Dropper

A dropper is a program (malware component) that has been designed to "install" some sort of malware (virus, backdoor, etc.) to a target system. The… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1999-2017
01219992017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Malware remains an important security threat, as miscreants continue to deliver a variety of malicious programs to hosts around… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2014
2014
The proportional loss rate differentiation PLD model was proposed to provide controllable and predictable loss rate for different… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Packet Dropper nodes is a severe problem in MANET and they not only are harmful for the sender and receiver but they also lead to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Capacity sharing - the fair usage of the available capacity amongst a set of users - is relying solely on the end user/end hosts… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
On several experimental tokamaks, pellet injection has been found to trigger edge localized modes (ELMs) in H-mode plasmas. This… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
Wireless sensor networks offer unique opportunities for applications in the human and natural environments. In this paper, the… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table 1
Is this relevant?
2006
2006
Network applications and users have very diverse service expectations and requirements, demanding for provisioning of different… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
Slide making is the most critical aspect of good banding preparations. Slide making is best done after the cells have been in… (More)
  • figure 1
  • figure 2
Is this relevant?
2002
2002
AbstructThe differentiated service (Diffserv) architecture does not specify any priority scheme between AF ontprofile packets and… (More)
  • figure 2
  • figure 3
  • figure 5
  • table I
  • table 111
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In large distributed networks of computers, it is often the case that a subset of machines wants to cooperate to perform a task… (More)
  • figure 4
Is this relevant?