Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,179,928 papers from all fields of science
Search
Sign In
Create Free Account
Hacker
Known as:
Hack
, H@x0r
, Hackers
Expand
In computing, a hacker is any highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploits…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
ACM Turing Award
Black hat
Blog
Case modding
Expand
Broader (1)
Computer programming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Mixing Dirichlet Topic Models and Word Embeddings to Make lda2vec
Christopher E. Moody
arXiv.org
2016
Corpus ID: 15747275
Distributed dense word vectors have been shown to be effective at capturing token-level semantic and syntactic regularities in…
Expand
Review
2012
Review
2012
Relevance processes in multiple document comprehension
J. Rouet
,
M. Britt
2012
Corpus ID: 7532245
We introduce the MD-TRACE model (for Multiple-Document Task-based Relevance Assessment and Content Extraction), a descriptive…
Expand
Highly Cited
2011
Highly Cited
2011
The General Theory of Crime and Computer Hacking: Low Self-control Hackers?
A. Bossler
,
George W. Burruss
2011
Corpus ID: 15707621
Though in recent years, a number of studies have been completed on hackers’ personality and communication traits by experts in…
Expand
Review
2011
Review
2011
Crustal–lithospheric structure and continental extrusion of Tibet
M. Searle
,
John R. Elliott
,
R. J. Phillips
,
Sun‐Lin Chung
Journal of the Geological Society
2011
Corpus ID: 55324631
Abstract: Crustal shortening and thickening to c. 70–85 km in the Tibetan Plateau occurred both before and mainly after the c. 50…
Expand
Highly Cited
2005
Highly Cited
2005
Pre‐collisional high pressure metamorphism and nappe tectonics at active continental margins: a numerical simulation
B. Stöckhert
,
T. Gerya
2005
Corpus ID: 115131321
The evolution of a subduction channel and orogenic wedge is simulated in 2D for an active continental margin, with P‐T paths…
Expand
Highly Cited
2004
Highly Cited
2004
Is there a ‘Democratic Deficit’ in World Politics? A Framework for Analysis
A. Moravcsik
Government and Opposition
2004
Corpus ID: 143601718
Abstract Many scholars, commentators and politicians assert that international organizations suffer from a severe ‘democratic…
Expand
Highly Cited
2001
Highly Cited
2001
A tectonic model for Cenozoic igneous activities in the eastern Indo–Asian collision zone
Jianghai Wang
,
A. Yin
,
T. Harrison
,
M. Grove
,
Yuquan Zhang
,
G. Xie
2001
Corpus ID: 10851654
Highly Cited
2001
Highly Cited
2001
Arrested orogenic development: eclogitization, delamination, and tectonic collapse
M. Leech
2001
Corpus ID: 15264767
Highly Cited
1999
Highly Cited
1999
Accomplishments and Impact from Breeding for Increased Forage Nutritional Value
M. Casler
,
K. Vogel
1999
Corpus ID: 54780632
Despite considerable rhetoric, there were no serious efforts to improve genetically the nutritional value of forage crops until…
Expand
Highly Cited
1996
Highly Cited
1996
A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker )
I. Goldberg
,
D. Wagner
,
Randi Thomas
,
Eric A. Brewer
1996
Corpus ID: 6821531
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required