Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,232,153 papers from all fields of science
Search
Sign In
Create Free Account
Security hacker
Known as:
Dark-side hacker
, Computer hackers
, Hacker (network security)
Expand
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
.hack
Black hat
BlueHat
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check
Xiaofan He
,
H. Dai
,
P. Ning
IEEE Transactions on Wireless Communications
2013
Corpus ID: 21292063
Security concerns are raised for collaborative spectrum sensing due to its vulnerabilities to the potential attacks from…
Expand
2013
2013
Towards secure and context-aware information lookup for the Internet of Things
Michalis Giannikos
,
Korina Kokoli
,
N. Fotiou
,
G. Marias
,
George C. Polyzos
International Conference on Computing, Networking…
2013
Corpus ID: 10124136
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for…
Expand
2012
2012
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment
Junghyun Nam
,
Moonseong Kim
,
Juryon Paik
,
Dongho Won
KSII Transactions on Internet and Information…
2012
Corpus ID: 36045668
Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks…
Expand
2012
2012
Secure and trusted algorithm for cognitive radio network
Rajni Dubey
,
Sanjeev Sharma
,
Lokesh Chouhan
International Conference on Wireless and Optical…
2012
Corpus ID: 17342196
Wireless spectrum is precious, so there are always requirements of dynamic shared spectrum techniques and an intelligent wireless…
Expand
Highly Cited
2011
Highly Cited
2011
Privacy-preserving matchmaking For mobile social networking secure against malicious users
Qi Xie
,
U. Hengartner
Ninth Annual International Conference on Privacy…
2011
Corpus ID: 18808476
The success of online social networking and of mobile phone services has resulted in increased attention to mobile social…
Expand
2009
2009
Policy-based spectrum access control for dynamic spectrum access network radios
F. Perich
,
M. McHenry
Journal of Web Semantics
2009
Corpus ID: 205702047
2006
2006
Distributed Reputation System for Tracking Applications in Sensor Networks
T. Roosta
,
M. Meingast
,
S. Sastry
3rd Annual International Conference on Mobile and…
2006
Corpus ID: 8865886
Ad-hoc sensor networks are becoming more common, yet security of these networks is still an issue, node misbehavior due to…
Expand
2003
2003
Flaws in Some Robust Optimistic Mix-Nets
Masayuki Abe
,
H. Imai
Australasian Conference on Information Security…
2003
Corpus ID: 2853427
This paper introduces weaknesses of two robust Mix-nets proposed in [10] and [7]. First, we show that [10] can lose anonymity in…
Expand
2001
2001
Statistical process control for computer intrusion detection
Nong Ye
,
S. Emran
,
Xiangyang Li
,
Qiang Chen
Proceedings DARPA Information Survivability…
2001
Corpus ID: 61770979
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the…
Expand
1997
1997
Progressive partial memory learning
M. Maloof
1997
Corpus ID: 59894792
PROGRESSIVE PARTIAL MEMORY LEARNING Marcus A. Maloof George Mason University, 1996 Dissertation Director: Ryszard S. Michalski A…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE