Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,633 papers from all fields of science
Search
Sign In
Create Free Account
Computer virus
Known as:
Stealth virus
, @mm
, Virus program
Expand
A computer virus is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actifed (computer virus)
Aho–Corasick algorithm
Android
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Can We Learn From Viruses How to Prevent Type 1 Diabetes?: The Role of Viral Infections in the Pathogenesis of Type 1 Diabetes and the Development of Novel Combination Therapies
M. Herrath
2009
Corpus ID: 196415299
We will take a journey from basic pathogenetic mechanisms elicited by viral infections that play a role in the development of…
Expand
Highly Cited
2006
Highly Cited
2006
Malware prevalence in the KaZaA file-sharing network
Seungwon Shin
,
Jaeyeon Jung
,
H. Balakrishnan
ACM/SIGCOMM Internet Measurement Conference
2006
Corpus ID: 2976102
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation…
Expand
Highly Cited
2006
Highly Cited
2006
Profiling and Clustering Internet Hosts
Songjie Wei
,
J. Mirkovic
,
E. Kissel
International Conference on Data Mining
2006
Corpus ID: 14329499
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control…
Expand
Highly Cited
2005
Highly Cited
2005
Analyzing Behavioral Features for Email Classification
Steve Martin
,
B. Nelson
,
A. Sewani
,
K. Chen
,
A. Joseph
International Conference on Email and Anti-Spam
2005
Corpus ID: 5788556
Many researchers have applied statistical analysis techniques to email for classification purposes, such as identifying spam…
Expand
Highly Cited
2003
Highly Cited
2003
Email Virus Propagation Modeling and Analysis
C. Zou
,
D. Towsley
,
W. Gong
2003
Corpus ID: 9982103
Email viruses constitute one of the major Internet security problems. In this paper we present an email virus model that accounts…
Expand
2002
2002
Distribution of bacterial biomass and activity in the marginal ice zone of the central Barents Sea during summer
M. Howard-Jones
,
V. D. Ballard
,
A. Allen
,
M. Frischer
,
P. Verity
2002
Corpus ID: 76654636
Highly Cited
1997
Highly Cited
1997
Ethics online
Deborah G. Johnson
1997
Corpus ID: 41359527
process of making fundamental decisions about the future of their systems of online communication. The public discussions taking…
Expand
Highly Cited
1991
Highly Cited
1991
Functional and genetic analysis of the role of Vmw110 in herpes simplex virus replication
R. Everett
1991
Corpus ID: 88231197
Highly Cited
1982
Highly Cited
1982
Molecular biology of tumor viruses. RNA tumor viruses.
R. Weiss
,
N. Teich
,
H. Varmus
,
J. Coffin
1982
Corpus ID: 83100410
Highly Cited
1976
Highly Cited
1976
The presence of actin in enveloped viruses
E. Wang
,
B. A. Wolf
,
R. Lamb
,
P. Choppin
,
A. R. Goldberg
1976
Corpus ID: 90229085
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required