Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,604,168 papers from all fields of science
Search
Sign In
Create Free Account
Computer security
Known as:
Computer security and identity theft
, Compsec
, Cyber security expert
Expand
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Aircraft Communications Addressing and Reporting System
Anti-worm
Arbitrary code execution
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
ARM Hardware Plaform for Vehicular Monitoring and Tracking
Saurabh Chakole
,
An Autonomous
,
+4 authors
Asst Y A Suryawanshi
International Conference on Communication Systems…
2013
Corpus ID: 15641803
Design of Vehicular monitoring and tracking system based on ARM using GSM and GPM is proposed. The vehicular module is used to…
Expand
Highly Cited
2007
Highly Cited
2007
Towards Graph Containment Search and Indexing
Cheng Chen
,
Xifeng Yan
,
Philip S. Yu
,
Jiawei Han
,
Dong-Qing Zhang
,
Xiaohui Gu
Very Large Data Bases Conference
2007
Corpus ID: 1803605
Given a set of model graphs D and a query graph q, containment search aims to find all model graphs g e D such that q contains g…
Expand
Review
2006
Review
2006
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem
E. Caballero
2006
Corpus ID: 15139585
intrusion detection systems is one of the most active fields of research in Mobile Ad-hoc Network’s (MANET) field. This systems…
Expand
2005
2005
Hoc Networks
2005
Corpus ID: 10331725
Highly Cited
2004
Highly Cited
2004
Understanding Web applications through dynamic analysis
G. Antoniol
,
M. D. Penta
,
M. Zazzara
Proceedings. 12th IEEE International Workshop on…
2004
Corpus ID: 8727286
The relevance and pervasiveness of Web applications as a vital part of modern enterprise systems has significantly increased in…
Expand
2004
2004
A Novel Framework for Alert Correlation and Understanding
Dong Yu
,
D. Frincke
International Conference on Applied Cryptography…
2004
Corpus ID: 958372
We propose a novel framework named Hidden Colored Petri-Net for Alert Correlation and Understanding (HCPN-ACU) in intrusion…
Expand
Highly Cited
2004
Highly Cited
2004
Technology factors in corporate adoption of mobile cell phones: a case study analysis
G. Roberts
,
J. Pick
37th Annual Hawaii International Conference on…
2004
Corpus ID: 12542930
This paper studies the technology factors that companies consider important in deciding to adopt and deploy wireless devices…
Expand
2004
2004
Objectives for Control and Provisioning of Wireless Access Points (CAPWAP)
S. Govindan
,
Hong Cheng
,
Zhonghui Yao
,
Wenhui Zhou
,
Lily Yang
Request for Comments
2004
Corpus ID: 34422255
This document presents objectives for an interoperable protocol for the Control and Provisioning of Wireless Access Points…
Expand
2004
2004
Secure routing in a vehicular ad hoc network
Stephan Eichler
,
Florian Dotzert
,
Christian SchwingenschlOgl
,
F. Caro
,
Jorg Eberspacher
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2265594
In the presence of attackers reliable and trustworthy operation of mobile ad hoc networks is impossible without secure routing…
Expand
Highly Cited
1997
Highly Cited
1997
Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields
A. Lenstra
Australasian Conference on Information Security…
1997
Corpus ID: 39393535
We show how to use cyclotomic polynomials to construct subgroups of multiplicative groups of finite fields that allow very…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE