Ethical Hacking: White Hat Hackers Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.52458/978-81-95502-01-1-2
Nowadays the demand for Computers and Smart phones has increased so much that people cannot complete their work except these two things. Whether we do our own business or work in a company or bank, computers are used everywhere. To run a company or to run a business, it is necessary to use a computer because with its help we do a lot of work and calculations in a few minutes. Similarly, to how minor and large obstacles must be overcome in order to complete any assignment, many problems must be overcome when dealing with computers. For decades, hacking has been a huge part of the computing world. It is a large field that encompasses a wide range of issues. If we first determine when this hacking occurred, we will learn that it was first utilized in 1960 by MIT, and that at the same time, the term "hacker" was coined and later became well-known.
Related Topics
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.52458/978-81-95502-01-1-2
- https://www.publications.scrs.in/uploads/final_menuscript/d92673ff24c67210309adfdf7a48387c.pdf
- OA Status
- bronze
- Cited By
- 2
- References
- 8
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4315706032
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4315706032Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.52458/978-81-95502-01-1-2Digital Object Identifier
- Title
-
Ethical Hacking: White Hat HackersWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-01-01Full publication date if available
- Authors
-
Vikram Kumawat, Priyanshi Pal, Pradeep Kumar JhaList of authors in order
- Landing page
-
https://doi.org/10.52458/978-81-95502-01-1-2Publisher landing page
- PDF URL
-
https://www.publications.scrs.in/uploads/final_menuscript/d92673ff24c67210309adfdf7a48387c.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://www.publications.scrs.in/uploads/final_menuscript/d92673ff24c67210309adfdf7a48387c.pdfDirect OA link when available
- Concepts
-
Hacker, Computer science, Computer security, Order (exchange), Work (physics), Internet privacy, Engineering, Business, Finance, Mechanical engineeringTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 2Per-year citation counts (last 5 years)
- References (count)
-
8Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4315706032 |
|---|---|
| doi | https://doi.org/10.52458/978-81-95502-01-1-2 |
| ids.doi | https://doi.org/10.52458/978-81-95502-01-1-2 |
| ids.openalex | https://openalex.org/W4315706032 |
| fwci | 1.78206511 |
| type | book-chapter |
| title | Ethical Hacking: White Hat Hackers |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 17 |
| biblio.first_page | 13 |
| topics[0].id | https://openalex.org/T10734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.8700000047683716 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Information and Cyber Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C86844869 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9702680110931396 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q2798820 |
| concepts[0].display_name | Hacker |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.572907567024231 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5620788335800171 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C182306322 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5025968551635742 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1779371 |
| concepts[3].display_name | Order (exchange) |
| concepts[4].id | https://openalex.org/C18762648 |
| concepts[4].level | 2 |
| concepts[4].score | 0.48839038610458374 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q42213 |
| concepts[4].display_name | Work (physics) |
| concepts[5].id | https://openalex.org/C108827166 |
| concepts[5].level | 1 |
| concepts[5].score | 0.35072949528694153 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[5].display_name | Internet privacy |
| concepts[6].id | https://openalex.org/C127413603 |
| concepts[6].level | 0 |
| concepts[6].score | 0.30045926570892334 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[6].display_name | Engineering |
| concepts[7].id | https://openalex.org/C144133560 |
| concepts[7].level | 0 |
| concepts[7].score | 0.20342519879341125 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[7].display_name | Business |
| concepts[8].id | https://openalex.org/C10138342 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0687616765499115 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q43015 |
| concepts[8].display_name | Finance |
| concepts[9].id | https://openalex.org/C78519656 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q101333 |
| concepts[9].display_name | Mechanical engineering |
| keywords[0].id | https://openalex.org/keywords/hacker |
| keywords[0].score | 0.9702680110931396 |
| keywords[0].display_name | Hacker |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.572907567024231 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.5620788335800171 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/order |
