Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,267,387 papers from all fields of science
Search
Sign In
Create Free Account
Stuxnet
Known as:
Project Myrtus
, Operation Myrtus
, Stuxnet (malware)
Expand
Stuxnet is a malicious computer worm believed to be a jointly built American-Israeli cyberweapon, although no organisation or state has officially…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
Air gap (networking)
Byzantine Foothold
C++
CNET
Expand
Broader (2)
Computer access control
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Moving Target Defense Approach to Detecting Stuxnet-Like Attacks
Jue Tian
,
Rui Tan
,
X. Guan
,
Zhanbo Xu
,
Ting Liu
IEEE Transactions on Smart Grid
2020
Corpus ID: 203633716
Recent cybersecurity incidents such as Stuxnet and Irongate alert us to the threats faced by critical cyber-physical systems…
Expand
2018
2018
Secure Randomized Checkpointing for Digital Microfluidic Biochips
Jack Tang
,
Mohamed Ibrahim
,
K. Chakrabarty
,
R. Karri
IEEE Transactions on Computer-Aided Design of…
2018
Corpus ID: 46895539
Digital microfluidic biochips (DMFBs) integrated with processors and arrays of sensors form cyberphysical systems and…
Expand
2018
2018
On PLC network security
Asem Ghaleb
,
Sami Zhioua
,
Ahmad Almulhem
Int. J. Crit. Infrastructure Prot.
2018
Corpus ID: 53016004
Highly Cited
2013
Highly Cited
2013
Stuxnet and the Limits of Cyber Warfare
J. Lindsay
2013
Corpus ID: 154019562
Stuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first instance of a computer network attack…
Expand
Highly Cited
2013
Highly Cited
2013
Firmware modification attacks on programmable logic controllers
Zachry Basnight
,
J. Butts
,
Juan Lopez
,
Thomas E. Dube
Int. J. Crit. Infrastructure Prot.
2013
Corpus ID: 11432564
Highly Cited
2012
Highly Cited
2012
W32.Duqu: The Precursor to the Next Stuxnet
Eric Chien
,
Liam O'Murchu
,
Nicolas Falliere
USENIX Workshop on Large-Scale Exploits and…
2012
Corpus ID: 11647410
On October 14, 2011, we were alerted to a sample by the Laboratory of Cryptography and System Security (CrySyS) at Budapest…
Expand
2012
2012
Intrusion detection for resource-constrained embedded control systems in the power grid
Jason Reeves
,
Ashwin Ramaswamy
,
M. Locasto
,
S. Bratus
,
Sean W. Smith
Int. J. Crit. Infrastructure Prot.
2012
Corpus ID: 11103652
Highly Cited
2011
Highly Cited
2011
Was Stuxnet an Act of War? Decoding a Cyberattack
D. Fidler
IEEE Security and Privacy
2011
Corpus ID: 33448322
Violations of privacy online threaten an individual's sense of security-and relate to the problem of protecting human security in…
Expand
Highly Cited
2011
Highly Cited
2011
Duqu: A Stuxnet-like malware found in the wild
Boldizsár Bencsáth
,
Gábor Pék
,
L. Buttyán
,
M. Félegyházi
2011
Corpus ID: 56933860
Our main two finding can be summarized in the followings: • Stuxnet code is massively re-used in targeted attacks • A new…
Expand
1980
1980
Myrtus solomonensis new species from the solomon islands western pacific ocean
A. J. Scott
1980
Corpus ID: 87485377
Arbor usque 9 m alta, sine anteridibus; caules juniores sparse pubescentes. Folia elliptica vel elliptico-lanceolata, 11-27 x 4-7…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE