: A Cultural Intervention. |
UIST |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Giuseppe Di Leo, Consolatina Liguori, Vincenzo Paciello, Antonio Pietrosanto, Paolo Sommella |
I3DermoscopyApp: Hacking Melanoma thanks to IoT technologies. |
HICSS |
2017 |
DBLP BibTeX RDF |
|
17 | Yien Wang, Jianhua Yang |
Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool. |
AINA Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Yasmeen Alufaisan, Yan Zhou 0001, Murat Kantarcioglu, Bhavani Thuraisingham |
Hacking social network data mining. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Ronald Loui, Will Hope |
Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure. |
DASC/PiCom/DataCom/CyberSciTech |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer 0001, Srdjan Capkun |
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. |
CHES |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Marko Wolf, Robert Lambert |
Hacking Trucks - Cybersecurity Risks and Effective Cybersecurity Protection for Heavy Duty Vehicles. |
Automotive - Safety & Security |
2017 |
DBLP BibTeX RDF |
|
17 | Boaz Miller |
What is Hacking's argument for entity realism? |
Synth. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Mehdi Dadkhah, Mohammad Lagzian, Glenn Borchardt |
The Game of Hacking Academic Websites. |
World Digit. Libr. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Jeff Boykin, Melissa Harbour, Colin Taper, Brian Brandenburg, Ray Pastore |
Book Review: Hacking Society: How Reality Is Broken Constructs Gaming as a Necessary Cure-All. |
Games Cult. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Marcello Ienca, Pim Haselager |
Hacking the brain: brain-computer interfacing technology and the ethics of neurosecurity. |
Ethics Inf. Technol. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Mark Bilandzic |
Connected learning in the library as a product of hacking, making, social diversity and messiness. |
Interact. Learn. Environ. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Spencer Jordan |
Hacking the streets: 'Smart' writing in the smart city. |
First Monday |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Katrien Dreessen, Selina Schepers, Danny Leen |
From Hacking Things to Making Things. Rethinking making by supporting non-expert users in a FabLab. |
IxD&A |
2016 |
DBLP BibTeX RDF |
|
17 | Alison Powell |
Hacking in the public interest: Authority, legitimacy, means, and ends. |
New Media Soc. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Lilly U. Nguyen |
Infrastructural action in Vietnam: Inverting the techno-politics of hacking in the global South. |
New Media Soc. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Jeremy Hunsinger, Andrew Schrock |
The democratization of hacking and making. |
New Media Soc. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Andrew R. Schrock |
Civic hacking as data activism and advocacy: A history from publicity to open government data. |
New Media Soc. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer 0001, Srdjan Capkun |
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
17 | Michel Dubois 0003, Eric Filiol |
Hacking of the AES with Boolean Functions. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
17 | Maurice Schellekens |
Car hacking: Navigating the regulatory landscape. |
Comput. Law Secur. Rev. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Zouheir Trabelsi, Margaret McCoey |
Ethical Hacking in Information Security Curricula. |
Int. J. Inf. Commun. Technol. Educ. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Sumen Rai, Mary Griffiths |
'Useful' civic hacking for environmental sustainability: knowledge transfer and the International Space Apps Challenge. |
J. Community Informatics |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Jon D. Elhai, Brian J. Hall |
Anxiety about internet hacking: Results from a community sample. |
Comput. Hum. Behav. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Nitin Jain, Gregory S. Kanter |
Upconversion-based receivers for quantum hacking-resistant quantum key distribution. |
Quantum Inf. Process. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Stuart Lipoff |
Hacking the House Chapter 3: Nonstop Internet. |
IEEE Consumer Electron. Mag. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Stuart Lipoff |
Hacking the House Chapter 2: The Boston VoIP doorbell. |
IEEE Consumer Electron. Mag. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Stuart Lipoff |
Hacking the House: Chapter 1 - The Chicago doorbell. |
IEEE Consumer Electron. Mag. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Marie Vasek, John Wadleigh, Tyler Moore 0001 |
Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk. |
IEEE Trans. Dependable Secur. Comput. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Baha Abu-Shaqra, Rocci Luppicini |
Technoethical Inquiry into Ethical Hacking at a Canadian University. |
Int. J. Technoethics |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Adekemi Olufunmilola Omotubora |
Comparative perspectives on cybercrime legislation in Nigeria and the UK - a case for revisiting the "hacking" offences under the Nigerian Cybercrime Act 2015. |
Eur. J. Law Technol. |
2016 |
DBLP BibTeX RDF |
|
17 | Sam Abbott-McCune, Lisa A. Shay |
Techniques in hacking and simulating a modem automotive controller area network. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Giovanni Vigna |
Binary Analysis for Autonomous Hacking: Invited Abstract. |
AsiaCCS |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia 0001 |
Hacking the DBMS to Prevent Injection Attacks. |
CODASPY |
2016 |
DBLP BibTeX RDF |
|
17 | Craig Anslow, Stuart Marshall, James Noble 0001, Robert Biddle |
Hacking with multi-touch for Java (MT4j). |
Mobile!@SPLASH |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Mee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim |
WHAP: Web-hacking profiling using Case-Based Reasoning. |
CNS |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Alexander Mikhaylov, Richard Frank |
Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes. |
EISIC |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Susann Wagenknecht, Matthias Korn |
Hacking as Transgressive Infrastructuring: Mobile Phone Networks and the German Chaos Computer Club. |
CSCW |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Yelizaveta Burakova, Bill Hass, Leif Millar, André Weimerskirch |
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. |
WOOT |
2016 |
DBLP BibTeX RDF |
|
17 | Saad Abdullah Alsunbul, Phu Dung Le, Jan Newmarch, Jefferson Tan |
A Dynamic Security Model for Addressing Hacking Risk Factors. |
ISD |
2016 |
DBLP BibTeX RDF |
|
17 | Zrinka Lovric Svehla, Ivan Sedinic, Luka Pauk |
Going white hat: Security check by hacking employees using social engineering techniques. |
MIPRO |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Elie Bursztein |
I am a legend: Hacking hearthstone using statistical learning methods. |
CIG |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Abram Hindle |
Hacking NIMEs. |
NIME |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Hilary Berger, Andrew Jones |
Cyber Security & Ethical Hacking For SMEs. |
KMO |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Sultan Al Sharif, Farkhund Iqbal, Thar Baker, A. Khattack |
White-Hat Hacking Framework for Promoting Security Awareness. |
NTMS |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Edna Tan, Angela Calabrese Barton |
Hacking a Path In and Through STEM: Unpacking the STEM Identity Work of Historically Underrepresented Youth in STEM. |
ICLS |
2016 |
DBLP BibTeX RDF |
|
17 | Toshiyuki Shimono |
A hacking toolset for big tabular files (Codenames: Bin4tsv, Kabutomushi). |
IEEE BigData |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Ryoko Ueoka, Ali AlMutawa, Hikaru Katsuki |
Emotion hacking VR (EH-VR): amplifying scary VR experience by accelerating real heart rate using false vibrotactile biofeedback. |
SIGGRAPH ASIA Emerging Technologies |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Saad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan 0002 |
A network defense system for detecting and preventing potential hacking attempts. |
ICOIN |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Jianhua Yang, Yien Wang, Thomas Reddington |
Integrate Hacking Technique into Information Assurance Education. |
AINA Workshops |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Kathryn E. Merrick, Medria K. D. Hardhienata, Kamran Shafi, Jiankun Hu |
Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems. |
SSCI |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Austin S. Lee, Dhairya Dand |
MeMod: A Modular Hacking and Programming Toolkit For Everyday Objects. |
TEI |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Alwin de Rooij |
Hacking into the emotion-creativity link : two new approaches to interactive systems that influence the relationship between emotion and creativity. |
|
2016 |
RDF |
|
17 | Andrea Rota |
Hacking the Web 2.0 : user agency and the role of hackers as computational mediators. |
|
2016 |
RDF |
|
17 | Paolo Cardullo |
'Hacking multitude' and Big Data: Some insights from the Turkish 'digital coup'. |
Big Data Soc. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Jennifer Pybus, Mark Coté, Tobias Blanke |
Hacking the social life of Big Data. |
Big Data Soc. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Demian Riccardi, Jerry M. Parks, Alexander Johs, Jeremy C. Smith |
HackaMol: An Object-Oriented Modern Perl Library for Molecular Hacking on Multiple Scales. |
J. Chem. Inf. Model. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Nicole Radziwill, Jessica Romano, Diane Shorter, Morgan C. Benton |
The Ethics of Hacking: Should It Be Taught? |
CoRR |
2015 |
DBLP BibTeX RDF |
|
17 | Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici |
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. |
Int. J. Secur. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Filippo Bonchi, Damien Pous |
Hacking nondeterminism with induction and coinduction. |
Commun. ACM |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Nikolaos Tsalis, Dimitris Gritzalis |
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015). |
Comput. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | George Stergiopoulos, Dimitris Gritzalis |
Hacking and Penetration Testing with Low Power Devices. |
Comput. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Hosein Jafarkarimi, Alex Tze Hiang Sim, Robab Saadatdoost, Jee Mei Hee |
Individual Characteristics and Hacking, Piracy, Online Gambling and Pornography Use among Students: A Study in Malaysia. |
Int. J. Cyber Behav. Psychol. Learn. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Sarah E. Fox, Rachel Rose Ulgado, Daniela K. Rosner |
Hacking Culture, Not Devices: Access and Recognition in Feminist Hackerspaces. |
CSCW |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Knut H. Rolland, Gheorghita Ghinea, Tor-Morten Grønli |
Ambidextrous Enterprise Architecting: Betting on the Future and Hacking Path-dependencies. |
ECIS |
2015 |
DBLP BibTeX RDF |
|
17 | Sasan Jafarnejad, Lara Codeca, Walter Bronzi, Raphaël Frank, Thomas Engel 0001 |
A Car Hacking Experiment: When Connectivity Meets Vulnerability. |
GLOBECOM Workshops |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Jose Manuel Martin-Valencia, Hipólito Guzmán-Miranda, Miguel Angel Aguirre Echánove |
FPGA-based mimicking of cryptographic device hacking through fault injection attacks. |
ICIT |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Mirjana Prpa, Karen Cochrane, Bernhard E. Riecke |
Hacking Alternatives in 21st Century: Designing a Bio-Responsive Virtual Environment for Stress Reduction. |
MindCare |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Hwajeong Seo, Zhe Liu 0001, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim 0001 |
Open Sesame! Hacking the Password. |
WISA |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Alwin de Rooij, Philip J. Corr, Sara Jones 0001 |
Emotion and Creativity: Hacking into Cognitive Appraisal Processes to Augment Creative Ideation. |
Creativity & Cognition |
2015 |
DBLP DOI BibTeX RDF |
|