Threat (computer)

Known as: Threat (disambiguation), Threat Agent, Threat detection 
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. A threat… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1953-2018
050019532017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Reliable information security mechanisms are required to combat the rising magnitude of identity theft in our society. While… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most memory corruption attacks and Internet worms follow a familiar pattern known as the control-data attack. Hence, many… (More)
  • figure 1
  • table 1
  • figure 2
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • 2005
At the psychological level the reasons for holding or for changing attitudes are found in the functions they perform for the… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • table 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
When women perform math, unlike men, they risk being judged by the negative stereotype that women have weaker math ability. We… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
1994
Highly Cited
1994
HABITAT destruction is the major cause of species extinctions1–3. Dominant species often are considered to be free of this threat… (More)
Is this relevant?