Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,275,345 papers from all fields of science
Search
Sign In
Create Free Account
Antivirus software
Known as:
Virus scan
, Anti-virus product
, A.V. Software
Expand
Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AVG
Antichrist (virus hoax)
Avast Antivirus
BIOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Planck2018 results
Planck Collaboration N. Aghanim
,
Y. Akrami
,
+151 authors
A. Zonca
Astronomy & Astrophysics
2018
Corpus ID: 118988711
Observations of the submillimetre emission from Galactic dust, in both total intensityIand polarization, have received tremendous…
Expand
Highly Cited
2012
Highly Cited
2012
Dissecting Android Malware: Characterization and Evolution
Yajin Zhou
,
Xuxian Jiang
IEEE Symposium on Security and Privacy
2012
Corpus ID: 206578712
The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular…
Expand
Review
2012
Review
2012
Hyperspectral Unmixing Overview: Geometrical, Statistical, and Sparse Regression-Based Approaches
J. Bioucas-Dias
,
A. Plaza
,
+4 authors
J. Chanussot
IEEE Journal of Selected Topics in Applied Earth…
2012
Corpus ID: 11112426
Imaging spectrometers measure electromagnetic energy scattered in their instantaneous field view in hundreds or thousands of…
Expand
Highly Cited
2008
Highly Cited
2008
CloudAV: N-Version Antivirus in the Network Cloud
Jon Oberheide
,
Evan Cooke
,
F. Jahanian
USENIX Security Symposium
2008
Corpus ID: 230550
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the…
Expand
Review
2001
Review
2001
Short Signatures from the Weil Pairing
D. Boneh
,
Ben Lynn
,
H. Shacham
Journal of Cryptology
2001
Corpus ID: 929219
Abstract We introduce a short signature scheme based on the Computational Diffie–Hellman assumption on certain elliptic and…
Expand
Highly Cited
1999
Highly Cited
1999
Carbon and hydrogen isotope systematics of bacterial formation and oxidation of methane
M. Whiticar
1999
Corpus ID: 53417651
Highly Cited
1992
Highly Cited
1992
Nonintrusive appliance load monitoring
G. Hart
Proceedings of the IEEE
1992
Corpus ID: 61815901
A nonintrusive appliance load monitor that determines the energy consumption of individual appliances turning on and off in an…
Expand
Highly Cited
1991
Highly Cited
1991
Group Signatures
D. Chaum
,
E. V. Heyst
International Conference on the Theory and…
1991
Corpus ID: 970624
In this paper we present a new type of signature for a group of persons, called a group signature, which has the following…
Expand
Highly Cited
1988
Highly Cited
1988
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
S. Goldwasser
,
S. Micali
,
R. Rivest
SIAM journal on computing (Print)
1988
Corpus ID: 1715998
We present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the…
Expand
Highly Cited
1981
Highly Cited
1981
Untraceable electronic mail, return addresses, and digital pseudonyms
Arnold L. Rosenberg
CACM
1981
Corpus ID: 30340230
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required