Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,053 papers from all fields of science
Search
Sign In
Create Free Account
Backoff
Known as:
Backoff (Malware)
Backoff is a kind of malware that targets point of sale (POS) systems. It is used to steal credit card data from Point of Sale machines at retail…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cyber security standards
Malware
Memory-scraping malware
Point of sale
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Congestion control for CoAP cloud services
A. Betzler
,
Carles Gomez
,
I. Demirkol
,
Matthias Kovatsch
IEEE International Conference on Emerging…
2014
Corpus ID: 11189823
The Constrained Application Protocol (CoAP) is a new Web protocol for the Internet of Things that allows to connect IoT devices…
Expand
Highly Cited
2013
Highly Cited
2013
Impact of machine‐type communications on energy and delay performance of random access channel in LTE‐advanced
M. Gerasimenko
,
Vitaly Petrov
,
O. Galinina
,
Sergey D. Andreev
,
Y. Koucheryavy
Transactions on Emerging Telecommunications…
2013
Corpus ID: 1054944
Machine‐type communications (MTC) are a rapidly growing technology, which is expected to generate significant revenues to mobile…
Expand
2013
2013
On the capacity of wireless CSMA/CA multihop networks
R. Laufer
,
L. Kleinrock
Proceedings IEEE INFOCOM
2013
Corpus ID: 15939771
Due to a poor understanding of the interactions among transmitters, wireless multihop networks have commonly been stigmatized as…
Expand
2013
2013
A Study of the Behavior of Synchronization Methods in Commonly Used Languages and Systems
Daniel Cederman
,
Bapi Chatterjee
,
Nhan Nguyen Dang
,
Y. Nikolakopoulos
,
M. Papatriantafilou
,
P. Tsigas
IEEE 27th International Symposium on Parallel and…
2013
Corpus ID: 5981991
Synchronization is a central issue in concurrency and plays an important role in the behavior and performance of modern…
Expand
Highly Cited
2012
Highly Cited
2012
Coverage and connectivity guaranteed topology control algorithm for cluster-based wireless sensor networks
Ning Xu
,
Aiping Huang
,
Ting-Wei Hou
,
Hsiao-Hwa Chen
Wireless Communications and Mobile Computing
2012
Corpus ID: 206547525
One of the most challenging issues in wireless sensor networks is to meet the requirements of coverage and connectivity under…
Expand
2006
2006
Ripple: a wireless token-passing protocol for multi-hop wireless mesh networks
R. Cheng
,
Cun-Yi Wang
,
L. Liao
,
Jen-Shun Yang
IEEE Communications Letters
2006
Corpus ID: 1966975
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing…
Expand
Highly Cited
2006
Highly Cited
2006
WLC10-5: Performance Analysis of Slotted Carrier Sense IEEE 802.15.4 Medium Access Layer
S. Pollin
,
M. Ergen
,
+6 authors
P. Varaiya
IEEE Globecom
2006
Corpus ID: 14974390
The IEEE 802.15.4 standard defines the medium access control (MAC) and physical layer for sensor networks. One of the MAC schemes…
Expand
Highly Cited
2006
Highly Cited
2006
IN WIRELESS SENSOR NETWORKS
Jeongkeun Lee
,
Kideok Cho
,
Seungjae Lee
,
Taekyoung Kwon
,
Yanghee Choi
2006
Corpus ID: 14442246
In this paper we present the simulation-based performance evaluation and tuning of data dissemination in wireless sensor networks…
Expand
2004
2004
Distributed protocols for ad hoc wireless LANs: a learning-automata-based approach
Petros Nicopolitidis
,
G. Papadimitriou
,
A. Pomportsis
Ad hoc networks
2004
Corpus ID: 205286960
2003
2003
Constant envelope binary OFDM phase modulation
Steve
,
C.
,
+4 authors
J. Zeidler
IEEE Military Communications Conference, . MILCOM…
2003
Corpus ID: 3256769
hi this paper a new approach is presented to alleviate the undesirable effects due to the high peak-to-average power ratio of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE