Security hacker (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Security hacker" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
11th place
8th place
3,959th place
3,208th place
34th place
27th place
5th place
5th place
6th place
6th place
7th place
7th place
36th place
33rd place
low place
low place
low place
low place
146th place
110th place
low place
low place
61st place
54th place
652nd place
515th place
1,336th place
769th place
2,036th place
1,254th place
1,060th place
700th place
272nd place
225th place
low place
low place
3,812th place
3,173rd place
20th place
30th place
484th place
323rd place
220th place
155th place
92nd place
72nd place
low place
7,385th place
low place
low place
low place
low place
low place
low place
8th place
10th place
2,213th place
1,495th place
2,755th place
1,753rd place
3rd place
3rd place
204th place
353rd place
3,288th place
4,712th place
low place
low place
4,963rd place
7,139th place

archive.org (Global: 6th place; English: 6th place)

bbc.co.uk (Global: 8th place; English: 10th place)

bbc.com (Global: 20th place; English: 30th place)

books.google.com (Global: 3rd place; English: 3rd place)

carnegieendowment.org (Global: 3,812th place; English: 3,173rd place)

catb.org (Global: 3,959th place; English: 3,208th place)

cnbc.com (Global: 220th place; English: 155th place)

cnet.com (Global: 272nd place; English: 225th place)

news.cnet.com

computerhistory.org (Global: 2,213th place; English: 1,495th place)

defcon.org (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

doi.org

  • Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements". Annals of Operations Research. 235: 277–300. doi:10.1007/s10479-015-1925-2. S2CID 207085416.
  • Bailey, David (April 1984). "Attacks on Computers: Congressional Hearings and Pending Legislation". 1984 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE. pp. 180–186. doi:10.1109/SP.1984.10012. ISBN 978-0-8186-0532-1. OSTI 5208082. S2CID 15187375. Archived from the original on June 24, 2024. Retrieved July 21, 2023.
  • Caldwell, Tracey (July 22, 2011). "Ethical hackers: putting on the white hat". Network Security. 2011 (7): 10–13. doi:10.1016/s1353-4858(11)70075-7.
  • Okpa, John Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (September 5, 2022). "Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria". SAGE Open. 12 (3): 215824402211227. doi:10.1177/21582440221122739. ISSN 2158-2440. S2CID 252096635.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  • Dey, Debabrata; Lahiri, Atanu; Zhang, Guoying (2011). "Hacker Behavior, Network Effects, and the Security Software Market". SSRN Electronic Journal. doi:10.2139/ssrn.1838656. ISSN 1556-5068.

dx.doi.org

dw.com (Global: 204th place; English: 353rd place)

govinfosecurity.com (Global: low place; English: low place)

htbridge.com (Global: low place; English: low place)

ieee.org (Global: 652nd place; English: 515th place)

ieeexplore.ieee.org

independent.co.uk (Global: 36th place; English: 33rd place)

information-age.com (Global: low place; English: low place)

informit.com (Global: low place; English: 7,385th place)

jargon-file.org (Global: low place; English: low place)

newyorker.com (Global: 146th place; English: 110th place)

  • Yagoda, Ben (March 6, 2014). "A Short History of 'Hack'". The New Yorker. Archived from the original on November 10, 2015. Retrieved June 21, 2019. Although Lifehacker and other neutral or positive applications of the word [hack] are increasingly prominent, the black-hat meaning still prevails among the general public.

npr.org (Global: 92nd place; English: 72nd place)

nytimes.com (Global: 7th place; English: 7th place)

osti.gov (Global: 2,036th place; English: 1,254th place)

overheid.nl (Global: 3,288th place; English: 4,712th place)

wetten.overheid.nl

pcmag.com (Global: 1,060th place; English: 700th place)

  • "Blue hat hacker Definition". PC Magazine Encyclopedia. Archived from the original on March 8, 2013. Retrieved May 31, 2010. A security professional invited by Microsoft to find vulnerabilities in Windows.

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

  • Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements". Annals of Operations Research. 235: 277–300. doi:10.1007/s10479-015-1925-2. S2CID 207085416.
  • Bailey, David (April 1984). "Attacks on Computers: Congressional Hearings and Pending Legislation". 1984 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE. pp. 180–186. doi:10.1109/SP.1984.10012. ISBN 978-0-8186-0532-1. OSTI 5208082. S2CID 15187375. Archived from the original on June 24, 2024. Retrieved July 21, 2023.
  • Okpa, John Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (September 5, 2022). "Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria". SAGE Open. 12 (3): 215824402211227. doi:10.1177/21582440221122739. ISSN 2158-2440. S2CID 252096635.{{cite journal}}: CS1 maint: multiple names: authors list (link)

stallman.org (Global: low place; English: low place)

time.com (Global: 61st place; English: 54th place)

tomandmaria.com (Global: low place; English: low place)

unibo.it (Global: 4,963rd place; English: 7,139th place)

scienzagiovane.unibo.it

unt.edu (Global: 1,336th place; English: 769th place)

digital.library.unt.edu

usdoj.gov (Global: 2,755th place; English: 1,753rd place)

vox.com (Global: 484th place; English: 323rd place)

washingtonpost.com (Global: 34th place; English: 27th place)

web.archive.org (Global: 1st place; English: 1st place)

windowsecurity.com (Global: low place; English: low place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org