The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hacking with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1963-1998 (16) 1999-2001 (15) 2002-2003 (29) 2004 (23) 2005 (28) 2006 (23) 2007 (25) 2008 (21) 2009 (24) 2010 (17) 2011-2012 (27) 2013 (38) 2014 (46) 2015 (45) 2016 (73) 2017 (63) 2018 (58) 2019 (64) 2020 (61) 2021 (56) 2022 (66) 2023 (83) 2024 (42)
Publication types (Num. hits)
article(613) book(7) data(1) incollection(5) inproceedings(311) phdthesis(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 184 occurrences of 135 keywords

Results
Found 951 publication records. Showing 943 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
106Brian A. Pashel Teaching students to hack: ethical implications in teaching students to hack at the university level. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacking, student misuse, teaching hacking, hacking
102Lisa Lancor, Robert Workman Using google hacking to enhance defense strategies. Search on Bibsonomy SIGCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Google hacking, education, information security, information assurance, web security, hacking
66Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu Hacking Tricks Toward Security on Network Environments. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing
56Hangbae Chang, Kyung-kyu Kim, Hosin David Lee, Jungduk Kim The Design and Development of a Secure Keystroke System for u Business. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Eric Clark Hacking as a form of "self-improvement". Search on Bibsonomy ITiCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cell phones, digital cameras, firmware, hacking, DVDs
49Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou 0001 A Design and Implementation of Profile Based Web Application Securing Proxy. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web application, Anomaly detection, Proxy, Hacking
45Jörg Preuß, Steven Furnell, Maria Papadaki Considering the potential of criminal profiling to combat hacking. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Syed A. Saleem Ethical hacking as a risk management technique. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacker, white hat hacker, network security, information security, computer security, system security
45Jia Wang, Insup Lee 0001 Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Yang-Seo Choi, Dong-il Seo, Sung Won Sohn A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Ghi Paul Im, Richard L. Baskerville A longitudinal study of information system threat categories: the enduring problem of human error. Search on Bibsonomy Data Base The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects
38Coen Hacking, Hilde Verbeek 0002, Jan P. H. Hamers, Sil Aarts The development of an automatic speech recognition model using interview data from long-term care for older adults. Search on Bibsonomy J. Am. Medical Informatics Assoc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Chris Hacking, Nitesh K. Poona, Nicola Manzan, Carlos Poblete-Echeverría Investigating 2-D and 3-D Proximal Remote Sensing Techniques for Vineyard Yield Estimation. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Dipan Kumar Mandal, Srivatsava Jandhyala, Om Ji Omer, Gurpreet S. Kalsi, Biji George, Gopi Neela, Santhosh Kumar Rethinagiri, Sreenivas Subramoney, Lance Hacking, Jim Radford, Eagle Jones, Belliappa Kuttanna, Hong Wang 0003 Visual Inertial Odometry At the Edge: A Hardware-Software Co-design Approach for Ultra-low Latency and Power. Search on Bibsonomy DATE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Jane F. Hacking, Bruce L. Smith, Shawn L. Nissen, Hannah Allen Russian palatalized and unpalatalized coda consonants: An electropalatographic and acoustic analysis of native speaker and L2 learner productions. Search on Bibsonomy J. Phonetics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Andy Bond, Andrew Hacking, Zoran Milosevic, Andrew Zander Specifying and building interoperable eHealth systems: ODP benefits and lessons learned. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
38Stuart Hacking, Benoit Hudzia Improving the live migration process of large enterprise applications. Search on Bibsonomy VTDC@ICAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Ian Hacking Aristotelian Categories And Cognitive Domains. Search on Bibsonomy Synth. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Jan W. M. Jacobs, Roger J. H. Hacking An integrated microprogram development methodology based on APL. Search on Bibsonomy APL The full citation details ... 1987 DBLP  DOI  BibTeX  RDF APL
38Ian Hacking What is Strict Implication? Search on Bibsonomy J. Symb. Log. The full citation details ... 1963 DBLP  DOI  BibTeX  RDF
35Hyun-Uk Hwang, Minsoo Kim 0002, Bong-Nam Noh Expert System Using Fuzzy Petri Nets in Computer Forensics. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF expert system, Computer forensics, inference rule, fuzzy Petri nets, hacking
35Patricia Y. Logan, Allen Clarkson Teaching students to hack: curriculum issues in information security. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ethics and computers, education, computer science education, information security, computer security, information assurance, hacking
35Hector Zenil Chavez Getting to Know Your Enemy. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer hacking, Stuart McClure, Joel Scambray, George Kurtz, computer security, book review
35Yeon-jin Park, Keun-Ho Lee Constructing a secure hacking-resistant IoT U-healthcare environment. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Sang-Won Bang, Byeong-Soo Jung, Sang-Cheol Lee Research on financial institutional network partition design for anti-hacking. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Kyung-Hwan Cha, Dae-Ki Kang Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Sunkyung Rhyu, Sang-Yeob Oh Hacking and convergence computing. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Sunghyuck Hong Secure and light IoT protocol (SLIP) for anti-hacking. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Marsalis T. Gibson, David Babazadeh, Claire J. Tomlin, Shankar Sastry 0001 Hacking Predictors Means Hacking Cars: Using Sensitivity Analysis to Identify Trajectory Prediction Vulnerabilities for Autonomous Driving Security. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
34Richard Beno, Ron Poet Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
34Leonardo de Araújo Hacking Cultural Heritage: the Hackathon as a Method for Heritage Interpretation (Hacking Cultural Heritage: der Hackathon als Methode zur Interpretation des Kulturerbes) Search on Bibsonomy 2018   RDF
34Youyang Hou, Cliff Lampe Sustainable Hacking: Characteristics of the Design and Adoption of Civic Hacking Projects. Search on Bibsonomy C&T The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Donna Peacock From underground hacking to ethical hacking. Search on Bibsonomy 2013   RDF
34Alison E. Adam Hacking into Hacking: Gender and the Hacker Phenomenon. Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Stuart McClure Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available. Search on Bibsonomy TOOLS (39) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Ugochi Acholonu Hacker's mentality: integrating games and hacking to build it fluency among middle school students. Search on Bibsonomy IDC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF task-based learning, digital games, middle-school, IT fluency
31Daniela K. Rosner, Jonathan Bean Learning from IKEA hacking: i'm not one to decoupage a tabletop and call it a day. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ikea, creative tools, design, DIY
31Ernest A. Edmonds, Mark Fell Two generative pieces: port hacking and DC_release. Search on Bibsonomy Creativity & Cognition The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance, generative art
31Joseph A. Paradiso, John S. Heidemann, Thomas G. Zimmerman Hacking Is Pervasive. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Thomas G. Zimmerman Hacking in Industrial Research and Development. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Alexander E. Voiskounsky, Olga V. Smyslova Flow in Computer Hacking: A Model. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Paul Thompson Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31George Cybenko, Annarita Giani, Paul Thompson Cognitive Hacking: A Battle for the Mind. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Rick Duley, Stanislaw P. Maj Cutting Hacking: Breaking from Tradition. Search on Bibsonomy CSEE&T The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31John A. N. Lee, Gerald Segal, Rosalie Steier Positive Alternatives: A Report on an ACM Panel on Hacking. Search on Bibsonomy Commun. ACM The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
28David Alan Grier Harry and Georgie. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Ramkumar Chinchani, Duc T. Ha, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya On the Hardness of Approximating the Min-Hack Problem. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hardness of threat analysis, computer security
28Slim Rekhis, Noureddine Boudriga A formal logic-based language and an automated verification tool for computer forensic investigation. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF S-TLA+, S-TLC, formal forensic investigation, temporal logic of security actions
28Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto Exploiting Self-Modification Mechanism for Program Protection. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Quyen L. Nguyen, Arun Sood A Comparison of Intrusion-Tolerant System Architectures. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability
22John Paul Dunning Taming the Blue Beast: A Survey of Bluetooth Based Threats. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security taxonomy, mobile computing, wireless communications, Bluetooth, hacking
22Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network
22Amanda Williams, Daniela Karin Rosner Wiimote hackery studio proposal. Search on Bibsonomy TEI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wii nunchuk, diy, hacking, wii remote
22Juan M. Solá-Sloan, Isidoro Couvertier-Reyes A TCP offload engine emulator for estimating the impact of removing protocol processing from a host running Apache HTTP server. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCP offload, TOE, hacking Apache, protocol offload, TCP/IP, web servers
22Jamie Allen, Areti Galani, Kazuhiro Jo An ecology of practice: chiptune marching band. Search on Bibsonomy Creativity & Cognition The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance, community, user studies, art, diy, hacking
22Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cash, chip card, deployed systems, reliability, anonymity, availability, advertising, electronic cash, hacking, fraud, credit card
22Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo Analysis of Computer Intrusions Using Sequences of Function Calls. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis
22Elizabeth M. Losh Assembly lines: web generators as hypertexts. Search on Bibsonomy Hypertext The full citation details ... 2007 DBLP  DOI  BibTeX  RDF PHP hacking, hypertext theory, participatory culture, web generators, web 2.0
22Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim Securing Wi-Fi Networks. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless hacking, wireless security, virtual private networks, Wi-Fi networks
22Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach Hack-a-Vote: Security Issues with Electronic Voting Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF election fraud, security, electronic voting, hacking
22Susan W. Brenner U.S. Cybercrime Law: Defining Offenses. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stalking, child pornography, cybercrime, hacking, fraud, terrorism
22Erik Johansson, Mikael Pettersson, Konstantinos Sagonas, Thomas Lindgren The development of the HiPE system: design and experience report. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Programming language implementation, Virtual machines and compilation methods, Functional programming, Concurrent programming, Erlang, Hacking
19Mila Dalla Preda, Michele Ianni Exploiting number theory for dynamic software watermarking. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan Networking and cryptography library with a non-repudiation flavor for blockchain. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Alexander V. Babash Attacks on the simple substitution cipher with the calculation of their reliability. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Sergey Prokopev Cryptographic protocol conformance testing based on domain-specific state machine. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Ritik Mehta, Olha Jurecková, Mark Stamp 0001 A natural language processing approach to Malware classification. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Vrinda Malhotra, Katerina Potika, Mark Stamp 0001 A comparison of graph neural networks for malware classification. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Nguyen Minh Tu, Viet Hung Nguyen, Nathan Shone Using deep graph learning to improve dynamic analysis-based malware detection in PE files. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Christian Catalano, Franco Tommasi Persistent MobileApp-in-the-Middle (MAitM) attack. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Rohit Dube Faulty use of the CIC-IDS 2017 dataset in information security research. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Eldar Boltachev Correction to: Potential cyber threats of adversarial attacks on autonomous driving models. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Alexey Kurochkin, Denis Fomin MGM beyond the birthday bound. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Akram Khalesi, Zahra Ahmadian Provably minimum data complexity integral distinguisher based on conventional division property. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19François Dupont A new Shamir's three pass random matrix ciphering mechanism. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Evgeniy K. Alekseev, Sergey Kyazhin, Stanislav Smyshlyaev The threat of forcing the identical roles for authenticated key establishment protocols. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Jesper Bergman, Oliver Popov Recognition of tor malware and onion services. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle Demonstration of new attacks on three healthcare network protocols in a lab environment. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia Use of cryptography in malware obfuscation. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone Explainable Ransomware Detection with Deep Learning Techniques. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Anatoly Konkin, Sergey Zapechnikov Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Hafiz Usama Ishtiaq, Areeb Ahmed Bhutta, Adnan Noor Mian DHCP DoS and starvation attacks on SDN controllers and their mitigation. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Anna Epishkina, Sergey Zapechnikov, Anna Belozubova Historical notes on Russian cryptography. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna Partial key exposure attack on RSA using some private key blocks. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Dmitry Zakharov, M. Pudovkina Full round impossible differentials for Feistel ciphers. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Grigory B. Marshalko, Svetlana Koreshkova Protection against adversarial attacks with randomization of recognition algorithm. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Hashida Haidros Rahima Manzil, S. Manohar Naik Android ransomware detection using a novel hamming distance based feature selection. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone Picker Blinder: a framework for automatic injection of malicious inter-app communication. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Manmeet Singh, Maninder Singh, Sanmeet Kaur Identifying bot infection using neural networks on DNS traffic. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi A security vulnerability predictor based on source code metrics. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Alireza Sadeghi-Nasab, Vahid Rafe A comprehensive review of the security flaws of hashing algorithms. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19 Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp 0001 Generative adversarial networks and image-based malware classification. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yoshihiro Oyama, Hirotaka Kokubo Forced continuation of malware execution beyond exceptions. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, Mark Stamp 0001 Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19 Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19 Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 943 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license