Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Spy vs. Spy

Known as: Spy vs. Spy 2, Spy vs. spy 3, Spy vs. Spy II: The Island Caper 
Spy vs. Spy was a game first published by First Star Software in 1984 for the Atari 8-bit family, Commodore 64 and Apple II computers. It was a two… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Abstract Capparis spinosa is a perennial plant growing wild in various regions of the world, particularly in Mediterranean basin… Expand
2019
2019
A Florida man who conceded to installing a “spy camera” in his family friend’s residence was arrested and charged, authorities… Expand
Highly Cited
2015
Highly Cited
2015
Anonymous messaging platforms, such as Secret, Yik Yak and Whisper, have emerged as important social media for sharing one's… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2015
2015
  • Cong Pu, Sunho Lim
  • MILCOM - IEEE Military Communications…
  • 2015
  • Corpus ID: 1180312
Selective forwarding attack is one of well-known denial-of-service (DoS) attacks, and designing its countermeasure is critical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2015
2015
The goal of a rumor source node in a social network is to spread its rumor to as many nodes as possible, while remaining hidden… Expand
  • figure 1
  • figure 2
  • figure 3
2015
2015
General Game Playing is the design of AI systems able to understand the rules of new games and to use such descriptions to play… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
2012
2012
Scholars of intelligence and comparative politics have tended to overlook intelligence services as bureaucratic organizations and… Expand
2012
2012
Abstract : Historically, the practice of the U.S. Government was to maintain virtual and legal walls among law enforcement, the… Expand
Highly Cited
2008
Highly Cited
2008
Abstract Text Over a period of sixteen years elliptic curve cryptography went from being an approach that many people mistrusted… Expand