The Art of Intrusion

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, & Decievers is a book by Kevin Mitnick that is a collection of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
With the advancement in the communication technology, the probability of external attacks through networks is increasing day by… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Review
2014
Review
2014
MANET is network with mobile nodes which has no fixed infrastructure support. As the nodes are energy-constrained and have… (More)
Is this relevant?
2014
2014
The current generations increasingly rely on the internet and advanced technologies. As network attacks have increased over the… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Review
2013
Review
2013
The use of wireless links renders a vehicular ad-hoc network (VANET) vulnerable to malicious attacks such as Denial of Service… (More)
  • figure 2
  • figure I
  • figure 4
  • figure 3
  • figure 6
Is this relevant?
Review
2012
Review
2012
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by… (More)
  • figure 1
  • table 1
  • figure 2
Is this relevant?
2011
2011
Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing… (More)
  • figure 1
  • table 1
Is this relevant?
2005
2005
Chapter 1: Hacking the Casinos for a Million Bucks. Chapter 2: When Terrorists Come Calling. Chapter 3: The Texas Prison Hack… (More)
Is this relevant?
2005
2005
 
Is this relevant?
2001
2001
Abstract It happens every year in the fall. This year, it happened in Toulouse, France. Last year it was at Purdue University… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in… (More)
  • figure V
Is this relevant?