Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,787,835 papers from all fields of science
Search
Sign In
Create Free Account
Sality
Sality is the classification for a family of malicious software (malware), which infects files on Microsoft Windows systems. Sality was first…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Antivirus software
Booting
Botnet
Computer file
Expand
Broader (1)
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators
Beni Brahara
,
Dedy Syamsuar
,
Yesi Novaria Kunang
2020
Corpus ID: 215916294
University of Bina Darma Palembang has its own DNS server and in this study using log data from the Bina Darma University DNS…
Expand
2015
2015
Computational efficiency and universality of timed P systems with active membranes
Bosheng Song
,
L. Pan
Theoretical Computer Science
2015
Corpus ID: 10411425
2015
2015
Identification of Image Operations Based on Steganalytic Features
Haodong Li
,
Weiqi Luo
,
Xiaoqing Qiu
,
Jiwu Huang
arXiv.org
2015
Corpus ID: 14750712
Image forensics have attracted wide attention during the past decade. Though many forensic methods have been proposed to identify…
Expand
2011
2011
On the Causality between Stock Prices and Exchange Rates: Evidence from Turkish Financial Market
Yaşar Köse
,
M. Doganay
,
Hakan Karabacak
2011
Corpus ID: 56403143
The aim of this paper is to investigate the existence and direction of relationship between stock prices and exchange rates for…
Expand
2010
2010
When Simulation Meets Antichains(on Checking Language Inclusion of NFA)
P. Abdulla
2010
Corpus ID: 18464855
We describe a new and more efficient algorithm for checking universality and language inclusion on nondeterministic finite word…
Expand
2009
2009
Combining Facial Skin Mark and Eigenfaces for Face Recognition
Zhi Zhang
,
S. Tulyakov
,
V. Govindaraju
International Conference on Biometrics
2009
Corpus ID: 6436746
In this paper we investigate the use of facial skin mark information for biometric person verification. We performed statistical…
Expand
2008
2008
Imprints of microcausality violation on the cosmic microwave background
A. Kobakhidze
2008
Corpus ID: 7387682
We consider a modification of the Heisenberg algebra with the non-vanishing commutator of scalar field operators. We then…
Expand
2001
2001
The origins of time asymmetry
M. Pallas
2001
Corpus ID: 125746057
This thesis is about the role played by time in quantum mechanics. It investigates a perennial problem in physics and philosophy…
Expand
1996
1996
A General theory of relativity based on the Principle of Universality
E. M. Schaefer
1996
Corpus ID: 9249776
The Principle of Uniformity (the size of a physical quantity is given by its locally measured value) is replaced by the Principle…
Expand
Highly Cited
1994
Highly Cited
1994
RELATIVIZABLE AND NONRELATIVIZABLE THEOREMS IN THE POLYNOMIAL THEORY OF ALGORITHMS
N. Vereshchagin
1994
Corpus ID: 17469006
Starting with the paper of Baker, Gill, and Solovay [BGS 75] in complexity theory, many results have been proved that separate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE