Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
Countermeasure (computer)
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Application security
Asset (computer security)
Attack (computing)
Common Vulnerabilities and Exposures
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
Securing MAODV: attacks and countermeasures
Sankardas Roy
,
Venkata Gopala Krishna Addada
,
Sanjeev Setia
,
S. Jajodia
Second Annual IEEE Communications Society…
2005
Corpus ID: 7839665
Most of the multicast routing protocols proposed for ad hoc networks assume a trusted, non-adversarial environment and do not…
Expand
Review
2005
Review
2005
RFID tags: privacy and security aspects
Dong-Her Shih
,
Ching-Yi Lin
,
Binshan Lin
International Journal of Mobile Communications
2005
Corpus ID: 7609372
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in manufacturing…
Expand
Highly Cited
2005
Highly Cited
2005
Incorporating error detection and online reconfiguration into a regular architecture for the advanced encryption standard
L. Breveglieri
,
I. Koren
,
P. Maistri
IEEE International Symposium on Defect and Fault…
2005
Corpus ID: 29411961
Fault injection based attacks on cryptographic devices aim at recovering the secret keys by inducing an error in the computation…
Expand
Highly Cited
2003
Highly Cited
2003
Multilayer mobility management for all-IP networks: pure SIP vs. hybrid SIP/mobile IP
C. Politis
,
K. Chew
,
R. Tafazolli
The 57th IEEE Semiannual Vehicular Technology…
2003
Corpus ID: 16363893
Next generation systems will support mobility based on the continuing advancements in wireless technology. An integrated solution…
Expand
Highly Cited
2003
Highly Cited
2003
Balanced self-checking asynchronous logic for smart card applications
S. Moore
,
Ross J. Anderson
,
R. Mullins
,
G. Taylor
,
J. Fournier
Microprocessors and microsystems
2003
Corpus ID: 2186513
Highly Cited
2002
Highly Cited
2002
ENGINEERING COUNTERMEASURES TO REDUCE RED-LIGHT-RUNNING
J. Bonneson
,
K. Zimmerman
,
M. Brewer
2002
Corpus ID: 109460084
Red-light-running is a significant problem throughout the United States and Texas. It is associated with frequent and severe…
Expand
2002
2002
Defending against an Internet-based attack on the physical world
S. Byers
,
A. Rubin
,
David P. Kormann
TOIT
2002
Corpus ID: 7311580
We discuss the dangers that scalable Internet functionality may present to the real world, focusing upon an attack that is simple…
Expand
Review
1999
Review
1999
Bioremediation of Oil on Shoreline Environments: Development of Techniques and Guidelines
Kenneth Lee
,
Xavier Merlin
1999
Corpus ID: 30414940
Abstract Over the last 20 years, the development of operational procedures to accelerate the natural biodegradation rates of oil…
Expand
1994
1994
EXAMINATION OF INTERSECTION, LEFT TURN ACROSS PATH CRASHES AND POTENTIAL IVHS COUNTERMEASURES. FINAL REPORT
J. Chovan
,
L. Tijerina
,
J. Everson
,
J. Pierowicz
,
L. Donald
,
Hendricks Calspan
1994
Corpus ID: 106843673
This report provides a preliminary analysis of intersection-related, left turn across path (LTAP) crashes and applicable…
Expand
Review
1994
Review
1994
PERCEPTUAL COUNTERMEASURES: LITERATURE REVIEW
B. Fildes
,
J. Jarvis
1994
Corpus ID: 107224036
A recent review on priority issues to reduce excessive speeding on Australian roads highlighted an urgent need for further…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE