Countermeasure (computer)

In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a transformative approach for providing… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Review
2016
Review
2016
Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit… (More)
  • figure 1
  • table 1
  • table 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks. The… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Countermeasures such as software patches or warnings can be effective in helping organizations avert virus infection problems… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A power system may be subject to (rotor) angle, frequency or voltage instability. Voltage instability takes on the form of a… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Fred Cohen received a B.S. in Electrical Engineering from Carnegie-Mellon University in 1977, an MS in Information Science from… (More)
  • figure 4
  • figure 5
  • figure 11
Is this relevant?