Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Hacker

Known as: Hack, H@x0r, Hackers 
In computing, a hacker is any highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploits… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
The process of using information about documents such as the author, genre, and date of publication while evaluating and… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The evolution of computer technology and the growth of the Internet have both positively and negatively impacted modern life… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Computer crime hackers have been identified as a primary threat to computer systems, users, and organizations. Much extant… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Introduction xxiii Chapter 1 Web Application (In)security 1 Chapter 2 Core Defense Mechanisms 17 Chapter 3 Web Application… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Many scholars, commentators and politicians assert that international organizations suffer from a severe ‘democratic deficit… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
One morning a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm’s… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper investigates the success and failure of performance measurement system design interventions in ten companies. In each… Expand
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The Digital Millennium Copyright Act of 1998 ("DMCA") prohibits the circumvention of technological protection measures used by… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the… Expand
  • figure 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Abstract : This paper reports on a meta-analytic integration of the relation between group cohesiveness and performance. Overall… Expand
  • table 1
  • table 2
Is this relevant?