Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,151,265 papers from all fields of science
Search
Sign In
Create Free Account
Trojan horse (computing)
Known as:
Trojan horse virus
, Web Trojans
, Trojan software
Expand
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Attack patterns
BIOS
Blackhole exploit kit
Botnet
Expand
Broader (2)
Cyberwarfare
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Report into allegations concerning Birmingham schools arising from the 'Trojan Horse' letter
P. Clarke
2014
Corpus ID: 128853883
2014
2014
Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology
Dinesh Kumar Karunakaran
,
N. Mohankumar
International Conference on Computing…
2014
Corpus ID: 14039030
Globalization of Integrated Circuits (IC's) in semiconductor industries has made them vulnerable to intentional alterations of…
Expand
2011
2011
Poster : HoneyDroid-Creating a Smartphone Honeypot
Collin Mulliner
,
Steffen Liebergeld
,
Matthias Lange
2011
Corpus ID: 18385459
Attacks against smartphones are becoming commonplace today, especially since they are connected to the Internet at all times…
Expand
Highly Cited
2004
Highly Cited
2004
Mobile phone vulnerabilities: a new generation of malware
J. Jamaluddin
,
N. Zotou
,
R. Edwards
,
P. Coulton
IEEE International Symposium on Consumer…
2004
Corpus ID: 43478064
2000
2000
Thersites: a `jumping' Trojan?
K. Tsiganis
,
R. Dvorak
,
E. Pilat-Lohinger
2000
Corpus ID: 18293308
In this paper, we examine the dynamical evolution of the asteroid (1868) Thersites 1, a member of the Trojan belt. Thersites is…
Expand
1998
1998
Cognitive Patterns: Problem-Solving Frameworks for Object Technology
Kathryn M. Gardner
,
Alexander M. Rush
,
Michael K. Crist
,
Robert Konitzer
,
B. Teegarden
1998
Corpus ID: 60413617
Part I. Introduction to Cognitive Patterns and KADS Object: 1. Introduction to cognitive patterns 2. Introduction to KADS Object…
Expand
1994
1994
Risks of passwords
P. Neumann
CACM
1994
Corpus ID: 15294586
convenient, but they are also dangerous. Modes of attacks include the following:. Exhaustive attacks. Attempting password attacks…
Expand
1993
1993
Role-based security: pros, cons, & some research directions
M. Nyanchama
,
Sylvia L. Osborn
SGSC
1993
Corpus ID: 18311257
User role-based protection presents a flexible (hence adaptive) means for enforcing differing ranges of security policies. It can…
Expand
1978
1978
Genetic variation in wild horse mice: where natural selection and history meet.
Berry Rj
1978
Corpus ID: 84028064
1945
1945
Helmets and Body Armor in Modern Warfare
S. V. Grancsay
1945
Corpus ID: 36756501
enemy's weapon. In the evolution of weapons, which is continuous, there is a cycle. By alternating phases the advantage passes…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required