Skip to search formSkip to main contentSkip to account menu

Malware

Known as: Stealthware, Malicious exploit, Badware 
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs).Considerable… 
Review
2016
Review
2016
Thank you for downloading design evaluation and analysis of questionnaires for survey research. Maybe you have knowledge that… 
2014
2014
A Wireless Sensor Network (WSN) consists of many sensor nodes with low cost and power capability. The nature of WSN makes it… 
Review
2014
Review
2014
The Wireless sensor networks are popular and frequently used in many applications. The WSN are deployed in open and unprotected… 
2011
2011
Cloud storage services commonly use deduplication, which eliminates redundant data by storing only a single copy of each file or… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
Highly Cited
2005
Highly Cited
2005
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and… 
2002
2002
A fragile speech watermarking scheme of low complexity is proposed in this research as an effective way to detect malicious… 
2001
2001
With each passing year, more and more valuable, confidential information is stored in government and commercial computer systems… 
Highly Cited
1950
Highly Cited
1950
Thank you very much for downloading the letters of ezra pound 1907 1941. As you may know, people have search numerous times for…