Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,998,867 papers from all fields of science
Search
Sign In
Create Free Account
Threat (computer)
Known as:
Threat (disambiguation)
, Threat agent
, Threat detection
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. A threat…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anomaly Detection at Multiple Scales
Asset (computer security)
Attack tree
Automated threat
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Relationships between Scotch broom (Cytisus scoparius), soil nutrients, and plant diversity in the Garry oak savannah ecosystem
Jacqueline Shaben
,
J. Myers
Plant Ecology
2010
Corpus ID: 27411098
Scotch broom (Cytisus scoparius), is a leguminous shrub, native to the Mediterranean, which has invaded most of the remaining…
Expand
Highly Cited
2008
Highly Cited
2008
A study on secure RFID mutual authentication scheme in pervasive computing environment
Sooyoung Kang
,
Deok-Gyu Lee
,
Imyeong Lee
Computer Communications
2008
Corpus ID: 2497889
Highly Cited
2007
Highly Cited
2007
Practical application of a land resources information system for agricultural landscape planning
F. Saroinsong
,
K. Harashina
,
H. Arifin
,
K. Gandasasmita
,
K. Sakamoto
2007
Corpus ID: 21708247
Highly Cited
2005
Highly Cited
2005
The role of plants and plant-based research and development in managing dryland salinity in Australia
A. Ridley
,
D. Pannell
2005
Corpus ID: 83911896
The roles of plant-based systems and plant-based research and development for management of dryland salinity in southern…
Expand
Review
2005
Review
2005
The conservation significance of the proposed Mbaéré-Bodingué national park, Central African Republic, with special emphasis on its primate community
D. Brugière
,
D. Sakom
,
A. Gautier-hion
Biodiversity and Conservation
2005
Corpus ID: 19322328
The proposed Mbaéré-Bodingué National Park (872 km2) is located in the southwestern part of the Central African Republic and…
Expand
Highly Cited
2004
Highly Cited
2004
Mobile phone vulnerabilities: a new generation of malware
J. Jamaluddin
,
N. Zotou
,
R. Edwards
,
P. Coulton
IEEE International Symposium on Consumer…
2004
Corpus ID: 43478064
Highly Cited
2001
Highly Cited
2001
Song type matching as threat: a test using interactive playback
J. Burt
,
S. Campbell
,
M. D. Beecher
Animal Behaviour
2001
Corpus ID: 39450228
Neighbouring song sparrows, Melospiza melodia, in our Seattle population share song types and sometimes respond to neighbour song…
Expand
Highly Cited
1991
Highly Cited
1991
Temporary Work in Western Europe: Threat or Complement to Permanent Employment?.
A. Bronstein
1991
Corpus ID: 150786314
Highly Cited
1990
Highly Cited
1990
Song and information about aggressive responses of blackbirds, Turdus merula: evidence from interactive playback experiments with territory owners
T. Dabelsteen
,
S. Pedersen
Animal Behaviour
1990
Corpus ID: 53167916
Highly Cited
1989
Highly Cited
1989
Female-female aggression and male indifference in response to unfamiliar intruders in lion tamarins
J. French
,
B. J. Inglett
Animal Behaviour
1989
Corpus ID: 53176468
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE