|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 254 occurrences of 176 keywords
|
|
|
Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Vincenzo D'Andrea, Stefano De Paoli, Maurizio Teli |
Open to Grok. How do Hackers' Practices Produce Hackers?. (PDF / PS) |
OSS |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 |
Real-Time Emulation of Intrusion Victim in HoneyFarm. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
interception proxy, reverse firewall, Honeypot, intrusion |
70 | Iksu Kim, Myungho Kim |
The DecoyPort: Redirecting Hackers to Honeypots. |
NBiS |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos |
Search Engines as a Security Threat. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
56 | David Geer |
Hackers Get to the Root of the Problem. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
Security, Hackers, Rootkits |
50 | Jörg Preuß, Steven Furnell, Maria Papadaki |
Considering the potential of criminal profiling to combat hacking. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Alexander E. Voiskounsky, Olga V. Smyslova |
Flow in Computer Hacking: A Model. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Linda Dailey Paulson |
News Briefs. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
Immersion lithography, Spam, Malware, E-mail, Botnets, Hackers, Semiconductors |
48 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
45 | Gerry V. Dozier, Douglas Brown, John Hurley, Krystal Cain |
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers. |
GECCO (1) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Sinchul Back, Jennifer LaPrade, Lana Shehadeh, Minju Kim |
Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling. |
EuroS&P Workshops |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Gregory B. Newby |
Paths to creativity in security careers. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Syed A. Saleem |
Ethical hacking as a risk management technique. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
37 | Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant |
Semantics-Aware Malware Detection. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Linda Dailey Paulson |
News Briefs. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
IM.Myspace04.AIM, Broadband services, Instant messaging, Internet security, Internet security, Hackers, Domain names |
36 | Cindy Cullen |
Internet vulnerabilities of one-time passcode mechanisms. |
LCN |
1995 |
DBLP DOI BibTeX RDF |
one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification |
33 | Igor V. Kotenko |
Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks. |
CEEMAS |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Daniela K. Rosner, Jonathan Bean |
Learning from IKEA hacking: i'm not one to decoupage a tabletop and call it a day. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
Ikea, creative tools, design, DIY |
25 | Pei-Te Chen, Chi-Sung Laih |
IDSIC: an intrusion detection system with identification capability. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs) |
25 | V. Kavitha, K. S. Easwarakumar |
Neural Based Steganography. |
PRICAI |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Greg Goth, Benjamin Alfonsi |
News. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Linda Dailey Paulson |
Stopping Intruders Outside the Gates. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Marlene Campbell |
Ethics and computer security: cause and effect. |
ACM Conference on Computer Science |
1988 |
DBLP DOI BibTeX RDF |
|
23 | David Alan Grier |
Honor Among Thieves. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
Computing profession, Computers and society, Hackers |
23 | Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung |
A study of online service and information exposure of public companies. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
malicious hackers, public company, public server, web server, ports, cyber security |
23 | David Alan Grier |
Outposts. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
blogs, computers and society, computing technology, hackers |
23 | Linda Dailey Paulson |
News Briefs. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
optoelectronic fiber arrays, antiforensic attacks, hackers, storage technology |
23 | James William Rust |
Corporate management of computer forensics evidence. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
management, information security, computer forensics, hackers, digital evidence, investigation, incident response |
23 | David Geer |
Security Technologies Go Phishing. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
computer fraud, security, phishing, hackers |
23 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
Globus Alliance, Global Grid Forum, ransomware, essay-grading software, predictive model-building, self-replicating robots, grid computing, robotics, standards, software, microprocessors, Web security, hackers |
23 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology |
23 | Roland L. Trope |
A Warranty of Cyberworthiness. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
cyberworthiness, software warranty, software makers, security, hackers |
23 | George Chamales |
The Honeywall CD-ROM. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
honeywall, blackhat, honeypot, hackers, honeynet |
23 | Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer |
Computer Forensics Education. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
education, forensics, hackers, computer crime |
20 | Sonam Bhardwaj, Mayank Dave |
RAKSHAM: Responsive approach to Knock-off scavenging hackers and attack mitigation. |
Trans. Emerg. Telecommun. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Cameron John Hoffman, C. Jordan Howell, Robert C. Perkins, David Maimon, Olena Antonaccio |
Predicting new hackers' criminal careers: A group-based trajectory approach. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Ken Owen, Milena M. Head |
Motivation and Demotivation of Hackers in Selecting a Hacking Task. |
J. Comput. Inf. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Anum Atique Paracha, Junaid Arshad, Muhammad Mubashir Khan |
S.U.S. You're SUS! - Identifying influencer hackers on dark web social networks. |
Comput. Electr. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Happe, Jürgen Cito |
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nathaniel Knopf |
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication - Robert W. Gehl and Sean T. Lawson (Cambridge, MA, USA: MIT Press, 2022, 344 pp.). |
IEEE Technol. Soc. Mag. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jing Hou, Xuyu Wang, Amy Z. Zeng |
Inter-Temporal Reward Decisions with Strategic Ethical Hackers. |
CNS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Happe, Jürgen Cito |
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners. |
ESEC/SIGSOFT FSE |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Patrick Wake, Sue Black 0001, Jonathan Young |
Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and Procedures. |
EuroS&P Workshops |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Marie Thøgersen |
Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts. |
CyCon |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Frank Ulrich, Sune Dueholm Müller, Stephen Flowers |
The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication. |
Commun. Assoc. Inf. Syst. |
2022 |
DBLP BibTeX RDF |
|
20 | David Myles Gustavsen |
Book Review: Why Hackers Win: Power and Disruption in the Network Society. |
New Media Soc. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yuni Li, Ling Zhao 0001 |
Collaborating with Bounty Hunters: How to Encourage White Hat Hackers' Participation in Vulnerability Crowdsourcing Programs through Formal and Relational Governance. |
Inf. Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Christian Koch 0009, Katharina Müller, Eldar Sultanow |
Which programming languages do hackers use? A survey at the German Chaos Computer Club. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, Zaghloul Saad ElSayed |
Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web). |
CoRR |
2022 |
DBLP BibTeX RDF |
|
20 | Kyle Guers, Md Minhaz Chowdhury, Nafiz Rifat |
Card Skimming: A Cybercrime by Hackers. |
EIT |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Federico Echenique, Kevin He |
Screening p-Hackers: Dissemination Noise as Bait. |
EC |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Nitin Naik, Changjing Shang, Paul Jenkins, Qiang Shen 0001 |
D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. |
IEEE Trans. Emerg. Top. Comput. Intell. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Michael Iantorno |
Book Review: Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism. |
New Media Soc. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Cheng Huang 0003, Yongyan Guo, Wenbo Guo 0011, Ying Li |
HackerRank: Identifying key hackers in underground forums. |
Int. J. Distributed Sens. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Haigh |
When hackers were heroes. |
Commun. ACM |
2021 |
DBLP DOI BibTeX RDF |
|
20 | David Maimon, C. Jordan Howell, George W. Burruss |
Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials. |
Comput. Hum. Behav. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Mario Silic, Paul Benjamin Lowry |
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. |
Inf. Syst. Frontiers |
2021 |
DBLP DOI BibTeX RDF |
|
20 | H. Van Dyke Parunak |
Social Simulation for Non-hackers. |
MABS |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Michael Bitzer, Bastian Stahl, Jacqueline Strobel |
Empathy for Hackers - an IT Security Risk Assessment Artifact for Targeted Hacker Attacks. |
ECIS |
2021 |
DBLP BibTeX RDF |
|
20 | Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen |
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. |
ISI |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Bruce Schneier |
Invited Talk: The Coming AI Hackers. |
CSCML |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Rui Peng 0001, Hui Xiao, Jianjun Guo, Chen Lin |
Optimal defense of a distributed data storage system against hackers' attacks. |
Reliab. Eng. Syst. Saf. |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Yong Wu, Junlin Duan, Tao Dai 0006, Dong Cheng |
Managing Security Outsourcing in the Presence of Strategic Hackers. |
Decis. Anal. |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Ravi Sen, Ajay Verma, Gregory R. Heim |
Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets. |
J. Manag. Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Jaime Arias 0001, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Teofil Sidoruk, Mariëlle Stoelinga |
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems. |
ICFEM |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Ling Zhao 0001, Yuni Li |
Collaborating with White Hat Hackers: A Study of Vulnerability Crowdsourcing Program from Control Perspective. |
PACIS |
2020 |
DBLP BibTeX RDF |
|
20 | Aleksandra Pawlicka, Michal Choras, Marek Pawlicki |
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. |
ARES |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Mohammad Aref Al-Ramahi, Izzat Alsmadi, Joshua Davenport |
Exploring hackers assets: topics of interest as indicators of compromise. |
HotSoS |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Segundo Moisés Toapanta Toapanta, Raúl Francisco Pérez González, Maximo Giovani Tandazo Espinoza, Luis Enrique Mafla Gallegos |
