Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,287,067 papers from all fields of science
Search
Sign In
Create Free Account
Countermeasure (computer)
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Application security
Asset (computer security)
Attack (computing)
Common Vulnerabilities and Exposures
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Martin Strohmeier
,
Vincent Lenders
,
I. Martinovic
IEEE Communications Surveys and Tutorials
2013
Corpus ID: 13077253
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next…
Expand
Highly Cited
2012
Highly Cited
2012
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Kevin P. Dyer
,
Scott E. Coull
,
Thomas Ristenpart
,
Thomas Shrimpton
IEEE Symposium on Security and Privacy
2012
Corpus ID: 861248
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It…
Expand
Highly Cited
2010
Highly Cited
2010
Correlation-Enhanced Power Analysis Collision Attack
A. Moradi
,
Oliver Mischke
,
T. Eisenbarth
Workshop on Cryptographic Hardware and Embedded…
2010
Corpus ID: 8297864
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The…
Expand
Highly Cited
2010
Highly Cited
2010
Converting Pirates Without Cannibalizing Purchasers: The Impact of Digital Distribution on Physical Sales and Internet Piracy
Brett Danaher
,
Samita Dhanasobhon
,
Michael D. Smith
,
Rahul Telang
Marketing science (Providence, R.I.)
2010
Corpus ID: 2471935
The availability of digital channels for media distribution has raised many important questions for marketers, notably, whether…
Expand
Highly Cited
2006
Highly Cited
2006
An AES Smart Card Implementation Resistant to Power Analysis Attacks
Christoph Herbst
,
E. Oswald
,
S. Mangard
International Conference on Applied Cryptography…
2006
Corpus ID: 15453882
In this article we describe an efficient AES software implementation that is well suited for 8-bit smart cards and resistant…
Expand
Review
2005
Review
2005
Key distribution mechanisms for wireless sensor networks : a survey
S. Çamtepe
,
B. Yener
2005
Corpus ID: 13962444
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical…
Expand
Highly Cited
2005
Highly Cited
2005
Crop responses to ozone: uptake, modes of action, carbon assimilation and partitioning
E. Fiscus
,
F. Booker
,
K. Burkey
2005
Corpus ID: 53498284
The inhibitory effects of tropospheric O 3 on crop photosynthesis, growth, and yield have been documented in numerous studies…
Expand
Highly Cited
2003
Highly Cited
2003
WLAN Security: Current and Future
Joon S. Park
,
Derrick Dicoi
IEEE Internet Computing
2003
Corpus ID: 17152003
Wireless LAN deployment improves users' mobility, but it also brings a range of security issues that affect emerging standards…
Expand
Highly Cited
2003
Highly Cited
2003
Low-power DoS attacks in data wireless LANs and countermeasures
G. Noubir
,
G. Lin
MOCO
2003
Corpus ID: 6703002
In this paper we investigate the resiliency to jamming of data protocols, such as IP, over WLAN. We show that, on existing WLAN…
Expand
Highly Cited
1997
Highly Cited
1997
Human Exploration of Mars: The Reference Mission of the NASA Mars Exploration Study Team
S. Hoffman
,
D. Kaplan
1997
Corpus ID: 62690345
Personnel representing several NASA field centers have formulated a "Reference Mission" addressing human exploration of Mars…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE