Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,141,489 papers from all fields of science
Search
Sign In
Create Free Account
Computer virus
Known as:
Stealth virus
, @mm
, Virus program
Expand
A computer virus is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actifed (computer virus)
Aho–Corasick algorithm
Android
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Detecting sources of computer viruses in networks: theory and experiment
Devavrat Shah
,
Tauhid Zaman
Measurement and Modeling of Computer Systems
2010
Corpus ID: 6027774
We provide a systematic study of the problem of finding the source of a computer virus in a network. We model virus spreading in…
Expand
Highly Cited
2008
Highly Cited
2008
Security in Cognitive Radio Networks: Threats and Mitigation
T. Clancy
,
Nate Goergen
International Conference on Cognitive Radio…
2008
Corpus ID: 414130
This paper describes a new class of attacks specific to cognitive radio networks. Wireless devices that can learn from their…
Expand
Highly Cited
2004
Highly Cited
2004
Automated Worm Fingerprinting
Sumeet Singh
,
Cristian Estan
,
G. Varghese
,
S. Savage
USENIX Symposium on Operating Systems Design and…
2004
Corpus ID: 748558
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of…
Expand
Highly Cited
2001
Highly Cited
2001
How Viruses Spread Among Computers and People
A. Lloyd
,
R. May
Science
2001
Corpus ID: 7959135
The spread of diseases in human and other populations can be described in terms of networks, where individuals are represented by…
Expand
Highly Cited
1998
Highly Cited
1998
A distributed trust model
A. Abdul-Rahman
,
S. Hailes
New Security Paradigms Workshop
1998
Corpus ID: 18218821
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction…
Expand
Highly Cited
1995
Highly Cited
1995
Transfers of Meaning
G. Nunberg
Journal of Semantics
1995
Corpus ID: 29810216
L'A. examine les transferts de significations en anglais, operation dans laquelle des noms de propriete sont transferes dans de…
Expand
Highly Cited
1993
Highly Cited
1993
Marine cyanophages infecting oceanic and coastal strains of Synechococcus: abundance, morphology, cross-infectivity and growth characteristics
C. Suttle
,
A. M. Chan
1993
Corpus ID: 13083971
Eight different phycoerythrinand phycocyanin-containing strains of Synechococcus spp. and 1 strain of Anacystis marina were…
Expand
Highly Cited
1991
Highly Cited
1991
Classification and nomenclature of viruses. Fifth report of the International Committee on Taxonomy of Viruses.
R. Francki
,
C. Fauquet
,
D. Knudson
,
F. Brown
1991
Corpus ID: 82965378
Highly Cited
1988
Highly Cited
1988
Computer viruses
John Croall
1988
Corpus ID: 6492976
While technology advances have brought many benefits to society there have also been technological abuses .In today's generation…
Expand
Highly Cited
1982
Highly Cited
1982
RNA tumor viruses
R. Weiss
,
A. Bernstein
1982
Corpus ID: 83439940
This book contains 12 selections. Some of the titles are: Genome Structure;Genetics of Retroviruses;Functions and Origins of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE