Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,275 papers from all fields of science
Search
Sign In
Create Free Account
Antivirus software
Known as:
Virus scan
, Anti-virus product
, A.V. Software
Expand
Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AVG
Antichrist (virus hoax)
Avast Antivirus
BIOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
CloudAV: N-Version Antivirus in the Network Cloud
Jon Oberheide
,
Evan Cooke
,
F. Jahanian
USENIX Security Symposium
2008
Corpus ID: 230550
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the…
Expand
Highly Cited
2008
Highly Cited
2008
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
G. Gu
,
Junjie Zhang
,
Wenke Lee
Network and Distributed System Security Symposium
2008
Corpus ID: 13302792
Botnets are now recognized as one of the most serious security threats. In contrast to previous malware, botnets have the…
Expand
Highly Cited
2006
Highly Cited
2006
Sulfur Isotope Geochemistry of Sulfide Minerals
R. Seal
2006
Corpus ID: 45626822
Sulfur, the 10th most abundant element in the universe and the 14th most abundant element in the Earth’s crust, is the defining…
Expand
Highly Cited
2006
Highly Cited
2006
Carbon respired by terrestrial ecosystems – recent progress and challenges
S. Trumbore
2006
Corpus ID: 55671176
Net ecosystem production is the residual of two much larger fluxes: photosynthesis and respiration. While photosynthesis is a…
Expand
Highly Cited
2002
Highly Cited
2002
A Signature Scheme with Efficient Protocols
J. Camenisch
,
Anna Lysyanskaya
International Conference on Security and…
2002
Corpus ID: 2745008
Digital signature schemes are a fundamental cryptographic primitive, of use both in its own right, and as a building block in…
Expand
Highly Cited
2001
Highly Cited
2001
How to Leak a Secret: Theory and Applications of Ring Signatures
R. Rivest
,
A. Shamir
,
Y. Kalai
Essays in Memory of Shimon Even
2001
Corpus ID: 10642507
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without…
Expand
Highly Cited
2001
Highly Cited
2001
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
Marc Langheinrich
Ubiquitous Computing
2001
Corpus ID: 1069784
This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six…
Expand
Highly Cited
1998
Highly Cited
1998
A distributed trust model
A. Abdul-Rahman
,
S. Hailes
New Security Paradigms Workshop
1998
Corpus ID: 18218821
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction…
Expand
Review
1996
Review
1996
PayWord and MicroMint: Two Simple Micropayment Schemes
R. Rivest
,
A. Shamir
Security Protocols Workshop
1996
Corpus ID: 3219009
1 Introduction ~Ve present two simple micropayment schemes, "PayWord" and :'MicroMint," for making small purchases over the…
Expand
Highly Cited
1993
Highly Cited
1993
Texture Classification by Wavelet Packet Signatures
A. Laine
,
Jian Fan
IAPR International Workshop on Machine Vision…
1993
Corpus ID: 10248592
This correspondence introduces a new approach to characterize textures at multiple scales. The performance of wavelet packet…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE