List of computer criminals

Known as: Crackers, List of convicted computer criminals, Lewys Martin 
In the infancy of the hacker subculture and the computer underground, criminal convictions were rare because there was an informal code of ethics… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1992-2016
02419922016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Crackers discover how to use NTP as a weapon for abuse. 
Is this relevant?
2010
2010
In this paper, we propose Micro Secure Socket Layer (MSSL) for 8-bit flash micro controller that is about 1.3 Kbytes in code size… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2009
2009
In this paper, we propose Micro Secure Socket Layer (MSSL) for 8-bit flash micro controller that is about 1.3 Kbytes in code size… (More)
  • figure 2
  • figure 5
  • figure 3
Is this relevant?
2007
2007
The paper presents the history of Variable Speed Drives ( VSDs ) for high power compressors of steam crackers (20 to 40 MW) in… (More)
  • figure 5
Is this relevant?
2007
2007
Despite current software protection techniques, applications are still analysed, tampered with, and abused on a large scale… (More)
  • table I
Is this relevant?
2004
2004
I present tests of a competitive rationale for price promotions. In a model with a population of informed and uninformed… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table IV
Is this relevant?
2001
2001
It's not surprisingly when entering this site to get the book. One of the popular books now is the defending your digital assets… (More)
Is this relevant?
2001
2001
Internet servers are always in danger of being “hijacked” by various attacks like the buffer overflow attack. To minimize damages… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2001
2001
While advances in computer and communications technology have made the network ubiquitous, they ahve also rendered networked… (More)
Is this relevant?