Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,531,639 papers from all fields of science
Search
Sign In
Create Free Account
Default password
Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Backdoor (computing)
Canonical account
Carna botnet
MAC address
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Cyber-Attacks Detection & Protection in Kuwait Government Sectors
Khalid Abdulkareem Al-Enezi
,
I. Al-Shaikhli
,
A. Al-kandari
,
S. AlDabbagh
International Conference on Advanced Computer…
2014
Corpus ID: 16086987
The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal…
Expand
2014
2014
One-Time Password Implementation on Lego Mindstorms NXT
P. BarlianHenryranu
,
H. Nurwarsito
,
Wijaya Kurniawan
2014
Corpus ID: 32197444
One of the factors that affect the security of a network or system is user authentication and unfortunately at times it can be…
Expand
2012
2012
Energy Efficient Topology Control for WLANS Yalemzewd
Negash
,
Eduard Axel Jorswieck
2012
Corpus ID: 159033472
Wireless LANs employing the IEEE 802.11a/b/g/n standard operate in the unlicensed frequency bands. Their deployment has seen an…
Expand
2009
2009
Exploring Dynamic Default Dependence
Peter F. Christoffersen
,
Jan Ericsson
,
Kris Jacobs
,
Xisong Jin
2009
Corpus ID: 54937366
Characterizing the dependence between companies’ defaults is a central problem in the credit risk literature, and the dependence…
Expand
2009
2009
Financial innovation and corporate default rates
S. Maurer
,
Hoai-Luu Q. Nguyen
,
Asani Sarkar
,
Chenyang (Jason) Wei
2009
Corpus ID: 8106223
Corporate default rates have been unusually low in recent years, both relative to historical rates and to forecasts of economists…
Expand
2008
2008
Financial Crises, Regulation and Growth
R. Barrell
,
I. Hurst
,
S. Kirby
National Institute Economic Review
2008
Corpus ID: 154655786
The paper discusses the effects on growth of a systemic banking crisis as a result of debt defaults. These effects will come from…
Expand
2007
2007
A Structural Model for Sovereign Credit Risk
Alexandre Jeannerety
2007
Corpus ID: 14694245
This study examines the risk inherent to sovereign default on external debts denominated in foreign currency. I develop a…
Expand
2005
2005
Hardware Keylogger Detection
Andy Davis Research
,
Development Manager
2005
Corpus ID: 13914069
This paper provides an analysis of how hardware-based keyloggers work and offers suggestions as to how they may be detected. In…
Expand
2002
2002
Cached Two-Level Adaptive Branch Predictors with Multiple Stages
C. Egan
,
G. Steven
,
L. Vintan
ARCS
2002
Corpus ID: 11117999
In this paper, we quantify the performance of a novel family of multi-stage Two-Level Adaptive Branch Predictors. In each two…
Expand
1991
1991
Credit-Card Security
John Millar Carroll
1991
Corpus ID: 107978912
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE