Skip to search formSkip to main contentSkip to account menu

Backoff

Known as: Backoff (Malware) 
Backoff is a kind of malware that targets point of sale (POS) systems. It is used to steal credit card data from Point of Sale machines at retail… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The Constrained Application Protocol (CoAP) is a new Web protocol for the Internet of Things that allows to connect IoT devices… 
Highly Cited
2013
Highly Cited
2013
Machine‐type communications (MTC) are a rapidly growing technology, which is expected to generate significant revenues to mobile… 
2013
2013
Due to a poor understanding of the interactions among transmitters, wireless multihop networks have commonly been stigmatized as… 
2013
2013
Synchronization is a central issue in concurrency and plays an important role in the behavior and performance of modern… 
Highly Cited
2012
Highly Cited
2012
One of the most challenging issues in wireless sensor networks is to meet the requirements of coverage and connectivity under… 
2006
2006
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing… 
Highly Cited
2006
Highly Cited
2006
The IEEE 802.15.4 standard defines the medium access control (MAC) and physical layer for sensor networks. One of the MAC schemes… 
Highly Cited
2006
Highly Cited
2006
In this paper we present the simulation-based performance evaluation and tuning of data dissemination in wireless sensor networks… 
2003
2003
  • SteveC. J. Zeidler
  • 2003
  • Corpus ID: 3256769
hi this paper a new approach is presented to alleviate the undesirable effects due to the high peak-to-average power ratio of…