Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,287,027 papers from all fields of science
Search
Sign In
Create Free Account
Security hacker
Known as:
Dark-side hacker
, Computer hackers
, Hacker (network security)
Expand
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
.hack
Black hat
BlueHat
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check
Xiaofan He
,
H. Dai
,
P. Ning
IEEE Transactions on Wireless Communications
2013
Corpus ID: 21292063
Security concerns are raised for collaborative spectrum sensing due to its vulnerabilities to the potential attacks from…
Expand
2013
2013
Towards secure and context-aware information lookup for the Internet of Things
Michalis Giannikos
,
Korina Kokoli
,
N. Fotiou
,
G. Marias
,
George C. Polyzos
International Conference on Computing, Networking…
2013
Corpus ID: 10124136
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for…
Expand
2012
2012
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment
Junghyun Nam
,
Moonseong Kim
,
Juryon Paik
,
Dongho Won
KSII Transactions on Internet and Information…
2012
Corpus ID: 36045668
Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks…
Expand
Highly Cited
2011
Highly Cited
2011
Privacy-preserving matchmaking For mobile social networking secure against malicious users
Qi Xie
,
U. Hengartner
Ninth Annual International Conference on Privacy…
2011
Corpus ID: 18808476
The success of online social networking and of mobile phone services has resulted in increased attention to mobile social…
Expand
2009
2009
Policy-based spectrum access control for dynamic spectrum access network radios
F. Perich
,
M. McHenry
Journal of Web Semantics
2009
Corpus ID: 205702047
2003
2003
Flaws in Some Robust Optimistic Mix-Nets
Masayuki Abe
,
H. Imai
Australasian Conference on Information Security…
2003
Corpus ID: 2853427
This paper introduces weaknesses of two robust Mix-nets proposed in [10] and [7]. First, we show that [10] can lose anonymity in…
Expand
2001
2001
Statistical process control for computer intrusion detection
Nong Ye
,
S. Emran
,
Xiangyang Li
,
Qiang Chen
Proceedings DARPA Information Survivability…
2001
Corpus ID: 61770979
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the…
Expand
Highly Cited
1998
Highly Cited
1998
AI Approaches to Fraud Detection and Risk Management
Tom Fawcett
,
I. J. Haimowitz
,
F. Provost
,
S. Stolfo
The AI Magazine
1998
Corpus ID: 7326057
The 1997 AAAI Workshop on AI Approaches to Fraud Detection and Risk Management brought together over 50 researchers and…
Expand
1997
1997
Progressive partial memory learning
M. Maloof
1997
Corpus ID: 59894792
PROGRESSIVE PARTIAL MEMORY LEARNING Marcus A. Maloof George Mason University, 1996 Dissertation Director: Ryszard S. Michalski A…
Expand
Review
1992
Review
1992
A consumer guide to neuronal modeling software
E. Schutter
Trends in Neurosciences
1992
Corpus ID: 54236030
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE