Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,289 papers from all fields of science
Search
Sign In
Create Free Account
Evasion (network security)
Known as:
Evasion
In network security, evasion is bypassing an information security device in order to deliver an exploit, attack, or other form of malware to a target…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Attack (computing)
Cracking of wireless networks
Exploit (computer security)
Malware
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
ASIST: architectural support for instruction set randomization
A. Papadogiannakis
,
Laertis Loutsis
,
Vassilis Papaefstathiou
,
S. Ioannidis
Conference on Computer and Communications…
2013
Corpus ID: 16575890
Code injection attacks continue to pose a threat to today's computing systems, as they exploit software vulnerabilities to inject…
Expand
2012
2012
A proposal for improving AES S-box with rotation and key-dependent
Julia Juremi
,
R. Mahmod
,
S. Sulaiman
International Conference on Cyber Security, Cyber…
2012
Corpus ID: 15235941
In this paper, a new AES-like design for key-dependent AES using S-box rotation is proposed. We also show how this property can…
Expand
Review
2011
Review
2011
Technical note: Consistent calculation of aquatic gross production from oxygen triple isotope measurements
J. Kaiser
2011
Corpus ID: 53407898
Abstract. Oxygen triple isotope measurements can be used to calculate aquatic gross oxygen production rates. Past studies have…
Expand
2007
2007
Fresh Assessment of the Underground Economy and Tax Evasion in Pakistan: Causes, Consequences, and Linkages with the Formal Economy
M. Kemal
2007
Corpus ID: 154735600
Rise in the underground economy creates problems for the policy-makers to formulate economic policies, especially the monetary…
Expand
2004
2004
Audit Selection and Firm Compliance with a Broad-based Sales Tax
J. Alm
,
Calvin Blackwell
,
M. McKee
National tax journal
2004
Corpus ID: 10835643
This paper examines the process by which firms are selected for a sales tax audit and the determinants of subsequent firm…
Expand
Highly Cited
2001
Highly Cited
2001
Solution of David Gale's lion and man problem
J. Sgall
Theoretical Computer Science
2001
Corpus ID: 45211775
Review
2001
Review
2001
Two modes of host–enemy coevolution
J. Kniskern
,
M. Rausher
Population Ecology
2001
Corpus ID: 4510322
Abstract The process of coevolution between host and enemy has traditionally been viewed as an evolutionary arms race between…
Expand
2001
2001
Who participates in tax amnesties? Self-selection of risk-averse taxpayers
Carla Marchese
,
F. Privileggi
2001
Corpus ID: 17346613
In this paper we model taxpayer participation in an unanticipated tax amnesty which can be entered by paying a fixed amount…
Expand
Highly Cited
1995
Highly Cited
1995
Methanogenesis in Arizona, USA dryland streams
Jeremy B. Jones
,
R. Holmes
,
S. Fisher
,
N. Grimm
,
Dena M. Greene
1995
Corpus ID: 30080553
Methanogenesis was studied in five streams of central and southern Arizona by examining the distribution of methane in…
Expand
Highly Cited
1968
Highly Cited
1968
Formal solutions for a class of stochastic pursuit-evasion games
W. Willman
1968
Corpus ID: 122113915
A class of differential pursuit-evasion games is examined in which the dynamics are linear and perturbed by additive white…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE