Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,976,002 papers from all fields of science
Search
Sign In
Create Free Account
Backoff
Known as:
Backoff (Malware)
Backoff is a kind of malware that targets point of sale (POS) systems. It is used to steal credit card data from Point of Sale machines at retail…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cyber security standards
Malware
Memory-scraping malware
Point of sale
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
RC-MAC: A Receiver-Centric MAC Protocol for Event-Driven Wireless Sensor Networks
Pei Huang
,
Chen Wang
,
Li Xiao
IEEE transactions on computers
2015
Corpus ID: 40539202
Event-driven wireless sensor networks (WSNs) usually operate under light traffic load. However, when an event is detected, a…
Expand
2014
2014
Congestion control for CoAP cloud services
A. Betzler
,
Carles Gomez
,
I. Demirkol
,
Matthias Kovatsch
IEEE International Conference on Emerging…
2014
Corpus ID: 11189823
The Constrained Application Protocol (CoAP) is a new Web protocol for the Internet of Things that allows to connect IoT devices…
Expand
Highly Cited
2013
Highly Cited
2013
Impact of machine‐type communications on energy and delay performance of random access channel in LTE‐advanced
M. Gerasimenko
,
Vitaly Petrov
,
O. Galinina
,
Sergey D. Andreev
,
Y. Koucheryavy
Transactions on Emerging Telecommunications…
2013
Corpus ID: 1054944
Machine‐type communications (MTC) are a rapidly growing technology, which is expected to generate significant revenues to mobile…
Expand
2013
2013
On the capacity of wireless CSMA/CA multihop networks
R. Laufer
,
L. Kleinrock
Proceedings IEEE INFOCOM
2013
Corpus ID: 15939771
Due to a poor understanding of the interactions among transmitters, wireless multihop networks have commonly been stigmatized as…
Expand
2013
2013
A Study of the Behavior of Synchronization Methods in Commonly Used Languages and Systems
Daniel Cederman
,
Bapi Chatterjee
,
Nhan Nguyen Dang
,
Y. Nikolakopoulos
,
M. Papatriantafilou
,
P. Tsigas
IEEE 27th International Symposium on Parallel and…
2013
Corpus ID: 5981991
Synchronization is a central issue in concurrency and plays an important role in the behavior and performance of modern…
Expand
2006
2006
Ripple: a wireless token-passing protocol for multi-hop wireless mesh networks
R. Cheng
,
Cun-Yi Wang
,
L. Liao
,
Jen-Shun Yang
IEEE Communications Letters
2006
Corpus ID: 1966975
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing…
Expand
Highly Cited
2006
Highly Cited
2006
IN WIRELESS SENSOR NETWORKS
Jeongkeun Lee
,
Kideok Cho
,
Seungjae Lee
,
Taekyoung Kwon
,
Yanghee Choi
2006
Corpus ID: 14442246
In this paper we present the simulation-based performance evaluation and tuning of data dissemination in wireless sensor networks…
Expand
2004
2004
Distributed protocols for ad hoc wireless LANs: a learning-automata-based approach
Petros Nicopolitidis
,
G. Papadimitriou
,
A. Pomportsis
Ad hoc networks
2004
Corpus ID: 205286960
Highly Cited
2001
Highly Cited
2001
An adaptive multiuser power control algorithm for VDSL
Wei Yu
,
G. Ginis
,
J. Cioffi
GLOBECOM'01. IEEE Global Telecommunications…
2001
Corpus ID: 8875507
This paper investigates optimal power control in a frequency selective multiuser interference network. The power control problem…
Expand
Highly Cited
1999
Highly Cited
1999
Impact of routing and link layers on TCP performance in mobile ad hoc networks
G. Holland
,
N. Vaidya
WCNC. IEEE Wireless Communications and…
1999
Corpus ID: 14913867
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE