Skip to search formSkip to main contentSkip to account menu

Black hat

Known as: Black hat (computer security), Black hat hacking, Black-hat 
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". The term was coined by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The latest evolving threats to modern cyber security is making difficult for public and private sector organizations to protect… 
Review
2014
Review
2014
Cloud computing has recently appear as a promising hosting platform that performs an smart usage of a collection of services… 
2014
2014
Time Memory Tradeoff is a probabilistic method for quickly inverting one-way functions (e.g. Hash functions) using pre-computed… 
2013
2013
We present recent next-to-leading order (NLO) results in perturbative QCD obtained using the BLACKHAT software library. We… 
2012
2012
Results for the production of W-bosons in conjunction with up to three jets including parton shower corrections are presented and… 
2012
2012
The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with… 
2009
2009
Conventional rootkits tend to focus on defeating forensic live incident response and network monitoring using a variety of… 
Review
2005
Review
2005
Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data… 
2002
2002
  • 2002
  • Corpus ID: 46659146
Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat… 
Review
1996
Review
1996
  • 1996
  • Corpus ID: 62547727
UNIT I: Exploring Data: Distributions Data and Variables Data, Variables, and Technology Displaying and Describing Distributions…