Skip to search formSkip to main contentSkip to account menu

Evasion (network security)

Known as: Evasion 
In network security, evasion is bypassing an information security device in order to deliver an exploit, attack, or other form of malware to a target… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Code injection attacks continue to pose a threat to today's computing systems, as they exploit software vulnerabilities to inject… 
2012
2012
In this paper, a new AES-like design for key-dependent AES using S-box rotation is proposed. We also show how this property can… 
Review
2011
Review
2011
Abstract. Oxygen triple isotope measurements can be used to calculate aquatic gross oxygen production rates. Past studies have… 
2007
2007
Rise in the underground economy creates problems for the policy-makers to formulate economic policies, especially the monetary… 
2004
2004
This paper examines the process by which firms are selected for a sales tax audit and the determinants of subsequent firm… 
Highly Cited
2001
Review
2001
Review
2001
Abstract The process of coevolution between host and enemy has traditionally been viewed as an evolutionary arms race between… 
2001
2001
In this paper we model taxpayer participation in an unanticipated tax amnesty which can be entered by paying a fixed amount… 
Highly Cited
1995
Highly Cited
1995
Methanogenesis was studied in five streams of central and southern Arizona by examining the distribution of methane in… 
Highly Cited
1968
Highly Cited
1968
A class of differential pursuit-evasion games is examined in which the dynamics are linear and perturbed by additive white…