Skip to search formSkip to main contentSkip to account menu

Countermeasure (computer)

In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next… 
Highly Cited
2012
Highly Cited
2012
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It… 
Highly Cited
2010
Highly Cited
2010
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The… 
Highly Cited
2010
Highly Cited
2010
The availability of digital channels for media distribution has raised many important questions for marketers, notably, whether… 
Highly Cited
2006
Highly Cited
2006
In this article we describe an efficient AES software implementation that is well suited for 8-bit smart cards and resistant… 
Review
2005
Review
2005
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical… 
Highly Cited
2005
Highly Cited
2005
The inhibitory effects of tropospheric O 3 on crop photosynthesis, growth, and yield have been documented in numerous studies… 
Highly Cited
2003
Highly Cited
2003
Wireless LAN deployment improves users' mobility, but it also brings a range of security issues that affect emerging standards… 
Highly Cited
2003
Highly Cited
2003
In this paper we investigate the resiliency to jamming of data protocols, such as IP, over WLAN. We show that, on existing WLAN… 
Highly Cited
1997
Highly Cited
1997
Personnel representing several NASA field centers have formulated a "Reference Mission" addressing human exploration of Mars…