Skip to search formSkip to main contentSkip to account menu

Malware

Known as: Stealthware, Malicious exploit, Badware 
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
In the world today, smartphones are evolving every day and with this evolution, security becomes a big issue. Security is an… 
Highly Cited
2016
Highly Cited
2016
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs).Considerable… 
Review
2016
Review
2016
Thank you for downloading design evaluation and analysis of questionnaires for survey research. Maybe you have knowledge that… 
2011
2011
Cloud storage services commonly use deduplication, which eliminates redundant data by storing only a single copy of each file or… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
Highly Cited
2005
Highly Cited
2005
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and… 
Highly Cited
2002
Highly Cited
2002
Anonymity is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace… 
2000
2000
We propose a novel robust and fragile watermarking technique for the tamper proofing of still images. In this method, robust… 
2000
2000
  • T. FuronP. Duhamel
  • 2000
  • Corpus ID: 2356027
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts… 
Highly Cited
1950
Highly Cited
1950
Thank you very much for downloading the letters of ezra pound 1907 1941. As you may know, people have search numerous times for…