Black hat

Known as: Black hat (computer security), Black hat hacking, Black-hat 
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". The term was coined by… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
People lie, mislead, and bullshit in a myriad of ways. Visualizations, as a form of communication, are no exception to these… (More)
  • figure 2
  • figure 4
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Review
2017
Review
2017
Over the past few years, many black-hat marketplaces have emerged that facilitate access to reputation manipulation services such… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
2017
2017
Underground forums are widely used by criminals to buy and sell a host of stolen items, datasets, resources, and criminal… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2016
2016
The contentious battle between web services and miscreants involved in blackhat search engine optimization and malicious… (More)
  • table I
  • table II
  • table III
  • table IV
  • table V
Is this relevant?
2014
2014
Transport Layer Security (TLS) is commonly used to provide server-authenticated secure channels for HTTPS web applications. From… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
We present next-to-leading order QCD predictions for the total cross section and for a comprehensive set of transverse-momentum… (More)
Is this relevant?
2005
2005
Little historical work has been done on II chams", and even though ritual dance manuals exist for example, the Fifth Dalai Lama's… (More)
Is this relevant?
Review
2005
Review
2005
A review of How to Break Software Security, by James A. Whittaker and Herbert H. Thompson 
Is this relevant?
2004
2004
A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2002
2002
  • 2002
Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat… (More)
Is this relevant?