Analysis of the Software Most Used by Hackers to Carry Out Penetration Testing in Public Organizations. |
MLIS |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Keenan Skelly |
It's a war out there: why malicious hackers are beating businesses to the punch - and what we can do about it. |
Netw. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Mariano Ceccato, Paolo Tonella, Cataldo Basile, Paolo Falcarin, Marco Torchiano, Bart Coppens 0001, Bjorn De Sutter |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge. |
Empir. Softw. Eng. |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Siew H. Chan, Suparak Janjarasjit |
Insight into hackers' reaction toward information security breach. |
Int. J. Inf. Manag. |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Lakshmi Chandrasekaran, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan |
Open hiding for truncating hackers - a block truncation and wavelet approach. |
Multim. Tools Appl. |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Desislav Andreev, Simona Petrakieva, Ina Taralova |
A Novel Approach for Protection of Accounts' Names against Hackers Combining Cluster Analysis and Chaotic Theory. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
20 | Nicholas Charles Patterson, Michael Hobbs, Frank Jiang 0001, Lei Pan 0002 |
Cyber security insights into self-proclaimed virtual world hackers. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
20 | Jaime Arias 0001, Carlos E. Budde, Wojciech Penczek, Laure Petrucci, Mariëlle Stoelinga |
Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
20 | Helen Thackray |
Hackers gonna hack: investigating the effect of group processes and social identities within online hacking communities |
|
2019 |
RDF |
|
20 | Mehdi Dadkhah, Mohammad Lagzian, Glenn Borchardt |
Academic Information Security Researchers: Hackers or Specialists? |
Sci. Eng. Ethics |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Olivier Boireau |
Securing the blockchain against hackers. |
Netw. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Morgan G. Ames |
Hackers, Computers, and Cooperation: A Critical History of Logo and Constructionist Learning. |
Proc. ACM Hum. Comput. Interact. |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Natalija Vlajic, Daiwei Zhou |
IoT as a Land of Opportunity for DDoS Hackers. |
Computer |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Shannon Rooney |
Interactive journalism: Hackers, data, and code. |
New Media Soc. |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Kjell Hausken |
Proactivity and Retroactivity of Firms and Information Sharing of Hackers. |
IGTR |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Bin Mai, Shailesh Kulkarni |
When Hackers Err: The Impacts of False Positives on Information Security Games. |
Decis. Anal. |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Rebecca Slayton |
Certifying "ethical hackers". |
SIGCAS Comput. Soc. |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, Moshe Chai Barukh |
Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. |
PACIS |
2018 |
DBLP BibTeX RDF |
|
20 | Zahid Maqbool, V. S. Chandrasekhar Pammi, Varun Dutt |
Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts. |
CyberSA |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Eiad Yafi, Katya Yefimova, Karen E. Fisher |
Young Hackers: Hacking Technology at Za'atari Syrian Refugee Camp. |
CHI Extended Abstracts |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Zechun Cao, Shou-Hsuan Stephen Huang |
Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection. |
TrustCom/BigDataSE |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Baidyanath Biswas, Arunabha Mukhopadhyay, Gaurav Gupta 0004 |
"Leadership in Action: How Top Hackers Behave" A Big-Data Approach with Text-Mining and Sentiment Analysis. |
HICSS |
2018 |
DBLP BibTeX RDF |
|
20 | Ericsson Marin, Jana Shakarian, Paulo Shakarian |
Mining Key-Hackers on Darkweb Forums. |
ICDIS |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek |
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. |
IEEE Symposium on Security and Privacy |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Andrew J. Park, Richard Frank, Alexander Mikhaylov, Myf Thomson |
Hackers Hedging Bets: A Cross-Community Analysis of Three Online Hacking Forums. |
ASONAM |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Ditte Laursen, Henriette Roued-Cunliffe, Stig Svenningsen |
Challenges and Perspectives on the Use of Open Cultural Heritage Data Across Four Different User Types: Researchers, Students, App Developers and Hackers. |
DHN |
2018 |
DBLP BibTeX RDF |
|
20 | Lewis Henderson |
National infrastructure - the next step for seasoned hackers. |
Netw. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Adam Vincent |
State-sponsored hackers: the new normal for business. |
Netw. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Zahid Maqbool, Nidhi Makhijani, V. S. Chandrasekhar Pammi, Varun Dutt |
Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly. |
Hum. Factors |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens 0001, Bjorn De Sutter, Paolo Falcarin, Marco Torchiano |
How Professional Hackers Understand Protected Code while Performing Attack Tasks. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
20 | Kjell Hausken |
Information Sharing Among Cyber Hackers in Successive Attacks. |
IGTR |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Xiaolong Bai, Luyi Xing, Nan Zhang 0018, XiaoFeng Wang 0001, Xiaojing Liao, Tongxin Li, Shi-Min Hu 0001 |
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. |
IEEE Secur. Priv. |
2017 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 388 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|