Skip to search formSkip to main contentSkip to account menu

Backoff

Known as: Backoff (Malware) 
Backoff is a kind of malware that targets point of sale (POS) systems. It is used to steal credit card data from Point of Sale machines at retail… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Event-driven wireless sensor networks (WSNs) usually operate under light traffic load. However, when an event is detected, a… 
2014
2014
The Constrained Application Protocol (CoAP) is a new Web protocol for the Internet of Things that allows to connect IoT devices… 
Highly Cited
2013
Highly Cited
2013
Machine‐type communications (MTC) are a rapidly growing technology, which is expected to generate significant revenues to mobile… 
2013
2013
Synchronization is a central issue in concurrency and plays an important role in the behavior and performance of modern… 
2008
2008
The deployment of a wireless control system must cope with a number of effects usually negligible in a wired scenario. To this… 
Review
2007
Review
2007
The Factored Language Model (FLM) is a e xible framework for incorporating various information sources, such as morphology and… 
2006
2006
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing… 
2004
2004
This paper introduces an analytical approach for the analysis of medium access protocols of the CSMA type, which are used in many… 
Highly Cited
1999
Highly Cited
1999
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile…