Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,393,516 papers from all fields of science
Search
Sign In
Create Free Account
Trojan horse (computing)
Known as:
Trojan horse virus
, Web Trojans
, Trojan software
Expand
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Attack patterns
BIOS
Blackhole exploit kit
Botnet
Expand
Broader (2)
Cyberwarfare
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
ReSeg: A Recurrent Neural Network for Object Segmentation
Francesco Visin
,
Kyle Kastner
,
Aaron C. Courville
,
Yoshua Bengio
,
M. Matteucci
,
Kyunghyun Cho
arXiv.org
2015
Corpus ID: 16680332
We propose a structured prediction architecture for images centered around deep recurrent neural networks. The proposed network…
Expand
Highly Cited
2014
Highly Cited
2014
Report into allegations concerning Birmingham schools arising from the 'Trojan Horse' letter
P. Clarke
2014
Corpus ID: 128853883
Highly Cited
2012
Highly Cited
2012
A sensor-assisted self-authentication framework for hardware trojan detection
A. Davoodi
,
Min Li
,
M. Tehranipoor
Design, Automation and Test in Europe
2012
Corpus ID: 15915157
This work offers a framework which does not rely on a Golden IC (GIC) during hardware Trojan (HT) detection. GIC is a Trojan-free…
Expand
2012
2012
HTOutlier: Hardware Trojan detection with side-channel signature outlier identification
Jie Zhang
,
Haile Yu
,
Q. Xu
IEEE International Symposium on Hardware Oriented…
2012
Corpus ID: 356572
Hardware Trojan (HT) is a growing concern for the semiconductor industry. As a non-invasive and inexpensive approach, side…
Expand
2011
2011
Multi-level attacks: An emerging security concern for cryptographic hardware
Subidh Ali
,
R. Chakraborty
,
Debdeep Mukhopadhyay
,
S. Bhunia
Design, Automation and Test in Europe
2011
Corpus ID: 14771730
Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as…
Expand
Highly Cited
2010
Highly Cited
2010
ANALYSIS OF KEPLER'S SHORT-CADENCE PHOTOMETRY FOR TrES-2b
D. Kipping
,
G. Bakos
2010
Corpus ID: 118381251
We present an analysis of 18 short-cadence (SC) transit light curves of TrES-2b using quarter 0 (Q0) and quarter 1 (Q1) from the…
Expand
Highly Cited
2008
Highly Cited
2008
Mitigating Android Software Misuse Before It Happens
W. Enck
,
Machigar Ongtang
,
P. Mcdaniel
2008
Corpus ID: 852499
Mobile phones running open operating systems such as Google Android will soon be the norm in cellular networks. These systems…
Expand
Highly Cited
2004
Highly Cited
2004
Mobile phone vulnerabilities: a new generation of malware
J. Jamaluddin
,
N. Zotou
,
R. Edwards
,
P. Coulton
IEEE International Symposium on Consumer…
2004
Corpus ID: 43478064
1994
1994
Risks of passwords
P. Neumann
CACM
1994
Corpus ID: 15294586
convenient, but they are also dangerous. Modes of attacks include the following:. Exhaustive attacks. Attempting password attacks…
Expand
Review
1983
Review
1983
Horse behavior. The behavioral traits and adaptations of domestic and wild horses, including ponies.
G. Waring
1983
Corpus ID: 142955540
This informative and easy-to-read book is the most comprehensive and current overview of the behavioral traits of horses and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required