| keywords[3].score | 0.5025968551635742 |
| keywords[3].display_name | Order (exchange) |
| keywords[4].id | https://openalex.org/keywords/work |
| keywords[4].score | 0.48839038610458374 |
| keywords[4].display_name | Work (physics) |
| keywords[5].id | https://openalex.org/keywords/internet-privacy |
| keywords[5].score | 0.35072949528694153 |
| keywords[5].display_name | Internet privacy |
| keywords[6].id | https://openalex.org/keywords/engineering |
| keywords[6].score | 0.30045926570892334 |
| keywords[6].display_name | Engineering |
| keywords[7].id | https://openalex.org/keywords/business |
| keywords[7].score | 0.20342519879341125 |
| keywords[7].display_name | Business |
| keywords[8].id | https://openalex.org/keywords/finance |
| keywords[8].score | 0.0687616765499115 |
| keywords[8].display_name | Finance |
| language | en |
| locations[0].id | doi:10.52458/978-81-95502-01-1-2 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306489707 |
| locations[0].source.issn | |
| locations[0].source.type | ebook platform |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Soft Computing Research Society eBooks |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://www.publications.scrs.in/uploads/final_menuscript/d92673ff24c67210309adfdf7a48387c.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | SCRS Proceedings of International Conference of Undergraduate Students |
| locations[0].landing_page_url | https://doi.org/10.52458/978-81-95502-01-1-2 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5060183731 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Vikram Kumawat |
| authorships[0].affiliations[0].raw_affiliation_string | Department of CSE, Arya College of Engineering Research Centre, Jaipur, Ra-jasthan, India |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Vikram Kumawat |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Department of CSE, Arya College of Engineering Research Centre, Jaipur, Ra-jasthan, India |
| authorships[1].author.id | https://openalex.org/A5063570144 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Priyanshi Pal |
| authorships[1].affiliations[0].raw_affiliation_string | Department of CSE, Arya College of Engineering Research Centre, Jaipur, Ra-jasthan, India |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Priyanshi Pal |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of CSE, Arya College of Engineering Research Centre, Jaipur, Ra-jasthan, India |
| authorships[2].author.id | https://openalex.org/A5045636935 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2289-1513 |
| authorships[2].author.display_name | Pradeep Kumar Jha |
| authorships[2].affiliations[0].raw_affiliation_string | Department of CSE, Arya College of Engineering Research Centre, Jaipur, Ra-jasthan, India |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Pradeep Jha |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of CSE, Arya College of Engineering Research Centre, Jaipur, Ra-jasthan, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.publications.scrs.in/uploads/final_menuscript/d92673ff24c67210309adfdf7a48387c.pdf |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Ethical Hacking: White Hat Hackers |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.8700000047683716 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Information and Cyber Security |
| related_works | https://openalex.org/W68680640, https://openalex.org/W2371430952, https://openalex.org/W3011977641, https://openalex.org/W2991390974, https://openalex.org/W3005222456, https://openalex.org/W4281843594, https://openalex.org/W2181649187, https://openalex.org/W2499292486, https://openalex.org/W2884195742, https://openalex.org/W4377970504 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 2 |
| locations_count | 1 |
| best_oa_location.id | doi:10.52458/978-81-95502-01-1-2 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306489707 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | ebook platform |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Soft Computing Research Society eBooks |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://www.publications.scrs.in/uploads/final_menuscript/d92673ff24c67210309adfdf7a48387c.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | SCRS Proceedings of International Conference of Undergraduate Students |
| best_oa_location.landing_page_url | https://doi.org/10.52458/978-81-95502-01-1-2 |
| primary_location.id | doi:10.52458/978-81-95502-01-1-2 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306489707 |
| primary_location.source.issn | |
| primary_location.source.type | ebook platform |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Soft Computing Research Society eBooks |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://www.publications.scrs.in/uploads/final_menuscript/d92673ff24c67210309adfdf7a48387c.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | SCRS Proceedings of International Conference of Undergraduate Students |
| primary_location.landing_page_url | https://doi.org/10.52458/978-81-95502-01-1-2 |
| publication_date | 2023-01-01 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2223480334, https://openalex.org/W2614108187, https://openalex.org/W2270658095, https://openalex.org/W3008635579, https://openalex.org/W6752508393, https://openalex.org/W2024782638, https://openalex.org/W2810688377, https://openalex.org/W4386251449 |
| referenced_works_count | 8 |
| abstract_inverted_index.a | 31, 41, 46, 53, 61, 68, 101, 110, 115 |
| abstract_inverted_index.If | 120 |
| abstract_inverted_index.It | 108 |
| abstract_inverted_index.To | 39 |
| abstract_inverted_index.at | 142 |
| abstract_inverted_index.be | 79, 90 |
| abstract_inverted_index.by | 138 |
| abstract_inverted_index.do | 24, 60 |
| abstract_inverted_index.in | 30, 67, 81, 136 |
| abstract_inverted_index.is | 49, 109 |
| abstract_inverted_index.it | 48, 132 |
| abstract_inverted_index.of | 63, 104, 118 |
| abstract_inverted_index.or | 28, 33, 43 |
| abstract_inverted_index.so | 10 |
| abstract_inverted_index.to | 44, 51, 72, 83 |
| abstract_inverted_index.we | 23, 59, 121, 128 |
| abstract_inverted_index.For | 96 |
| abstract_inverted_index.and | 5, 65, 75, 140, 151 |
| abstract_inverted_index.any | 85 |
| abstract_inverted_index.are | 36 |
| abstract_inverted_index.few | 69 |
| abstract_inverted_index.for | 3 |
| abstract_inverted_index.has | 8, 99 |
| abstract_inverted_index.how | 73 |
| abstract_inverted_index.its | 57 |
| abstract_inverted_index.lot | 62 |
| abstract_inverted_index.our | 25 |
| abstract_inverted_index.own | 26 |
| abstract_inverted_index.run | 40, 45 |
| abstract_inverted_index.the | 1, 105, 143, 146 |
| abstract_inverted_index.two | 20 |
| abstract_inverted_index.use | 52 |
| abstract_inverted_index.was | 133, 149 |
| abstract_inverted_index.1960 | 137 |
| abstract_inverted_index.MIT, | 139 |
| abstract_inverted_index.been | 100 |
| abstract_inverted_index.help | 58 |
| abstract_inverted_index.huge | 102 |
| abstract_inverted_index.many | 87 |
| abstract_inverted_index.much | 11 |
| abstract_inverted_index.must | 78, 89 |
| abstract_inverted_index.part | 103 |
| abstract_inverted_index.same | 144 |
| abstract_inverted_index.term | 147 |
| abstract_inverted_index.that | 12, 113, 131, 141 |
| abstract_inverted_index.this | 125 |
| abstract_inverted_index.used | 37 |
| abstract_inverted_index.when | 92, 124 |
| abstract_inverted_index.wide | 116 |
| abstract_inverted_index.will | 129 |
| abstract_inverted_index.with | 56, 94 |
| abstract_inverted_index.work | 17, 29, 64 |
| abstract_inverted_index.Smart | 6 |
| abstract_inverted_index.bank, | 34 |
| abstract_inverted_index.field | 112 |
| abstract_inverted_index.first | 122, 134 |
| abstract_inverted_index.large | 76, 111 |
| abstract_inverted_index.later | 152 |
| abstract_inverted_index.learn | 130 |
| abstract_inverted_index.minor | 74 |
| abstract_inverted_index.order | 82 |
| abstract_inverted_index.range | 117 |
| abstract_inverted_index.their | 16 |
| abstract_inverted_index.these | 19 |
| abstract_inverted_index.time, | 145 |
| abstract_inverted_index.became | 153 |
| abstract_inverted_index.cannot | 14 |
| abstract_inverted_index.coined | 150 |
| abstract_inverted_index.demand | 2 |
| abstract_inverted_index.except | 18 |
| abstract_inverted_index.people | 13 |
| abstract_inverted_index.phones | 7 |
| abstract_inverted_index.world. | 107 |
| abstract_inverted_index.Whether | 22 |
| abstract_inverted_index.because | 55 |
| abstract_inverted_index.company | 32, 42 |
| abstract_inverted_index.dealing | 93 |
| abstract_inverted_index.hacking | 98, 126 |
| abstract_inverted_index.issues. | 119 |
| abstract_inverted_index.things. | 21 |
| abstract_inverted_index."hacker" | 148 |
| abstract_inverted_index.Nowadays | 0 |
| abstract_inverted_index.business | 27 |
| abstract_inverted_index.complete | 15, 84 |
| abstract_inverted_index.computer | 54 |
| abstract_inverted_index.decades, | 97 |
| abstract_inverted_index.minutes. | 70 |
| abstract_inverted_index.overcome | 80, 91 |
| abstract_inverted_index.problems | 88 |
| abstract_inverted_index.utilized | 135 |
| abstract_inverted_index.Computers | 4 |
| abstract_inverted_index.business, | 47 |
| abstract_inverted_index.computers | 35 |
| abstract_inverted_index.computing | 106 |
| abstract_inverted_index.determine | 123 |
| abstract_inverted_index.increased | 9 |
| abstract_inverted_index.necessary | 50 |
| abstract_inverted_index.obstacles | 77 |
| abstract_inverted_index.occurred, | 127 |
| abstract_inverted_index.Similarly, | 71 |
| abstract_inverted_index.computers. | 95 |
| abstract_inverted_index.assignment, | 86 |
| abstract_inverted_index.encompasses | 114 |
| abstract_inverted_index.everywhere. | 38 |
| abstract_inverted_index.well-known. | 154 |
| abstract_inverted_index.calculations | 66 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 94 |
| corresponding_author_ids | https://openalex.org/A5060183731 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.550000011920929 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.79937659 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |