Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,355,086 papers from all fields of science
Search
Sign In
Create Free Account
Security hacker
Known as:
Dark-side hacker
, Computer hackers
, Hacker (network security)
Expand
In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
.hack
Black hat
BlueHat
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones
Hui Xu
,
Yangfan Zhou
,
Michael R. Lyu
Symposium On Usable Privacy and Security
2014
Corpus ID: 1480604
Current smartphones generally cannot continuously authenticate users during runtime. This poses severe security and privacy…
Expand
Highly Cited
2011
Highly Cited
2011
P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks
Tong Zhou
,
Romit Roy Choudhury
,
P. Ning
,
K. Chakrabarty
IEEE Journal on Selected Areas in Communications
2011
Corpus ID: 1600980
Vehicular ad hoc networks (VANETs) are being increasingly advocated for traffic control, accident avoidance, and management of…
Expand
Review
2011
Review
2011
Survey of Security Issues in Cognitive Radio Networks
W. El-Hajj
,
H. Safa
,
M. Guizani
2011
Corpus ID: 9443374
Cognitive Radio (CR) is a novel technology that promises to solve the spectrum shortage problem by allowing secondary users to…
Expand
Highly Cited
2010
Highly Cited
2010
Security in multi-tenancy cloud
A. Jasti
,
P. Shah
,
R. Nagaraj
,
R. Pendse
Annual IEEE International Carnahan Conference on…
2010
Corpus ID: 2507930
Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks…
Expand
Highly Cited
2008
Highly Cited
2008
SybilGuard: defending against sybil attacks via social networks
Haifeng Yu
,
M. Kaminsky
,
Phillip B. Gibbons
,
A. Flaxman
TNET
2008
Corpus ID: 29091256
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil…
Expand
Highly Cited
2005
Highly Cited
2005
Designing human friendly human interaction proofs (HIPs)
K. Chellapilla
,
K. Larson
,
Patrice Y. Simard
,
M. Czerwinski
International Conference on Human Factors in…
2005
Corpus ID: 10798614
HIPs, or Human Interactive Proofs, are challenges meant to be easily solved by humans, while remaining too hard to be…
Expand
Highly Cited
2004
Highly Cited
2004
Finding User/Kernel Pointer Bugs with Type Inference
Robert Johnson
,
D. Wagner
USENIX Security Symposium
2004
Corpus ID: 16896327
Today's operating systems struggle with vulnerabilities from careless handling of user space pointers. User/kernel pointer bugs…
Expand
Highly Cited
2000
Highly Cited
2000
Detecting masquerades in intrusion detection based on unpopular commands
Matthias Schonlau
,
M. Theus
Information Processing Letters
2000
Corpus ID: 43535304
Highly Cited
1998
Highly Cited
1998
A Sociology of Hackers
T. Jordan
,
P. Taylor
1998
Corpus ID: 56336311
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community…
Expand
Highly Cited
1989
Highly Cited
1989
Knowledge-based intrusion detection
T. Lunt
,
R. Jagannathan
,
R. Lee
,
A. Whitehurst
,
S. Listgarten
[] Proceedings. The Annual AI Systems in…
1989
Corpus ID: 56809756
The authors describe the expert-system aspects of IDES (intrusion-detection expert system). A system for computer intrusion…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE