Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,321 papers from all fields of science
Search
Sign In
Create Free Account
Timeline of computer security hacker history
Known as:
Timeline of hacker history
, A Hacker History
, Infamous Hacks
Expand
Timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
1260 (computer virus)
ACM Turing Award
Bomba (cryptography)
Bombe
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A short history of hacking: values and principles for co-operative higher education
J. Winn
2015
Corpus ID: 150714541
2013
2013
Anonymous and dangerous: the cults of Julian Assange and the history of hacking in the twentieth century
J. A. Kavanagh
2013
Corpus ID: 164893415
2012
2012
Is the Research to Date on Hackers Sufficient to Gain a Complete Understanding of the Psychology Involved
Grainne Kirwan
,
A. Power
2012
Corpus ID: 151629359
Of all the types of cybercrime that exist, hackers are the cybercriminals who have probably engaged both the imagination of the…
Expand
2010
2010
Founding a Hackerspace
Joseph Schlesinger
,
Kelly Swan MacNeill
,
Md. Monirul Islam
2010
Corpus ID: 158168242
This report is the written component of our project that explores the hackerspace phenomenon. The report discusses the background…
Expand
2005
2005
Information insecurity : a survival guide to the uncharted territories of cyber-threats and cyber-security
E. Gelbstein
,
A. Kamal
2005
Corpus ID: 107006378
A guide to computer security that attempts to create awareness about the dangers of cyber-hooliganism, cyber-crime, cyber…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE