Skip to search formSkip to main contentSkip to account menu

Malware

Known as: Stealthware, Malicious exploit, Badware 
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless… 
Highly Cited
2012
Highly Cited
2012
Smartphones are very effective tools for increasing the productivity of business users. With their increasing computational power… 
Highly Cited
2011
Highly Cited
2011
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency to take-down efforts. Besides being… 
Highly Cited
2010
Highly Cited
2010
In Mobile Ad hoc NETworks (MANETs), certification systems play an important role in maintaining network security because… 
Highly Cited
2010
Highly Cited
2010
This paper proposes a lightweight, fast, and efficient traffic intensity-based intrusion detection method for wireless sensor… 
Highly Cited
2008
Highly Cited
2008
We consider the problem of distributed function calculation in the presence of faulty or malicious agents. In particular, we… 
Highly Cited
2006
Highly Cited
2006
Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
Highly Cited
1950
Highly Cited
1950
Thank you very much for downloading the letters of ezra pound 1907 1941. As you may know, people have search numerous times for…