Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,407,922 papers from all fields of science
Search
Sign In
Create Free Account
Backoff
Known as:
Backoff (Malware)
Backoff is a kind of malware that targets point of sale (POS) systems. It is used to steal credit card data from Point of Sale machines at retail…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Cyber security standards
Malware
Memory-scraping malware
Point of sale
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
RC-MAC: A Receiver-Centric MAC Protocol for Event-Driven Wireless Sensor Networks
Pei Huang
,
Chen Wang
,
Li Xiao
IEEE transactions on computers
2015
Corpus ID: 40539202
Event-driven wireless sensor networks (WSNs) usually operate under light traffic load. However, when an event is detected, a…
Expand
2014
2014
Congestion control for CoAP cloud services
A. Betzler
,
Carles Gomez
,
I. Demirkol
,
Matthias Kovatsch
IEEE International Conference on Emerging…
2014
Corpus ID: 11189823
The Constrained Application Protocol (CoAP) is a new Web protocol for the Internet of Things that allows to connect IoT devices…
Expand
Highly Cited
2013
Highly Cited
2013
Impact of machine‐type communications on energy and delay performance of random access channel in LTE‐advanced
M. Gerasimenko
,
Vitaly Petrov
,
O. Galinina
,
Sergey D. Andreev
,
Y. Koucheryavy
Transactions on Emerging Telecommunications…
2013
Corpus ID: 1054944
Machine‐type communications (MTC) are a rapidly growing technology, which is expected to generate significant revenues to mobile…
Expand
2013
2013
A Study of the Behavior of Synchronization Methods in Commonly Used Languages and Systems
Daniel Cederman
,
Bapi Chatterjee
,
Nhan Nguyen Dang
,
Y. Nikolakopoulos
,
M. Papatriantafilou
,
P. Tsigas
IEEE 27th International Symposium on Parallel and…
2013
Corpus ID: 5981991
Synchronization is a central issue in concurrency and plays an important role in the behavior and performance of modern…
Expand
2008
2008
Is CSMA/CA really efficient against interference in a wireless control system? An experimental answer
Matteo Bertocco
,
G. Gamba
,
A. Sona
IEEE International Conference on Emerging…
2008
Corpus ID: 6557810
The deployment of a wireless control system must cope with a number of effects usually negligible in a wired scenario. To this…
Expand
Review
2007
Review
2007
Factored Language Models Tutorial
K. Kirchhoff
,
J. Bilmes
,
Kevin Duh
2007
Corpus ID: 9487274
The Factored Language Model (FLM) is a e xible framework for incorporating various information sources, such as morphology and…
Expand
2006
2006
Ripple: a wireless token-passing protocol for multi-hop wireless mesh networks
R. Cheng
,
Cun-Yi Wang
,
L. Liao
,
Jen-Shun Yang
IEEE Communications Letters
2006
Corpus ID: 1966975
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing…
Expand
2004
2004
Distributed protocols for ad hoc wireless LANs: a learning-automata-based approach
Petros Nicopolitidis
,
G. Papadimitriou
,
A. Pomportsis
Ad hoc networks
2004
Corpus ID: 205286960
2004
2004
Analytical analysis of access-schemes of the CSMA type
P. Buchholz
,
J. Plonnigs
IEEE International Workshop on Factory…
2004
Corpus ID: 3087948
This paper introduces an analytical approach for the analysis of medium access protocols of the CSMA type, which are used in many…
Expand
Highly Cited
1999
Highly Cited
1999
Impact of routing and link layers on TCP performance in mobile ad hoc networks
G. Holland
,
N. Vaidya
WCNC. IEEE Wireless Communications and…
1999
Corpus ID: 14913867
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE