6 papers:
- KDD-2015-HayashiMTK #detection #realtime #topic #twitter
- Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering (KH, TM, MT, KiK), pp. 417–426.
- CHI-2014-ShayIRC #case study #experience #quote #why
- “My religious aunt asked why i was trying to sell her viagra”: experiences with account hijacking (RS, II, RWR, SC), pp. 2657–2666.
- ICALP-v2-2012-ChiesaBEP #complexity
- Computational Complexity of Traffic Hijacking under BGP and S-BGP (MC, GDB, TE, MP), pp. 476–487.
- ICST-2011-TsankovJOS #dynamic analysis #execution
- Execution Hijacking: Improving Dynamic Analysis by Flying off Course (PT, WJ, AO, SS), pp. 200–209.
- SAC-2010-EgeleBKK #web
- CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms (ME, LB, EK, CK), pp. 1865–1870.
- HPDC-1999-ZandyML #process
- Process Hijacking (VCZ, BPM, ML), pp. 177–184.