Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,869,412 papers from all fields of science
Search
Sign In
Create Free Account
Attack (computing)
Known as:
Attack
, Attack (computer)
In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Asset (computer security)
Attack tree
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
A Survey of Various Security Issues in Online Social Networks
M. Milton
,
Joe Assistant
,
B Ramakrishnan
2015
Corpus ID: 12323496
The most emerging communication medium for the last decade of years is Online Social Networks (OSNs). Online Social Network makes…
Expand
2015
2015
EAST: Exploitation of Attacks and System Threats in Network
S. Ahuja
,
R. Johari
,
Chetna Khokhar
2015
Corpus ID: 60123869
In modern era, computer network is an emerging field. With the invention of powerful computer network concepts today we are able…
Expand
Review
2013
Review
2013
A TRUST BASED APPROACH FOR DETECTION AND ISOLATION OF MALICIOUS NODES IN MANET
S. Aravindh
,
Vinoth R
,
V. R
2013
Corpus ID: 3241898
A Mobile Adhoc Network (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Due to the openness in…
Expand
2012
2012
Kernelized Extreme Learning Machine with Levenberg-Marquardt Learning Approach towards Intrusion Detection
V. Jaiganesh
,
P. Sumathi
,
+5 authors
R. Kemmerer
2012
Corpus ID: 9182887
and system security is of vital importance in the present data communication environment. Hackers and intruders can create many…
Expand
2009
2009
Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors
L. Vaitsekhovich
,
V. Golovko
2009
Corpus ID: 2606930
In this article the artificial immune system and neural network techniques for intrusion detection have been addressed. The AIS…
Expand
2007
2007
Investigating Computer Attacks Using Attack Trees
Nayot Poolsapassit
,
I. Ray
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 9087675
System log files contain valuable evidence pertaining to computer attacks. However, the log files are often massive, and much of…
Expand
2007
2007
Secure Routing in Sensor Networks
M. Nikjoo
,
A. Tehrani
,
Priyantha Kumarawadu
Canadian Conference on Electrical and Computer…
2007
Corpus ID: 18263597
In this paper, we present the secure routing in sensor networks. Routing protocols in wireless sensor networks (WSNs) are…
Expand
2004
2004
Computer security and intrusion detection
Khaled Labib
CROS
2004
Corpus ID: 12059414
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break…
Expand
2000
2000
Attacks on and Countermeasures for USB Hardware Token Devices
2000
Corpus ID: 15163687
This paper presents the methods used to attempt access to private data stored in Universal Serial Bus (USB) hardware tokens…
Expand
1998
1998
Image watermarking based on the fractal transform: a draft demonstration
Stéphane Roche
,
J. Dugelay
IEEE Second Workshop on Multimedia Signal…
1998
Corpus ID: 10538282
The aim is to present the ongoing performance of our R and D watermarking scheme software. The proposed illustrations cover a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required