Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,728,532 papers from all fields of science
Search
Sign In
Create Free Account
Security Shield
Known as:
SecurityShield
Security Shield (also known as SecurityShield) is a series of rogue security software programs that asks for an amount of money to get the "full…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Malware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Lightweight code self-verification using return-oriented programming in resilient IoT
R. Shrivastava
,
C. Hota
2020
Corpus ID: 213291596
2011
2011
IMPACTS OF U.S. MILITARY PRESENCE IN THE ARABIC COUNTRIES OF PERSIAN GULF SECURITY SHIELD OR REDUCE OF LEGITIMACY
Darvishi Farhad
,
Jalilvand Ameneh
2011
Corpus ID: 131300270
Persian Gulf region, due to its own Geostrategic position has always historically witnessed the presence of foreign powers as…
Expand
2010
2010
A cluster based secure architecture for vehicular ad hoc networks
Tahani Gazdar
,
A. Belghith
,
A. Benslimane
ACS/IEEE International Conference on Computer…
2010
Corpus ID: 10289869
In this paper, we propose a dynamic PKI for vehicular ad hoc networks aiming to distribute the role of the central certification…
Expand
2010
2010
A K / N Attack-Resilient ICT Shield for SCADA Systems , with State Based Attack Detection
I. N. Fovino
,
A. Carcano
,
M. Guglielmi
,
M. Masera
2010
Corpus ID: 20388970
The security of Critical Infrastructures has become a prominent problem with the advent of modern ICT technologies used to…
Expand
Highly Cited
2009
Highly Cited
2009
A secure and improved self-embedding algorithm to combat digital document forgery
A. Cheddad
,
J. Condell
,
K. Curran
,
P. Kevitt
Signal Processing
2009
Corpus ID: 13838044
2009
2009
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network
Li Feng
,
Zili Li
,
Yi Zhang
Journal of Network and Computer Applications
2009
Corpus ID: 26621112
2006
2006
Soft computing agents for e-Health in application to the research and control of unknown diseases
M. Ulieru
,
M. Hadzic
,
E. Chang
Information Sciences
2006
Corpus ID: 23384412
2006
2006
Security shield integral with tap faceplate
诺厄·蒙泰纳
2006
Corpus ID: 134415088
The present invention provides a security shield integral with a CATV tap faceplate. The device comprises a substantially…
Expand
2002
2002
Privacy and security shield for health information systems (e-Health)
M. Ulieru
,
Dan Ionescu
Proceedings of the Annual Hawaii International…
2002
Corpus ID: 29705610
The objective of this work is to develop a platform supporting the secure and quick deployment of distributed medical…
Expand
1993
1993
Elusive security: The military and political geography of South Lebanon
H. Clive
1993
Corpus ID: 154876766
Israel's quest for security on its northern border with Lebanon has a history dating back to the foundation of the Palestine…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE