The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hacking with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1963-1998 (16) 1999-2001 (15) 2002-2003 (29) 2004 (23) 2005 (28) 2006 (23) 2007 (25) 2008 (21) 2009 (24) 2010 (17) 2011-2012 (27) 2013 (38) 2014 (46) 2015 (45) 2016 (73) 2017 (63) 2018 (58) 2019 (64) 2020 (61) 2021 (56) 2022 (66) 2023 (83) 2024 (42)
Publication types (Num. hits)
article(613) book(7) data(1) incollection(5) inproceedings(311) phdthesis(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 184 occurrences of 135 keywords

Results
Found 951 publication records. Showing 943 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Georges J. Jahchan Hacking Methods. Search on Bibsonomy Information Security Management Handbook, 6th ed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Paul Frenger Hacking your mouse: errata for March 2007. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Peter O. Okenyi, Thomas J. Owens On the Anatomy of Human Hacking. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Michael Wing Hacking with love. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Lixuan Zhang, Randall Young, Victor R. Prybutok Inhibitors of Two Illegal Behaviors: Hacking and Shoplifting. Search on Bibsonomy J. Organ. End User Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Randall Young, Lixuan Zhang, Victor R. Prybutok Hacking into the Minds of Hackers. Search on Bibsonomy Inf. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Kenneth Einar Himma Internet security - hacking, counterhacking, and society. Search on Bibsonomy 2007   RDF
17Will Jordan From Rule-Breaking to ROM-Hacking: Theorizing the Computer Game-as-Commodity. Search on Bibsonomy DiGRA Conference The full citation details ... 2007 DBLP  BibTeX  RDF
17Thawatchai Chomsiri HTTPS Hacking Protection. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Peter Sommer Criminalising hacking tools. Search on Bibsonomy Digit. Investig. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jürgen Müller 0006 Werkstatt - Experimente und Modelle: Legales Hacking. Search on Bibsonomy LOG IN The full citation details ... 2006 DBLP  BibTeX  RDF
17Joe Grand Research lessons from hardware hacking. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Dan Kaminsky Explorations in namespace: white-hat hacking across the domain name system. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Radu State Review of "Hacking Exposed: Web Applications, 2nd edition by Joel Scambray, Mike Shema, and Caleb Sima, " McGraw-Hill Osborne Media, 2006, ISBN: 0072262990. Search on Bibsonomy ACM Queue The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17David N. Blank-Edelman Hacking Perl². Search on Bibsonomy USENIX Annual Technical Conference, General Track The full citation details ... 2006 DBLP  BibTeX  RDF
17Wongoo Lee, Sijung Kim, Bonghan Kim Response Against Hacking and Malicious Code in P2P. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Robin Snyder Ethical hacking and password cracking: a pattern for individualized security exercises. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password cracking, patterns for security exercises
17Brian Still Hacking for a cause. Search on Bibsonomy First Monday The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Sandor Vegh The media's portrayal of hacking, hackers, and hacktivism before and after September 11. Search on Bibsonomy First Monday The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17David J. Gunkel Editorial: introduction to hacking and hacktivism. Search on Bibsonomy New Media Soc. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jim Thomas 0003 The moral ambiguity of social control in cyberspace: a retro-assessment of the 'golden age' of hacking. Search on Bibsonomy New Media Soc. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Douglas Thomas Hacking the body: code, performance and corporeality. Search on Bibsonomy New Media Soc. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17K. Ravi Srinivas A Review of: "Hacking Cyberspace'. Search on Bibsonomy Inf. Soc. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Radu State Review of "Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester". Search on Bibsonomy ACM Queue The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Tony Northrup, Eric Faulkner Home hacking projects - for geeks. Search on Bibsonomy 2005   RDF
17Nitesh Dhanjani, Justin Clarke Network security tools - writing, hacking, and modifying security tools. Search on Bibsonomy 2005   RDF
17Randall Young, Lingling Zhang Factors Affecting Illegal Hacking Behavior. Search on Bibsonomy AMCIS The full citation details ... 2005 DBLP  BibTeX  RDF
17Seung-Jae Yoo Core Technology Analysis and Development for the Virus and Hacking Prevention. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17George Cybenko, Annarita Giani, Paul Thompson Cognitive Hacking. Search on Bibsonomy Adv. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Al Bento, Regina Bento Empirical Test of a Hacking Model: An Exploratory Study. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Bruce Schneier Hacking the Business Climate for Network Security. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Marc Donner Hacking the Best-Seller List. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF popular fiction, sci-fi, Dan Brown, Da Vinci Code
17Giuliano Antoniol, Massimiliano Di Penta, Gianluca Masone, Umberto Villano Compiler Hacking for Source Code Analysis. Search on Bibsonomy Softw. Qual. J. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF source code analysis tools, XML, gcc, GXL
17Rita Puzmanova Review of "Wi-Foo: The Secrets of Wireless Hacking by Andrew Vladimirov, Konstantin V. Gravrilenko, and Andrei A. Mikhailovsky". Search on Bibsonomy ACM Queue The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Paul Thompson, George Cybenko, Annarita Giani Cognitive Hacking. Search on Bibsonomy Economics of Information Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Scott Fullam Hardware hacking projects - for geeks. Search on Bibsonomy 2004   RDF
17Alberto Bento, Regina Bento Empirical Test of Hacking Framework: An Exploratory Study. Search on Bibsonomy AMCIS The full citation details ... 2004 DBLP  BibTeX  RDF
17Neil Barrett Penetration testing and social engineering: Hacking the weakest link. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17T. D. Wilson 0001 Hacking the systems. Review of: Tara Calishain and Rael Dornfest, Google hacks; Paul Bausch, Amazon hacks. Preston Grall, Windows XP hacks. Sebastopol, CA: O'Reilly, 2003 Search on Bibsonomy Inf. Res. The full citation details ... 2003 DBLP  BibTeX  RDF
17Tina Darmohray Hacking for Fun and Profit. Search on Bibsonomy login Usenix Mag. The full citation details ... 2003 DBLP  BibTeX  RDF
17Yuwei Lin The institutionalization of hacking practices. Search on Bibsonomy Ubiquity The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Patrick Amato Hacking primes. Search on Bibsonomy Ubiquity The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Aaron D. Sanders Teaching Tip: Utilizing Simple Hacking Techniques to Teach System Security and Hacker Identification. Search on Bibsonomy J. Inf. Syst. Educ. The full citation details ... 2003 DBLP  BibTeX  RDF
17Hector Zenil Chavez How to Develop Enterprise-Secure Java Applications Learning Risks (A review of Hacking Exposed J2EE and Java, Developing Secure Applications with Java Technology by Art Taylor, Brian Buege, and Randy Layman). Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2003 DBLP  BibTeX  RDF
17Yanjun Zuo, Brajendra Panda Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
17Sandor Vegh Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking. Search on Bibsonomy First Monday The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Jeroen de Kloet Digitisation and Its Asian Discontents: The Internet, Politics and Hacking in China and Indonesia. Search on Bibsonomy First Monday The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17 Cognitive Hacking of a Different Sort. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Bryan Smith, William Yurcik, David Doss Ethical hacking: the security justification redux. Search on Bibsonomy ISTAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Charles C. Palmer Ethical hacking. Search on Bibsonomy IBM Syst. J. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Paula Roberts Hacking Cyberspace. Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Bill Hancock UK Fuel Taxes Protestor Accused of Mass Hacking. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Bill Hancock Down Under, Hacking Private Computers by the Government is Legal. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  BibTeX  RDF
17Gisle Hannemyr Technology and Pleasure: Considering Hacking Constructive. Search on Bibsonomy First Monday The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Stephen Downes Hacking Memes. Search on Bibsonomy First Monday The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Steven Furnell, Matthew J. Warren Computer hacking and cyber terrorism: the real threats in the new millennium? Search on Bibsonomy Comput. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Gisle Hannemyr The Art and Craft of Hacking. Search on Bibsonomy Scand. J. Inf. Syst. The full citation details ... 1998 DBLP  BibTeX  RDF
17Chris Westbury Hacking the world: On the origin of objects - by B.C. Smith, 1996, Cambridge, MA.: MIT Press. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17John Austen Can the laws really cut down hacking? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17David Ferbrache, Stuart Mort Malicious Software and Hacking. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17David Ferbrache, Stuart Mort Malicious Software and Hacking. Search on Bibsonomy The Computer Science and Engineering Handbook The full citation details ... 1997 DBLP  BibTeX  RDF
17Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. Search on Bibsonomy CCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
17Manfred Möhrenschlager Hacking: To criminalize or not ? - suggestions for the legislature. Search on Bibsonomy Comput. Secur. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Alec Muffett WAN-hacking with AutoHack: Auditing Security Behind the Firewall. Search on Bibsonomy USENIX Security Symposium The full citation details ... 1995 DBLP  BibTeX  RDF
17Dorothy E. Denning The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking. Search on Bibsonomy Commun. ACM The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Bernard P. Zajac Jr. Computer hacking - The new boom industry. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17Ulrich Wuermeling New dimensions of computer-crime - hacking for the KGB - A report. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
17J. A. N. Lee, Gerald Segal Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking. Search on Bibsonomy Comput. Secur. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
17David F. Stevens Who Goes There? A Dialogue of Questions and Answers About Benign Hacking. Search on Bibsonomy Int. CMG Conference The full citation details ... 1987 DBLP  BibTeX  RDF
14Sergey Bratus, Anna Shubina, Michael E. Locasto Teaching the principles of the hacker curriculum to undergraduates. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hacker curriculum, sismat, teaching failure modes, security, networking, information assurance
14Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
14Miad Faezipour, Mehrdad Nourani, Rina Panigrahy A hardware platform for efficient worm outbreak detection. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shared counters, worm outbreak, hashing, false positive, Network Intrusion Detection System, false negative, polymorphic worm
14Rohit Pathak, Satyadhar Joshi Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Multi-party Computation (SMC), Privacy, Protocol, Information Security
14Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Frequent Episodes Mining, Honeypot systems, Network Security
14Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee Device Authentication/Authorization Protocol for Home Network in Next Generation Security. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Authentication, Authorization, Home Network, Roaming
14Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. Search on Bibsonomy ATC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms
14Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan Tamper-Tolerant Software: Modeling and Implementation. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Eric Paulos The rise of the expert amateur: DIY culture and citizen science. Search on Bibsonomy UIST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DIY culture, citizen science
14Khaled Alghathbar, Hanan A. Mahmoud Noisy password scheme: A new one time password system. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Debasri Saha, Susmita Sur-Kolay Encoding of Floorplans through Deterministic Perturbation. Search on Bibsonomy VLSI Design The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Chunqiang Tang DSF: A Common Platform for Distributed Systems Research and Development. Search on Bibsonomy Middleware The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mutable replay, massive multi-tenancy, chaotic timing test, simulation, distributed systems, debugging
14Pei-Te Chen, Chi-Sung Laih IDSIC: an intrusion detection system with identification capability. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs)
14Nicolas Collins A Solder's Tale: Putting the "Lead" Back in "Lead Users". Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Roy Want The Seeds of Inspiration. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jiaqian Zheng, Jing Yao, Junyu Niu Web user de-identification in personalization. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF de-identification, user profile, domain
14Chandragupta Borkotoky, Swapil Galgate, S. B. Nimbekar Human computer interaction: harnessing P300 potential brain waves for authentication of individuals. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jian-Xia Wang, Wan-Zhen Zhou, Yun-Feng Xu Embedded Intrusion Detection and Authority Management System. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
14Henry MacKay Walker What image do CS1/CS2 present to our students? Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Matt Bishop About Penetration Testing. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Sascha Mühlbach, Sebastian Wallner Secure and Authenticated Communication in Chip-Level Microcomputer Bus Systems with Tree Parity Machines. Search on Bibsonomy ICSAMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jin-Cherng Lin, Jan-Min Chen The Automatic Defense Mechanism for Malicious Injection Attack. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Eun-Ser Lee, Haeng-Kon Kim, Sang Ho Lee 0004 Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Marian Petre, Alan F. Blackwell Children as Unwitting End-User Programmers. Search on Bibsonomy VL/HCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Phishing, Social engineering, Security Mechanism
14Chundong Wang 0002, He-feng Yu, Huai-bin Wang, Kai Liu SOM-Based Anomaly Intrusion Detection System. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly-based intrusion detection, U-matrix, cluster, neural network, SOM
14Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim Security Framework for Home Network: Authentication, Authorization, and Security Policy. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Authentication, Access Control, Authorization, Security Policy, Home Network
14Mário A. M. Guimarães, Meg Murray Using animation courseware in the teaching of database security. Search on Bibsonomy SIGITE Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF animation, data security, courseware, database security
14Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers A Novel Approach to the Detection of Cheating in Multiplayer Online Games. Search on Bibsonomy ICECCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Hina Arora, Birendra K. Mishra, T. S. Raghu 0001 Autonomic-computing approach to secure knowledge management: a game-theoretic analysis. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 943 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license