Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,991,332 papers from all fields of science
Search
Sign In
Create Free Account
Countermeasure (computer)
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Application security
Asset (computer security)
Attack (computing)
Common Vulnerabilities and Exposures
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment
Earlence Fernandes
,
B. Crispo
,
M. Conti
IEEE Transactions on Information Forensics and…
2013
Corpus ID: 17398171
Many modern smartphones and car radios are shipped with embedded FM radio receiver chips. The number of devices with similar…
Expand
2009
2009
Popular SOA Antipatterns
J. Král
,
Michal Zemlicka
Computation World: Future Computing, Service…
2009
Corpus ID: 38216794
Growing number of reports on the problems with SOA projects indicates that SOA faces substantial problems. It can be a…
Expand
Review
2007
Review
2007
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
P. Thermos
,
A. Takanen
2007
Corpus ID: 166953466
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP…
Expand
2006
2006
Search worms
Niels Provos
,
J. McClain
,
Ke Wang
Worm
2006
Corpus ID: 10573643
Worms are becoming more virulent at the same time as operating system improvements try to contain them.Recent research…
Expand
2005
2005
Measuring Resistance to Social Engineering
Hågen Hasle
,
Yngve Kristiansen
,
Ketil Kintel
,
E. Snekkenes
Information Security Practice and Experience
2005
Corpus ID: 35991437
Social engineering (SE) is the name used for a bag of tricks used by adversaries to manipulate victims to make them say or do…
Expand
2004
2004
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords
Shuhong Wang
,
Jie Wang
,
Maozhi Xu
International Conference on Applied Cryptography…
2004
Corpus ID: 4351426
A password-authenticated key exchange scheme allows two entities, who only share a memorable password, to authenticate each other…
Expand
Highly Cited
2003
Highly Cited
2003
Balanced self-checking asynchronous logic for smart card applications
S. Moore
,
Ross J. Anderson
,
R. Mullins
,
G. Taylor
,
J. Fournier
Microprocessors and microsystems
2003
Corpus ID: 2186513
Highly Cited
2003
Highly Cited
2003
Multilayer mobility management for all-IP networks: pure SIP vs. hybrid SIP/mobile IP
C. Politis
,
K. Chew
,
R. Tafazolli
The 57th IEEE Semiannual Vehicular Technology…
2003
Corpus ID: 16363893
Next generation systems will support mobility based on the continuing advancements in wireless technology. An integrated solution…
Expand
Highly Cited
2002
Highly Cited
2002
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
Pietro Michiardi
2002
Corpus ID: 16734073
Countermeasures against denial of service attacks and node misbehaviour are mandatory requirements in MANET. Essential network…
Expand
2002
2002
Digital signatures and electronic documents: a cautionary tale
K. Kain
,
Sean W. Smith
,
R. Asokan
Communications and Multimedia Security
2002
Corpus ID: 1048269
Often, the main motivation for using PKI in business environments is to streamline workflow, by enabling humans to digitally sign…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required