Skip to search formSkip to main contentSkip to account menu

Trojan horse (computing)

Known as: Trojan horse virus, Web Trojans, Trojan software 
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Globalization of Integrated Circuits (IC's) in semiconductor industries has made them vulnerable to intentional alterations of… 
2011
2011
Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times… 
Highly Cited
2004
Highly Cited
2004
2000
2000
In this paper, we examine the dynamical evolution of the asteroid (1868) Thersites 1, a member of the Trojan belt. Thersites is… 
1998
1998
Part I. Introduction to Cognitive Patterns and KADS Object: 1. Introduction to cognitive patterns 2. Introduction to KADS Object… 
1994
1994
convenient, but they are also dangerous. Modes of attacks include the following:. Exhaustive attacks. Attempting password attacks… 
1993
1993
User role-based protection presents a flexible (hence adaptive) means for enforcing differing ranges of security policies. It can… 
1945
1945
enemy's weapon. In the evolution of weapons, which is continuous, there is a cycle. By alternating phases the advantage passes…