Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,690,516 papers from all fields of science
Search
Sign In
Create Free Account
Phone hacking
Known as:
Hacking
, Voicemail hacking
Phone hacking is the practice of intercepting telephone calls or voicemail messages, often by accessing the voicemail messages of a mobile phone…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Adversary (cryptography)
Bluetooth
Brute-force attack
Key space (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Cybersecurity weaknesses threaten to make smart cities morecostly and dangerous than their analog predecessors
N. Allen
2016
Corpus ID: 112026079
Recent years have seen where we live – from our homes to our cities – increasingly connected via the Internet of Things. While…
Expand
2012
2012
Managing risk in mobile commerce
P. Brockett
,
L. Golden
,
Anji Song
International Journal of Electronic Business
2012
Corpus ID: 29105311
Mobile commerce (m-commerce) is an increasingly important component of the consumer and business marketplace which, according to…
Expand
2012
2012
Anatomy of compromising email accounts
Seema Khanna
,
H. Chaudhry
IEEE International Conference on Information and…
2012
Corpus ID: 21361577
Click! You open an email and you are hacked. Your password reaches the hacker while you read the contents of the innocuous…
Expand
2011
2011
Multiple SOFMs Working Cooperatively In a Vote-based Ranking System For Network Intrusion Detection
C. Obimbo
,
Haochen Zhou
,
Ryan Wilson
Complex Adaptive Systems
2011
Corpus ID: 750643
2010
2010
DSS for computer security incident response applying CBR and collaborative response
H. Kim
,
K. Im
,
Sang-Chan Park
Expert systems with applications
2010
Corpus ID: 32438276
2010
2010
QUERY BASED APPROACH TOWARDS SPAM ATTACKS USING ARTIFICIAL NEURAL NETWORK
G. Tak
,
T. Shashikala
2010
Corpus ID: 15103365
Currently, spam and scams are passive attack over the inbox which can initiated to steal some confidential information, to spread…
Expand
Highly Cited
2007
Highly Cited
2007
On the Anatomy of Human Hacking
Peter O. Okenyi
,
T. Owens
Information Security Journal
2007
Corpus ID: 205732644
ABSTRACT Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its impact is continuously…
Expand
2006
2006
Criminalising hacking tools
P. Sommer
Digital Investigation. The International Journal…
2006
Corpus ID: 31696650
2004
2004
Network security hacks
A. Lockhart
2004
Corpus ID: 5582108
To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent…
Expand
2000
2000
Theories of Crime and Hacking 1 Psychological Theories of Crime and Hacking
Marc Rogers
2000
Corpus ID: 12317648
Today's society is in the midst of a technological revolution. With advances in computers and telecommunications most businesses…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE