Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,366,208 papers from all fields of science
Search
Sign In
Create Free Account
Malware
Known as:
Stealthware
, Malicious exploit
, Badware
Expand
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
App Store Approval Process
Application security
Arbitrary code execution
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Joint physical-application layer security for wireless multimedia delivery
Liang Zhou
,
Dan Wu
,
B. Zheng
,
M. Guizani
IEEE Communications Magazine
2014
Corpus ID: 4857662
In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless…
Expand
Highly Cited
2012
Highly Cited
2012
MOSES: supporting operation modes on smartphones
G. Russello
,
M. Conti
,
B. Crispo
,
Earlence Fernandes
ACM Symposium on Access Control Models and…
2012
Corpus ID: 2910354
Smartphones are very effective tools for increasing the productivity of business users. With their increasing computational power…
Expand
Highly Cited
2011
Highly Cited
2011
Detecting stealthy P2P botnets using statistical traffic fingerprints
Junjie Zhang
,
R. Perdisci
,
Wenke Lee
,
Unum Sarfraz
,
Xiapu Luo
Dependable Systems and Networks
2011
Corpus ID: 9520362
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency to take-down efforts. Besides being…
Expand
Highly Cited
2010
Highly Cited
2010
Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks
Kyu-Yong Park
,
Hiroki Nishiyama
,
N. Ansari
,
N. Kato
IEEE Vehicular Technology Conference
2010
Corpus ID: 9157674
In Mobile Ad hoc NETworks (MANETs), certification systems play an important role in maintaining network security because…
Expand
Highly Cited
2010
Highly Cited
2010
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
Ming-Yang Su
Computers & security
2010
Corpus ID: 27499241
Highly Cited
2010
Highly Cited
2010
Intrusion detection based on traffic analysis in wireless sensor networks
Y. Ponomarchuk
,
Dae-Wha Seo
Wireless and Optical Communications Conference
2010
Corpus ID: 37297078
This paper proposes a lightweight, fast, and efficient traffic intensity-based intrusion detection method for wireless sensor…
Expand
Highly Cited
2008
Highly Cited
2008
Distributed function calculation via linear iterations in the presence of malicious agents — Part I: Attacking the network
S. Sundaram
,
C. Hadjicostis
American Control Conference
2008
Corpus ID: 13930555
We consider the problem of distributed function calculation in the presence of faulty or malicious agents. In particular, we…
Expand
Highly Cited
2006
Highly Cited
2006
POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS
T. Leinmüller
,
E. Schoch
,
F. Kargl
IEEE wireless communications
2006
Corpus ID: 3080455
Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs…
Expand
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
Highly Cited
1950
Highly Cited
1950
The letters of Ezra Pound, 1907-1941
E. Pound
1950
Corpus ID: 201676169
Thank you very much for downloading the letters of ezra pound 1907 1941. As you may know, people have search numerous times for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE