Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,231,434 papers from all fields of science
Search
Sign In
Create Free Account
Attack (computing)
Known as:
Attack
, Attack (computer)
In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Asset (computer security)
Attack tree
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
EAST: Exploitation of Attacks and System Threats in Network
S. Ahuja
,
R. Johari
,
Chetna Khokhar
2015
Corpus ID: 60123869
In modern era, computer network is an emerging field. With the invention of powerful computer network concepts today we are able…
Expand
Review
2013
Review
2013
A TRUST BASED APPROACH FOR DETECTION AND ISOLATION OF MALICIOUS NODES IN MANET
S. Aravindh
,
V. R
,
V. R.
2013
Corpus ID: 3241898
A Mobile Adhoc Network (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Due to the openness in…
Expand
2013
2013
Scalable hardware monitors to protect network processors from data plane attacks
Kekai Hu
,
Harikrishnan Chandrikakutty
,
R. Tessier
,
T. Wolf
IEEE Conference on Communications and Network…
2013
Corpus ID: 6905201
Modern router hardware in computer networks is based on programmable network processors, which implement various packet…
Expand
2009
2009
Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors
L. Vaitsekhovich
,
V. Golovko
2009
Corpus ID: 2606930
In this article the artificial immune system and neural network techniques for intrusion detection have been addressed. The AIS…
Expand
2007
2007
Investigating Computer Attacks Using Attack Trees
Nayot Poolsapassit
,
I. Ray
IFIP Int. Conf. Digital Forensics
2007
Corpus ID: 9087675
System log files contain valuable evidence pertaining to computer attacks. However, the log files are often massive, and much of…
Expand
2007
2007
Secure Routing in Sensor Networks
M. Nikjoo
,
A. Tehrani
,
Priyantha Kumarawadu
Canadian Conference on Electrical and Computer…
2007
Corpus ID: 18263597
In this paper, we present the secure routing in sensor networks. Routing protocols in wireless sensor networks (WSNs) are…
Expand
2007
2007
Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation
Dominic White
2007
Corpus ID: 169483319
This document aims to provide a complete discussion on vulnerability and patch management. The first chapters look at the trends…
Expand
2004
2004
Computer security and intrusion detection
Khaled Labib
CROS
2004
Corpus ID: 12059414
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break…
Expand
2000
2000
Attacks on and Countermeasures for USB Hardware Token Devices
2000
Corpus ID: 15163687
This paper presents the methods used to attempt access to private data stored in Universal Serial Bus (USB) hardware tokens…
Expand
1998
1998
Image watermarking based on the fractal transform: a draft demonstration
Stéphane Roche
,
J. Dugelay
IEEE Second Workshop on Multimedia Signal…
1998
Corpus ID: 10538282
The aim is to present the ongoing performance of our R and D watermarking scheme software. The proposed illustrations cover a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE