6 papers:
KDD-2015-HayashiMTK #detection #realtime #topic #twitter- Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering (KH, TM, MT, KiK), pp. 417–426.
CHI-2014-ShayIRC #case study #experience #quote #why- “My religious aunt asked why i was trying to sell her viagra”: experiences with account hijacking (RS, II, RWR, SC), pp. 2657–2666.
ICALP-v2-2012-ChiesaBEP #complexity- Computational Complexity of Traffic Hijacking under BGP and S-BGP (MC, GDB, TE, MP), pp. 476–487.
ICST-2011-TsankovJOS #dynamic analysis #execution- Execution Hijacking: Improving Dynamic Analysis by Flying off Course (PT, WJ, AO, SS), pp. 200–209.
SAC-2010-EgeleBKK #web- CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms (ME, LB, EK, CK), pp. 1865–1870.
HPDC-1999-ZandyML #process- Process Hijacking (VCZ, BPM, ML), pp. 177–184.