BNC

Known as: JBouncer, PsyBNC, IRC bouncer 
A BNC (short for bouncer) is a piece of software that is used to relay traffic and connections in computer networks, much like a proxy. Using a BNC… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2017
024619972017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
To protect Android users, researchers have been analyzing unknown, potentially-malicious applications by using systems based on… (More)
  • figure 1
  • figure 2
  • table 1
  • table 3
  • figure 3
Is this relevant?
2015
2015
Recent years have seen the development of a multitude of tools for the security analysis of Android applications. A major deficit… (More)
  • figure 1
  • figure 2
Is this relevant?
2015
2015
In the work at hand, we first demonstrate that Android malware can bypass current automated analysis systems, including AV… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2014
2014
In this paper, we demonstrate that Android malware can bypass all automated analysis systems, including AV solutions, mobile… (More)
  • figure 1
Is this relevant?
2013
2013
Modern accelerator driven experiments like linear colliders or spallation sources are supplied by RF amplifiers using klystrons… (More)
Is this relevant?
2013
2013
The increasing presence of privacy violating apps in app marketplaces poses a significant privacy risk for smartphone users… (More)
  • table 4
  • table 5
  • table 6
  • table 7
Is this relevant?
2012
2012
1. Abstract As with most other mobile operating systems, security is a great concern for Google’s Android. It runs on an open… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
2008
2008
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation… (More)
Is this relevant?
2005
2005
Peer-to-peer (P2P) security has received a lot of attention as of late. Most prior work focused almost entirely on issues related… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 5
Is this relevant?