Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Black hat

Known as: Black hat (computer security), Black hat hacking, Black-hat 
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". The term was coined by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The dynamics of isolated-photon plus one-, two- and three-jet production in pp collisions at a centre-of-mass energy of 8 TeV are… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2017
Highly Cited
2017
In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We present next-to-leading order QCD predictions for the total cross section and for a comprehensive set of transverse-momentum… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
In this publication, an algorithm is presented that combines the ME+PS approach to merge sequences of tree-level matrix elements… Expand
  • table 3
  • table 4
  • table 2
  • table 6
  • figure 1
Is this relevant?
2010
2010
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting… Expand
  • figure 1
  • figure 2
  • table 1
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
1 Background and Introduction.- 2 Fuel Cell System Model: Auxiliary Components.- 3 Fuel Cell System Model: Fuel Cell Stack.- 4… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
What specific threats do computer networks face from hackers? Who's perpetrating these threats and how? The Honeynet Project is… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1982
Highly Cited
1982
  • S. Neale
  • Medical History. Supplement
  • 1982
  • Corpus ID: 36784402
ImagesFigure 1 
Is this relevant?