Skip to search formSkip to main contentSkip to account menu

Security hacker

Known as: Dark-side hacker, Computer hackers, Hacker (network security) 
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
SQL injection attack (SQLIA) is a technique through which attackers gain access over back-end databases by inserting the… 
Highly Cited
2013
Highly Cited
2013
Security concerns are raised for collaborative spectrum sensing due to its vulnerabilities to the potential attacks from… 
2013
2013
The Internet of Things (IoT) is receiving more and more attention from the research community. The opportunities it creates for… 
2012
2012
Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks… 
2012
2012
Wireless spectrum is precious, so there are always requirements of dynamic shared spectrum techniques and an intelligent wireless… 
Highly Cited
2011
Highly Cited
2011
  • Qi XieU. Hengartner
  • 2011
  • Corpus ID: 18808476
The success of online social networking and of mobile phone services has resulted in increased attention to mobile social… 
2006
2006
SUMMARY This paper presents a method in which program analysis by a malicious user (attacker) is made difficult by camouflaging… 
2006
2006
Ad-hoc sensor networks are becoming more common, yet security of these networks is still an issue, node misbehavior due to… 
2001
2001
This paper describes the architecture of a distributed, host-based Intrusion Detection System (IDS) that we have developed at the…