Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,355,003 papers from all fields of science
Search
Sign In
Create Free Account
Black hat
Known as:
Black hat (computer security)
, Black hat hacking
, Black-hat
Expand
A black-hat hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". The term was coined by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Avast SecureLine
Cyber-arms industry
Hacker
Honeypot (computing)
Expand
Broader (1)
Cybercrime
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey
Wenjun Fan
,
Zhihui Du
,
David Fernández
,
V. Villagrá
IEEE Systems Journal
2017
Corpus ID: 3660982
A honeypot is a type of security facility deliberately created to be probed, attacked, and compromised. It is often used for…
Expand
2016
2016
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO
Kun Du
,
Hao Yang
,
Zhou Li
,
Haixin Duan
,
Kehuan Zhang
USENIX Security Symposium
2016
Corpus ID: 17193540
Blackhat Search Engine Optimization (SEO) has been widely used to promote spam or malicious web sites. Traditional blackhat SEO…
Expand
Review
2014
Review
2014
Communication Networks for Smart Grids: Making Smart Grid Real
K. Budka
,
Jayant G. Deshpande
,
M. Thottan
2014
Corpus ID: 112923692
This book presents an application-centric approach to the development of smart grid communication architecture. The coverage…
Expand
2013
2013
The BlackHat Library for One-Loop Amplitudes
Z. Bern
,
L. Dixon
,
+6 authors
K. Ozeren
2013
Corpus ID: 43290557
We present recent next-to-leading order (NLO) results in perturbative QCD obtained using the BLACKHAT software library. We…
Expand
Highly Cited
2012
Highly Cited
2012
NLO QCD corrections to multi-jet production at the LHC with a centre-of-mass energy of s=8 TeV
S. Badger
,
B. Biedermann
,
P. Uwer
,
V. Yundin
2012
Corpus ID: 119181257
Highly Cited
2010
Highly Cited
2010
Organizing Large Scale Hacking Competitions
Nicholas Childers
,
B. Boe
,
+4 authors
Giovanni Vigna
International Conference on Detection of…
2010
Corpus ID: 125273
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting…
Expand
Highly Cited
2005
Highly Cited
2005
DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS *
Miyoung Kim
,
Misun Kim
,
Hyewon K. Lee
,
Youngsong Mun
2005
Corpus ID: 2499256
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network…
Expand
2004
2004
Honeypot Forensics Part I: Analyzing the Network
F. Raynal
,
Y. Berthier
,
P. Biondi
,
D. Kaminsky
IEEE Security and Privacy
2004
Corpus ID: 5692927
A major goal of honeypot research is to improve our knowledge of blackhats from two perspectives: technical and ethnological. For…
Expand
2002
2002
Know Your Enemy : Honeynets What a Honeynet
2002
Corpus ID: 46659146
Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat…
Expand
Highly Cited
1982
Highly Cited
1982
The question of genre
Medicina e historia
1982
Corpus ID: 36784402
ImagesFigure 1
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required