Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,617,828 papers from all fields of science
Search
Sign In
Create Free Account
Security hacker
Known as:
Dark-side hacker
, Computer hackers
, Hacker (network security)
Expand
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
.hack
Black hat
BlueHat
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model
Bahman Rashidi
,
Carol J. Fung
Journal of Internet Services and Information…
2015
Corpus ID: 17365444
RecDroid is an Android smartphone permission control framework which provides fine-grained permission control regarding…
Expand
2014
2014
Enhancing Security in Cloud Computing Using Multilevel Authentication
Yogesh Patel
,
Nidhi Sethi
2014
Corpus ID: 212569966
- The proposed work aims to enhance authorization and authentication process by using multilevel authentication to protect cloud…
Expand
2014
2014
An Anonymous Communication Scheme based on Ring Signature in VANETs
Yichen Jiang
,
Yi Ji
,
Tianhua Liu
arXiv.org
2014
Corpus ID: 17401390
Vehicular ad hoc networks allow vehicles to connect themselves as networks so that cars could communicate with each other. This…
Expand
2013
2013
Towards secure and context-aware information lookup for the Internet of Things
Michalis Giannikos
,
Korina Kokoli
,
N. Fotiou
,
G. Marias
,
George C. Polyzos
International Conference on Computing, Networking…
2013
Corpus ID: 10124136
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for…
Expand
2012
2012
Secure and trusted algorithm for cognitive radio network
Rajni Dubey
,
Sanjeev Sharma
,
Lokesh Chouhan
International Conference on Wireless and Optical…
2012
Corpus ID: 17342196
Wireless spectrum is precious, so there are always requirements of dynamic shared spectrum techniques and an intelligent wireless…
Expand
2012
2012
Universal cheat-proof pricing for multiple access channels without SIC under QoS requirements
Fei Shen
,
Eduard Axel Jorswieck
IEEE International Conference on Communications…
2012
Corpus ID: 42649401
This paper studies universal cheat-proof pricing by a repeated game for the general multiple access channel (MAC) without…
Expand
2010
2010
Swarm-Based Knowledge Discovery for Intrusion Behavior Discovering
Xiaohui Cui
,
Justin M. Beaver
,
T. Potok
International Conference on Cyber-Enabled…
2010
Corpus ID: 10322405
In this research, we developed a technique, the Swarm-based Visual Data Mining approach (SVDM), that will help user to gain…
Expand
2006
2006
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol
Jue-Sam Chou
,
Chu-Hsing Lin
,
C. Chiu
IACR Cryptology ePrint Archive
2006
Corpus ID: 45598504
In this article we show that Shim's new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation…
Expand
2004
2004
Infinite grobner bases and noncommutative polly cracker cryptosystems
T. Rai
,
E. Green
2004
Corpus ID: 126125825
We develop a public key cryptosystem whose security is based on the intractability of the ideal membership problem for a…
Expand
2004
2004
Computer Intrusion Detection Through Predictive Models
Paul F. Evangelista
,
M. Embrechts
,
B. Szymański
2004
Corpus ID: 116024108
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE