Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,358,706 papers from all fields of science
Search
Sign In
Create Free Account
Attack (computing)
Known as:
Attack
, Attack (computer)
In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Asset (computer security)
Attack tree
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
A Survey of Various Security Issues in Online Social Networks
M. Milton
,
Joe Assistant
,
B Ramakrishnan
2015
Corpus ID: 12323496
The most emerging communication medium for the last decade of years is Online Social Networks (OSNs). Online Social Network makes…
Expand
2015
2015
EAST: Exploitation of Attacks and System Threats in Network
S. Ahuja
,
R. Johari
,
Chetna Khokhar
2015
Corpus ID: 60123869
In modern era, computer network is an emerging field. With the invention of powerful computer network concepts today we are able…
Expand
Highly Cited
2011
Highly Cited
2011
Cascading Failure Tolerance of Modular Small-World Networks
Mahmoudreza Babaei
,
H. Ghasemieh
,
M. Jalili
IEEE Transactions on Circuits and Systems - II…
2011
Corpus ID: 23167630
Many real-world networks have a modular structure, and their component may undergo random errors and/or intentional attacks. More…
Expand
2009
2009
Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture
Q. Nguyen
,
A. Sood
2009
Corpus ID: 17410230
Many institutions rely on open systems to provide services to the public via the Internet. Unanticipated software vulnerabilities…
Expand
2009
2009
Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors
L. Vaitsekhovich
,
V. Golovko
2009
Corpus ID: 2606930
In this article the artificial immune system and neural network techniques for intrusion detection have been addressed. The AIS…
Expand
2007
2007
Investigating Computer Attacks Using Attack Trees
Nayot Poolsapassit
,
I. Ray
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 9087675
System log files contain valuable evidence pertaining to computer attacks. However, the log files are often massive, and much of…
Expand
2007
2007
Secure Routing in Sensor Networks
M. Nikjoo
,
A. Tehrani
,
Priyantha Kumarawadu
Canadian Conference on Electrical and Computer…
2007
Corpus ID: 18263597
In this paper, we present the secure routing in sensor networks. Routing protocols in wireless sensor networks (WSNs) are…
Expand
2004
2004
Computer security and intrusion detection
Khaled Labib
CROS
2004
Corpus ID: 12059414
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break…
Expand
2000
2000
Attacks on and Countermeasures for USB Hardware Token Devices
2000
Corpus ID: 15163687
This paper presents the methods used to attempt access to private data stored in Universal Serial Bus (USB) hardware tokens…
Expand
1987
1987
Male mating territory and sneaking in a maternal mouthbrooder,Pseudosimochromis curvifrons (Pisces; Cichlidae)
T. Kuwamura
Journal of ethology
1987
Corpus ID: 30361170
Sneaking, a male mating behavior alternative to defending a territory, is known in various kinds of fishes (Gross 1984; Magurran…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE