Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,858,911 papers from all fields of science
Search
Sign In
Create Free Account
Samy (computer worm)
Known as:
Samy computer worm
, Samy (XSS)
, Samy
Expand
Samy (also known as JS.Spacehero) is an XSS worm that was designed to propagate across the MySpace social-networking site written by Samy Kamkar…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Computer virus
Confused deputy problem
XSS worm
Broader (1)
JavaScript
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Shariah Boards and the Corporate Governance of Islamic Banks in the United Kingdom
S. Morrison
2014
Corpus ID: 168561366
In the last decade Islamic banks (or banks with Islamic windows) that can compete with conventional (i.e. non-Islamic banks) have…
Expand
2014
2014
Automatic Track Inspection Using 3D Laser Profilers to Improve Rail Transit Asset Condition Assessment and State of Good Repair - A Preliminary Study
Yuanchang Xie
,
M. Talbot
,
K. Zhao
,
J. Laurent
2014
Corpus ID: 106857299
Track inspection is a critical process for both freight and transit rail safety. Currently, many rail transit agencies rely…
Expand
2012
2012
Ulla CARLSSON, Samy TAYIE, Geneviève JACQUINOT-DELAUNAY et José Manuel PÉREZ TORNERO (dir.) (2008), Empowerment Through Media Education, an Intercultural Dialogue. Nordicom, The International…
Marlène Loicq
2012
Corpus ID: 191462242
Cet ouvrage collectif presente une reflexion sur l’education aux medias, dans une perspective internationale, a cheval entre des…
Expand
2012
2012
Induced Resistance to the Anti Microbial Effects of Caffeine in Pseudomonas fluorescens
Samy Behairy
,
E. Huffman
2012
Corpus ID: 18675389
According to Ramanavièienë et al and other scholarly articles Caffeine is an anti-microbial agent with various physiological…
Expand
2011
2011
Privacy Gets a New Round of Prominence
G. Goth
IEEE Internet Computing
2011
Corpus ID: 45787050
A recent round of publicized privacy vulnerabilities on prominent websites has led technologists, regulators, and end users all…
Expand
2010
2010
A comparative study of NN- and EKF-based SFDA schemes with application to a nonlinear UAV model
I. Samy
,
I. Postlethwaite
,
D. Gu
International Journal of Control
2010
Corpus ID: 36199979
In this article, we propose two schemes for sensor fault detection and accommodation (SFDA): one based on a neural network (NN…
Expand
2008
2008
A G / T substitution in intron-1 of UNC 13 B gene is associated with increased risk of nephropathy in patients with type 1 diabetes
D. Tregouet
,
P. Groop
,
+25 authors
N. Vionnet
2008
Corpus ID: 37770457
David-Alexandre Trégouet, PhD, Per-Henrik Groop, Pr, MD, PhD, Steven McGinn, PhD, Carol Forsblom, MD, PhD, Samy Hadjadj, MD, PhD…
Expand
2007
2007
Interrupce nebo život svobodné matky
Bohdana Kezniklová
2007
Corpus ID: 77631081
Bakalařska prace „Interrupce nebo život svobodne matky“ pojednava o možnosti volby mezi životem ci smrti pocateho ditěte. Mnoho…
Expand
Highly Cited
2004
Highly Cited
2004
ELF-Murphy data on defects and tests sets
E. McCluskey
,
Ahmad A. Al-Yamani
,
+5 authors
S. Mitra
22nd IEEE VLSI Test Symposium, . Proceedings.
2004
Corpus ID: 8468348
LSI logic has designed and manufactured two test chips at CRC. These test chips were used to investigate the characteristics of…
Expand
2004
2004
Jak vzniká zisk : manažerský román o tom, že modernítechnologie samy úspěch nezaručí
Eliyahu M. Goldratt
,
Eli Schragenheim
,
Carol Ptak
2004
Corpus ID: 186151753
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE