Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

The Art of Intrusion

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, & Decievers is a book by Kevin Mitnick that is a collection of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
With the advent of large-scale heterogeneous networks comes the problem of unified network control resulting in security lapses… Expand
  • figure 2
Is this relevant?
2014
2014
The current generations increasingly rely on the internet and advanced technologies. As network attacks have increased over the… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Review
2014
Review
2014
MANET is network with mobile nodes which has no fixed infrastructure support. As the nodes are energy-constrained and have… Expand
Is this relevant?
Review
2013
Review
2013
The use of wireless links renders a vehicular ad-hoc network (VANET) vulnerable to malicious attacks such as Denial of Service… Expand
  • figure 2
  • figure I
  • figure 4
  • figure 3
  • figure 6
Is this relevant?
2011
2011
Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Chapter 1: Hacking the Casinos for a Million Bucks. Chapter 2: When Terrorists Come Calling. Chapter 3: The Texas Prison Hack… Expand
Is this relevant?
2005
2005
 
Is this relevant?
2005
2005
 
Is this relevant?
2003
2003
 
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?