Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,634,927 papers from all fields of science
Search
Sign In
Create Free Account
Stuxnet
Known as:
Project Myrtus
, Operation Myrtus
, Stuxnet (malware)
Expand
Stuxnet is a malicious computer worm believed to be a jointly built American-Israeli cyberweapon, although no organisation or state has officially…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
Air gap (networking)
Byzantine Foothold
C++
CNET
Expand
Broader (2)
Computer access control
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Cyber Insurance
Quanyan Zhu
Pravo i privreda
2018
Corpus ID: 52901928
This chapter will first present a principal-agent game-theoretic model to capture the interactions between one insurer and one…
Expand
2013
2013
History of malware
Nikola Milovsevi'c
arXiv.org
2013
Corpus ID: 8973083
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof…
Expand
2013
2013
A Multiple Security Domain Model of a Drive-by-Wire System
Gerry Howser
,
B. McMillin
IEEE 37th Annual Computer Software and…
2013
Corpus ID: 12317742
Traditional security models partition the security universe into two distinct and completely separate worlds: us and them. This…
Expand
2013
2013
An Initial Investigation into Attribution in SCADA Systems
A. Nicholson
,
H. Janicke
,
T. Watson
International Symposium for ICS & SCADA Cyber…
2013
Corpus ID: 12936336
Supervisory control and Data Acquisition (SCADA) systems play a core role in a nation's critical infrastructure, overseeing the…
Expand
2012
2012
Classifying network attack scenarios using an ontology
R. V. Heerden
,
Barry V W Irwin
,
I. Burke
2012
Corpus ID: 59882287
Proceedings of the 7th International Conference on Information Warfare and Security, University of Washington, Seattle, 22-23…
Expand
Review
2012
Review
2012
DuQu, Stuxnet, APT and Other Failures of ICS Security
A. Ginter
2012
Corpus ID: 111248802
The Chemical Facilities Anti-Terrorism Standard (CFATS) requires that chemical facilities “Deter cyber sabotage, including by…
Expand
2011
2011
Tackling converged threats: building a security-positive environment
Steve Durbin
Network Security
2011
Corpus ID: 1424048
2011
2011
World War III: The Cyber War
Mandeep Singh Bhatia
International Journal of Cyber Warfare and…
2011
Corpus ID: 32607603
2010
2010
Analysing and Neutralizing the Stuxnet's Stealthing Techniques
Kyungroul Lee
,
Kangbin Yim
2010
Corpus ID: 113750135
This paper introduces Stuxnet, a malicious ware that presently stimulates severity of the cyber warfare worldwide, analyses how…
Expand
1980
1980
Myrtus solomonensis new species from the solomon islands western pacific ocean
A. J. Scott
1980
Corpus ID: 87485377
Arbor usque 9 m alta, sine anteridibus; caules juniores sparse pubescentes. Folia elliptica vel elliptico-lanceolata, 11-27 x 4-7…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE