Security hacker

Known as: Dark-side hacker, Computer hackers, Hacker (network security) 
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Current smartphones generally cannot continuously authenticate users during runtime. This poses severe security and privacy… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2014
Highly Cited
2014
The Internet of Things (IoT) paradigm stands for virtually interconnected objects that are identifiable and equipped with sensing… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
Fuzzing is one of the most popular test-based software vulnerability detection techniques. It consists in running the target… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Collaborative sensing in cognitive radio networks can significantly improve the probability of detecting the transmission of… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Modern communication networks are vulnerable to attackers who send unsolicited messages to innocent users, wasting network… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Collaborative Filtering systems are essentially social systems which base their recommendation on the judgment of a large number… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 4
Is this relevant?
2005
2005
Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The anomaly-detection problem can be formulated as one of learning to characterize the behaviors of an individual, system, or… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Two problems of importance in computer security are to 1) detect the presence of an intruder masquerading as the valid user and 2… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?