Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,358,913 papers from all fields of science
Search
Sign In
Create Free Account
Attack (computing)
Known as:
Attack
, Attack (computer)
In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Asset (computer security)
Attack tree
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs
Ali Ahmad Abu Romman
,
H. Al-Bahadili
,
K. Hussein
2016
Corpus ID: 51856233
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network…
Expand
2015
2015
EAST: Exploitation of Attacks and System Threats in Network
S. Ahuja
,
R. Johari
,
Chetna Khokhar
2015
Corpus ID: 60123869
In modern era, computer network is an emerging field. With the invention of powerful computer network concepts today we are able…
Expand
Review
2014
Review
2014
A Survey Based on Fingerprint , Face and Iris Biometric Recognition System , Image Quality Assessment and Fake Biometric
Pradnya M. Shende
2014
Corpus ID: 7211133
A biometric system is a computer system .Which is used to identify the person on there behavioral and physiological…
Expand
Review
2013
Review
2013
A TRUST BASED APPROACH FOR DETECTION AND ISOLATION OF MALICIOUS NODES IN MANET
S. Aravindh
,
V. R
,
V. R.
2013
Corpus ID: 3241898
A Mobile Adhoc Network (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Due to the openness in…
Expand
2009
2009
Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors
L. Vaitsekhovich
,
V. Golovko
2009
Corpus ID: 2606930
In this article the artificial immune system and neural network techniques for intrusion detection have been addressed. The AIS…
Expand
2009
2009
On the Computational Complexity of Satisfiability Solving for String Theories
Susmit Jha
,
S. Seshia
,
Rhishikesh Limaye
arXiv.org
2009
Corpus ID: 470113
Satisfiability solvers are increasingly playing a key role in software verification, with particularly effective use in the…
Expand
2007
2007
Investigating Computer Attacks Using Attack Trees
Nayot Poolsapassit
,
I. Ray
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 9087675
System log files contain valuable evidence pertaining to computer attacks. However, the log files are often massive, and much of…
Expand
2007
2007
Secure Routing in Sensor Networks
M. Nikjoo
,
A. Tehrani
,
Priyantha Kumarawadu
Canadian Conference on Electrical and Computer…
2007
Corpus ID: 18263597
In this paper, we present the secure routing in sensor networks. Routing protocols in wireless sensor networks (WSNs) are…
Expand
2004
2004
Computer security and intrusion detection
Khaled Labib
CROS
2004
Corpus ID: 12059414
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break…
Expand
1998
1998
Image watermarking based on the fractal transform: a draft demonstration
Stéphane Roche
,
J. Dugelay
IEEE Second Workshop on Multimedia Signal…
1998
Corpus ID: 10538282
The aim is to present the ongoing performance of our R and D watermarking scheme software. The proposed illustrations cover a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE