Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,979,012 papers from all fields of science
Search
Sign In
Create Free Account
Malware
Known as:
Stealthware
, Malicious exploit
, Badware
Expand
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
App Store Approval Process
Application security
Arbitrary code execution
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
An Efficient Distributed Trust Model for Wireless Sensor Networks
M. Salem
2016
Corpus ID: 52210455
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs).Considerable…
Expand
Review
2016
Review
2016
Design Evaluation And Analysis Of Questionnaires For Survey Research
Vanessa Hertzog
2016
Corpus ID: 63617835
Thank you for downloading design evaluation and analysis of questionnaires for survey research. Maybe you have knowledge that…
Expand
2014
2014
False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN
A. Karuppiah
,
S. Rajaram
2014
Corpus ID: 56331946
A Wireless Sensor Network (WSN) consists of many sensor nodes with low cost and power capability. The nature of WSN makes it…
Expand
Review
2014
Review
2014
A Survey on Detecting Compromised Nodes in Wireless Sensor Networks
K. Sumathi
,
Dr. M. Venkatesan
2014
Corpus ID: 2196847
The Wireless sensor networks are popular and frequently used in many applications. The WSN are deployed in open and unprotected…
Expand
2011
2011
Side channels in cloud services , the case of deduplication in cloud storage
Danny Harnik
,
Alexandra Shulman-Peleg
2011
Corpus ID: 18639623
Cloud storage services commonly use deduplication, which eliminates redundant data by storing only a single copy of each file or…
Expand
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
Highly Cited
2005
Highly Cited
2005
Towards protecting sensitive files in a compromised system
Xin Zhao
,
Kevin Borders
,
A. Prakash
IEEE Security in Storage Workshop
2005
Corpus ID: 11293753
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and…
Expand
2002
2002
Fragile speech watermarking based on exponential scale quantization for tamper detection
Chung-Ping Wu
,
C.-C. Jay Kuo
IEEE International Conference on Acoustics…
2002
Corpus ID: 10145026
A fragile speech watermarking scheme of low complexity is proposed in this research as an effective way to detect malicious…
Expand
2001
2001
A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow
J. Brown
,
T. Knight
2001
Corpus ID: 2159343
With each passing year, more and more valuable, confidential information is stored in government and commercial computer systems…
Expand
Highly Cited
1950
Highly Cited
1950
The letters of Ezra Pound, 1907-1941
E. Pound
1950
Corpus ID: 201676169
Thank you very much for downloading the letters of ezra pound 1907 1941. As you may know, people have search numerous times for…
Expand