Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,854 papers from all fields of science
Search
Sign In
Create Free Account
Malware
Known as:
Stealthware
, Malicious exploit
, Badware
Expand
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
App Store Approval Process
Application security
Arbitrary code execution
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Android Malware Detection: A Survey
M. Odusami
,
O. Abayomi-Alli
,
S. Misra
,
Olamilekan Shobayo
,
Robertas Damaševičius
,
R. Maskeliūnas
International Conference on Applied Informatics
2018
Corpus ID: 70176085
In the world today, smartphones are evolving every day and with this evolution, security becomes a big issue. Security is an…
Expand
Highly Cited
2016
Highly Cited
2016
An Efficient Distributed Trust Model for Wireless Sensor Networks
M. Salem
2016
Corpus ID: 52210455
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs).Considerable…
Expand
Review
2016
Review
2016
Design Evaluation And Analysis Of Questionnaires For Survey Research
Vanessa Hertzog
2016
Corpus ID: 63617835
Thank you for downloading design evaluation and analysis of questionnaires for survey research. Maybe you have knowledge that…
Expand
2011
2011
Side channels in cloud services , the case of deduplication in cloud storage
Danny Harnik
,
Alexandra Shulman-Peleg
2011
Corpus ID: 18639623
Cloud storage services commonly use deduplication, which eliminates redundant data by storing only a single copy of each file or…
Expand
Review
2009
Review
2009
Recent Advances and Classification of Watermarking Techniques in Digital Images
Chunlin Song
,
Sud Sudirman
,
M. Merabti
2009
Corpus ID: 55524425
This paper surveys recent advances in watermarking techniques in digital images. The aim of digital watermarking is to include…
Expand
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
Highly Cited
2005
Highly Cited
2005
Towards protecting sensitive files in a compromised system
Xin Zhao
,
Kevin Borders
,
A. Prakash
IEEE Security in Storage Workshop
2005
Corpus ID: 11293753
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and…
Expand
Highly Cited
2002
Highly Cited
2002
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control
Hak-soo Ju
,
Hyun-Jeong Kim
,
Dong Hoon Lee
,
Jongin Lim
International Conference on Information Security…
2002
Corpus ID: 12340918
Anonymity is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace…
Expand
2000
2000
Wavelet-based watermarking for tamper proofing of still images
Hisashi Inoue
,
A. Miyazaki
,
T. Katsura
Proceedings International Conference on Image…
2000
Corpus ID: 30138971
We propose a novel robust and fragile watermarking technique for the tamper proofing of still images. In this method, robust…
Expand
Highly Cited
1950
Highly Cited
1950
The letters of Ezra Pound, 1907-1941
E. Pound
1950
Corpus ID: 201676169
Thank you very much for downloading the letters of ezra pound 1907 1941. As you may know, people have search numerous times for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE