Skip to search formSkip to main contentSkip to account menu

Black hat

Known as: Black hat (computer security), Black hat hacking, Black-hat 
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". The term was coined by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromised. It is often used for… 
2016
2016
Blackhat Search Engine Optimization (SEO) has been widely used to promote spam or malicious web sites. Traditional blackhat SEO… 
Review
2014
Review
2014
This book presents an application-centric approach to the development of smart grid communication architecture. The coverage… 
2013
2013
We present recent next-to-leading order (NLO) results in perturbative QCD obtained using the BLACKHAT software library. We… 
Highly Cited
2010
Highly Cited
2010
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting… 
Highly Cited
2005
Highly Cited
2005
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network… 
2004
2004
A major goal of honeypot research is to improve our knowledge of blackhats from two perspectives: technical and ethnological. For… 
2002
2002
  • 2002
  • Corpus ID: 46659146
Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat… 
Highly Cited
1982
Highly Cited
1982
ImagesFigure 1