Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,390,084 papers from all fields of science
Search
Sign In
Create Free Account
Black hat
Known as:
Black hat (computer security)
, Black hat hacking
, Black-hat
Expand
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". The term was coined by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Avast SecureLine
Cyber-arms industry
Hacker
Honeypot (computing)
Expand
Broader (1)
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Getting Security Right in Wireless Sensor Networks
K. Pister
2015
Corpus ID: 51855954
Fortunately, the literature on securing wireless systems is readily available, and best practices are well known. Despite this…
Expand
2012
2012
W+n-Jet Predictions With MC@NLO in Sherpa
S. Hoeche
,
F. Krauss
,
M. Schönherr
,
U. IpppDurham
,
Frank Siegert
,
U. Freiburg
2012
Corpus ID: 53325273
Results for the production of W-bosons in conjunction with up to three jets including parton shower corrections are presented and…
Expand
2011
2011
Recommendation as Collaboration in Web Search
Barry Smyth
,
J. Freyne
,
M. Coyle
,
Peter Briggs
The AI Magazine
2011
Corpus ID: 18504593
Recommender systems now play an important role in online information discovery, complementing traditional approaches such as…
Expand
2011
2011
Preventing SSLstripping Attack using Visual Security Cues
R. Lopes
,
Dongwan Shin
2011
Corpus ID: 13964660
The Secure Socket Layer (SSL) protocol has been the most widely used security mechanism enabling safe web browsing. A new attack…
Expand
2009
2009
Next-to-Leading Order Jet Physics with BLACKHAT
C. Berger
,
Z. Bern
,
+6 authors
D. Maître
2009
Corpus ID: 118633404
We present several results obtained using the B LACKHAT next-to-leading order QCD program library, in conjunction with SHERPA. In…
Expand
2008
2008
Building embedded Linux systems - concepts, techniques, tricks, and traps
Karim Yaghmour
2008
Corpus ID: 29882252
Building Embedded Linux Systems Concepts Techniques Tricks And Traps *FREE* building embedded linux systems concepts techniques…
Expand
2008
2008
State of wireless security implementations in the United States and Europe - empirical data
F. C. Osorio
International Conference on Malicious and…
2008
Corpus ID: 18700809
The ubiquitous nature of wireless devices today, and the potential presence of 10 billion such devices over the next decade, has…
Expand
Review
2006
Review
2006
A high availability internetwork capable of accommodating compromised routers
Y. Desmedt
2006
Corpus ID: 58544205
It is a myth the Internet has been designed to withstand a denial of service attack. At the BlackHat 2005 conference it was shown…
Expand
Review
1996
Review
1996
Workshop Statistics: Discovery with Data and the Graphing Calculator
1996
Corpus ID: 62547727
UNIT I: Exploring Data: Distributions Data and Variables Data, Variables, and Technology Displaying and Describing Distributions…
Expand
1989
1989
Chaos: Making a New Science.James Gleick
N. Balazs
1989
Corpus ID: 89564983
Mon, 10 Dec 2018 12:00:00 GMT chaos making a new science pdf Buy Chaos and Fractals: New Frontiers of Science on Amazon.com FREE…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE