Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,463 papers from all fields of science
Search
Sign In
Create Free Account
Security hacker
Known as:
Dark-side hacker
, Computer hackers
, Hacker (network security)
Expand
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
.hack
Black hat
BlueHat
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
A design review: Concepts for mitigating SQL injection attacks
Ed Pearson
,
Cindy L. Bethel
International Symposium on Digital Forensics and…
2016
Corpus ID: 21341249
Recently, it is not unusual to notice media coverage of some major breach in some large organization's cyber security. A large…
Expand
2015
2015
Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model
Bahman Rashidi
,
Carol J. Fung
Journal of Internet Services and Information…
2015
Corpus ID: 17365444
RecDroid is an Android smartphone permission control framework which provides fine-grained permission control regarding…
Expand
2014
2014
Algorithm to prevent back end database against SQL injection attacks
Mahima Srivastava
International Conference on Computing for…
2014
Corpus ID: 43883626
SQL injection attack (SQLIA) is a technique through which attackers gain access over back-end databases by inserting the…
Expand
Highly Cited
2013
Highly Cited
2013
A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check
Xiaofan He
,
H. Dai
,
P. Ning
IEEE Transactions on Wireless Communications
2013
Corpus ID: 21292063
Security concerns are raised for collaborative spectrum sensing due to its vulnerabilities to the potential attacks from…
Expand
2013
2013
Towards secure and context-aware information lookup for the Internet of Things
Michalis Giannikos
,
Korina Kokoli
,
N. Fotiou
,
G. Marias
,
George C. Polyzos
International Conference on Computing, Networking…
2013
Corpus ID: 10124136
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for…
Expand
Highly Cited
2011
Highly Cited
2011
Privacy-preserving matchmaking For mobile social networking secure against malicious users
Qi Xie
,
U. Hengartner
Ninth Annual International Conference on Privacy…
2011
Corpus ID: 18808476
The success of online social networking and of mobile phone services has resulted in increased attention to mobile social…
Expand
2009
2009
Policy-based spectrum access control for dynamic spectrum access network radios
F. Perich
,
M. McHenry
Journal of Web Semantics
2009
Corpus ID: 205702047
2006
2006
A Software Protection Method Based on Instruction Camouflage
Yuichiro Kanzaki
,
Akito Monden
,
Masahide Nakamura
,
Ken-ichi Matsumoto
2006
Corpus ID: 14416806
SUMMARY This paper presents a method in which program analysis by a malicious user (attacker) is made difficult by camouflaging…
Expand
2006
2006
Distributed Reputation System for Tracking Applications in Sensor Networks
T. Roosta
,
M. Meingast
,
S. Sastry
3rd Annual International Conference on Mobile and…
2006
Corpus ID: 8865886
Ad-hoc sensor networks are becoming more common, yet security of these networks is still an issue, node misbehavior due to…
Expand
2001
2001
Statistical process control for computer intrusion detection
Nong Ye
,
S. Emran
,
Xiangyang Li
,
Qiang Chen
Proceedings DARPA Information Survivability…
2001
Corpus ID: 61770979
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required