Skip to search formSkip to main contentSkip to account menu

Security hacker

Known as: Dark-side hacker, Computer hackers, Hacker (network security) 
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Current smartphones generally cannot continuously authenticate users during runtime. This poses severe security and privacy… 
Highly Cited
2011
Highly Cited
2011
Vehicular ad hoc networks (VANETs) are being increasingly advocated for traffic control, accident avoidance, and management of… 
Review
2011
Review
2011
Cognitive Radio (CR) is a novel technology that promises to solve the spectrum shortage problem by allowing secondary users to… 
Highly Cited
2010
Highly Cited
2010
Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks… 
Highly Cited
2008
Highly Cited
2008
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil… 
Highly Cited
2005
Highly Cited
2005
HIPs, or Human Interactive Proofs, are challenges meant to be easily solved by humans, while remaining too hard to be… 
Highly Cited
2004
Highly Cited
2004
Today's operating systems struggle with vulnerabilities from careless handling of user space pointers. User/kernel pointer bugs… 
Highly Cited
1998
Highly Cited
1998
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community… 
Highly Cited
1989
Highly Cited
1989
The authors describe the expert-system aspects of IDES (intrusion-detection expert system). A system for computer intrusion…