Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,166,818 papers from all fields of science
Search
Sign In
Create Free Account
EICAR
Known as:
European Institute for Computer Antivirus Research
EICAR, the European Institute for Computer Antivirus Research, was founded in 1991 as an organization aiming to further antivirus research and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
AV-Comparatives
Anti-Malware Testing Standards Organization
Antivirus software
CARO
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The security of databases: the Access case
Baptiste David
,
Dorian Larget
,
Thibaut Scherrer
Journal of Computer Virology and Hacking…
2013
Corpus ID: 255168869
Nowadays, more and more companies have to use databases in which they store their essential or confidential data for the society…
Expand
2012
2012
Monitoring bad traffic with darknets
Simon Woodhead
Network Security
2012
Corpus ID: 206126652
2008
2008
A behavior based approach to virus detection
Peter J. Clarke
,
Yi Deng
,
J. Morales
2008
Corpus ID: 60774026
Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods…
Expand
2007
2007
PRIVACY-INVASIVE SOFTWARE EXPLORING EFFECTS AND COUNTERMEASURES
Martin Boldt
2007
Corpus ID: 109979957
As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for separating legitimate software…
Expand
2007
2007
Pump and Dump Scams
Ken Dunham
Information Security Journal
2007
Corpus ID: 31201259
A MASSIVE MARKETING CAMPAIGN HAS BEGUN FOR THE FIRST WEEK OF 2006. AND WE FEEL IT'S GOING TO HIT OVER 200% GAIN THIS WEEK WITH…
Expand
Review
2005
Review
2005
Eicar 2005
U. Gattiker
IEEE Security and Privacy
2005
Corpus ID: 5402245
The European Institute Center for Anti-Virus Research (EICAR; www.eicar.org) held its 14th annual conference and attracted about…
Expand
2004
2004
Tool based formal Modelling, Analysis and Visualisation of Enterprise Network Vulnerabilities utilising Attack Graph Exploration
R. Rieke
2004
Corpus ID: 60039920
A core concern of critical infrastructure protection is a careful analysis of what parts of the information infrastructure really…
Expand
2004
2004
Fast Multipattern Matching for Intrusion Detection
Tarek Abbes
,
M. Rusinowitch
2004
Corpus ID: 107353786
Misuse intrusion detection (IDS) detects signatures of attack scenarios. Hackers try to avoid detection by permuting actions, and…
Expand
1999
1999
Attitude Adjustment : Trojans and Malware on the Internet An Update
Sarah Gordon
,
D. Chess
1999
Corpus ID: 17340127
This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It…
Expand
1993
1993
Eicar (5-Ethynyl- 1-~-~-ribofuranosylimidazole-4-carboxamide)
Guanylate Biosynthesis
,
Jan BalzariniS
,
Anna KarlssonQ
,
Arthur Van AerschotS
1993
Corpus ID: 89547005
re- spectively. EICAR causes a rapid and marked inhibi- tion of inosinate (IMP) dehydrogenase (EC 1.1.1.205) activity in intact…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE