Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,705,617 papers from all fields of science
Search
Sign In
Create Free Account
Stuxnet
Known as:
Project Myrtus
, Operation Myrtus
, Stuxnet (malware)
Expand
Stuxnet is a malicious computer worm believed to be a jointly built American-Israeli cyberweapon, although no organisation or state has officially…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
47 relations
Air gap (networking)
Byzantine Foothold
C++
CNET
Expand
Broader (2)
Computer access control
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter
2014
Corpus ID: 106977452
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Irans nuclear efforts and shows how its…
Expand
Highly Cited
2013
Highly Cited
2013
The real story of stuxnet
D. Kushner
IEEE Spectrum
2013
Corpus ID: 29782870
The paper discusses how Kaspersky Lab tracked down the malware that stymied Iran's nuclear-fuel enrichment program.
Highly Cited
2013
Highly Cited
2013
Stuxnet and the Limits of Cyber Warfare
J. Lindsay
2013
Corpus ID: 154019562
Stuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first instance of a computer network attack…
Expand
Highly Cited
2012
Highly Cited
2012
The Cousins of Stuxnet: Duqu, Flame, and Gauss
Boldizsár Bencsáth
,
G. Pék
,
L. Buttyán
,
M. Félegyházi
Future Internet
2012
Corpus ID: 14413078
Stuxnet was the first targeted malware that received worldwide attention forcausing physical damage in an industrial…
Expand
Highly Cited
2011
Highly Cited
2011
Stuxnet: Dissecting a Cyberwarfare Weapon
Ralph Langner
IEEE Security & Privacy
2011
Corpus ID: 206485737
Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as…
Expand
Highly Cited
2011
Highly Cited
2011
Stuxnet worm impact on industrial cyber-physical system security
S. Karnouskos
IECON - 37th Annual Conference of the IEEE…
2011
Corpus ID: 1980890
Industrial systems consider only partially security, mostly relying on the basis of “isolated” networks, and controlled access…
Expand
Highly Cited
2011
Highly Cited
2011
Lessons from Stuxnet
Thomas M. Chen
,
Saeed Abu-Nimeh
Computer
2011
Corpus ID: 16442580
The article mentions that the malware such as Stuxnet can affect critical physical infrastructures that are controlled by…
Expand
Highly Cited
2011
Highly Cited
2011
Duqu: A Stuxnet-like malware found in the wild
Boldizsár Bencsáth
,
G. Pék
,
L. Buttyán
,
M. Félegyházi
2011
Corpus ID: 56933860
Our main two finding can be summarized in the followings: • Stuxnet code is massively re-used in targeted attacks • A new…
Expand
2011
2011
Stuxnet and Strategy: A Special Operation in Cyberspace?
Lukas Milevski
2011
Corpus ID: 4815258
By L U K A S M I L E V S K I C yberpower has posed a challenge for strategists since its advent, and the questions have only…
Expand
Highly Cited
2010
Highly Cited
2010
Stuxnet, the real start of cyber warfare? [Editor's Note]
T. M. Chen
IEEE Netw.
2010
Corpus ID: 46718688
In recent years, the press has been banging the drums about the prospects of cyber warfare between nations. It makes a good story…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE