Hacker

Known as: Hack, H@x0r, Hackers 
In computing, a hacker is any highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploits… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
This article aims to contribute to our understanding of the free/libre open source software (FLOSS) innovation and how it is… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Genome sequencing of large numbers of individuals promises to advance the understanding, treatment, and prevention of human… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
2010
2010
Theodore Roosevelt once said: “It is difficult to make our material condition better by the best law, but it is easy enough to… (More)
Is this relevant?
2008
2008
Where you can find the insider attack and cyber security beyond the hacker easily? Is it in the book store? On-line book store… (More)
Is this relevant?
2008
2008
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Added TimeLatest Added Security/Hacking eBooks: Pinto / 2011-05-10The Web Application Hacker's Handbook: Discovering and… (More)
Is this relevant?
2007
2007
This two-part article discusses the factors distinguishing the hacker culture from the IT industry and traditional academia… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
W. Ackermann, G. Asova, V. Ayvazyan, A. Azima, N. Baboi, J. Bähr, V. Balandin, B. Beutner, A. Brandt, A. Bolzmann, R. Brinkmann… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the… (More)
  • figure 1
Is this relevant?
Highly Cited
1988
Highly Cited
1988
An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security… (More)
  • figure 1
  • figure 2
Is this relevant?