Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,391 papers from all fields of science
Search
Sign In
Create Free Account
Black hat
Known as:
Black hat (computer security)
, Black hat hacking
, Black-hat
Expand
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". The term was coined by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Avast SecureLine
Cyber-arms industry
Hacker
Honeypot (computing)
Expand
Broader (1)
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Problems and Vulnerabilities of Ethical Hacking in Pakistan
M. Imran
,
Muhammad Faisal
,
Noman Islam
Intellect
2019
Corpus ID: 210698096
The latest evolving threats to modern cyber security is making difficult for public and private sector organizations to protect…
Expand
Review
2014
Review
2014
Survey on trust establishment in cloud computing
G. Raj
,
M. Sarfaraz
,
Dheerendra Singh
Confluence
2014
Corpus ID: 14527824
Cloud computing has recently appear as a promising hosting platform that performs an smart usage of a collection of services…
Expand
2014
2014
A practical time complexity analysis of fuzzy rainbow tradeoff
Mahmoud Haghighi
,
Mohammad Dakhilalian
11th International ISC Conference on Information…
2014
Corpus ID: 16443992
Time Memory Tradeoff is a probabilistic method for quickly inverting one-way functions (e.g. Hash functions) using pre-computed…
Expand
2013
2013
The BlackHat Library for One-Loop Amplitudes
Z. Bern
,
L. Dixon
,
+6 authors
K. Ozeren
2013
Corpus ID: 43290557
We present recent next-to-leading order (NLO) results in perturbative QCD obtained using the BLACKHAT software library. We…
Expand
2012
2012
W+n-Jet Predictions With MC@NLO in Sherpa
S. Hoeche
,
F. Krauss
,
M. Schönherr
,
U. IpppDurham
,
F. Siegert
,
U. Freiburg
2012
Corpus ID: 53325273
Results for the production of W-bosons in conjunction with up to three jets including parton shower corrections are presented and…
Expand
2012
2012
Do Hackers Seek Variety? An Empirical Analysis of Website Defacements
Kok Wei Ooi
,
Seung-Hyun Kim
,
Qiu-Hong Wang
,
K. Hui
International Conference on Interaction Sciences
2012
Corpus ID: 17931381
The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with…
Expand
2009
2009
Anti-Forensics: The Rootkit Connection
B. Blunden
,
Principal Investigator
2009
Corpus ID: 61966702
Conventional rootkits tend to focus on defeating forensic live incident response and network monitoring using a variety of…
Expand
Review
2005
Review
2005
Securing Layer 2 in Local Area Networks
H. Altunbasak
,
S. Krasser
,
H. Owen
,
J. Grimminger
,
Hans-Peter Huth
,
J. Sokol
Information-Centric Networking
2005
Corpus ID: 1575124
Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data…
Expand
2002
2002
Know Your Enemy : Honeynets What a Honeynet
2002
Corpus ID: 46659146
Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat…
Expand
Review
1996
Review
1996
Workshop Statistics: Discovery with Data and the Graphing Calculator
1996
Corpus ID: 62547727
UNIT I: Exploring Data: Distributions Data and Variables Data, Variables, and Technology Displaying and Describing Distributions…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE