Skip to search formSkip to main contentSkip to account menu

Backoff

Known as: Backoff (Malware) 
Backoff is a kind of malware that targets point of sale (POS) systems. It is used to steal credit card data from Point of Sale machines at retail… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Event-driven wireless sensor networks (WSNs) usually operate under light traffic load. However, when an event is detected, a… 
2014
2014
The Constrained Application Protocol (CoAP) is a new Web protocol for the Internet of Things that allows to connect IoT devices… 
Highly Cited
2013
Highly Cited
2013
Machine‐type communications (MTC) are a rapidly growing technology, which is expected to generate significant revenues to mobile… 
2013
2013
Due to a poor understanding of the interactions among transmitters, wireless multihop networks have commonly been stigmatized as… 
2013
2013
Synchronization is a central issue in concurrency and plays an important role in the behavior and performance of modern… 
2006
2006
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing… 
Highly Cited
2006
Highly Cited
2006
In this paper we present the simulation-based performance evaluation and tuning of data dissemination in wireless sensor networks… 
Highly Cited
2001
Highly Cited
2001
This paper investigates optimal power control in a frequency selective multiuser interference network. The power control problem… 
Highly Cited
1999
Highly Cited
1999
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile…