Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,463,648 papers from all fields of science
Search
Sign In
Create Free Account
Trojan horse (computing)
Known as:
Trojan horse virus
, Web Trojans
, Trojan software
Expand
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Attack patterns
BIOS
Blackhole exploit kit
Botnet
Expand
Broader (2)
Cyberwarfare
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Cloud Computing Adoption Framework – a security framework for business clouds
V. Chang
,
Yen-Hung Kuo
,
M. Ramachandran
2015
Corpus ID: 1100685
This paper presents a Cloud Computing Adoption Framework (CCAF) security suitable for business clouds. CCAF multi-layered…
Expand
Highly Cited
2012
Highly Cited
2012
Logic encryption: A fault analysis perspective
Jeyavijayan Rajendran
,
Youngok Pino
,
O. Sinanoglu
,
R. Karri
Design, Automation and Test in Europe
2012
Corpus ID: 7168570
The globalization of Integrated Circuit (IC) design flow is making it easy for rogue elements in the supply chain to pirate ICs…
Expand
Highly Cited
2011
Highly Cited
2011
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
Roman Schlegel
,
Kehuan Zhang
,
Xiao-yong Zhou
,
Mehool Intwala
,
Apu Kapadia
,
Xiaofeng Wang
Network and Distributed System Security Symposium
2011
Corpus ID: 15950349
We explore the threat of smartphone malware with access to on-board sensors, which opens new avenues for illicit collection of…
Expand
Highly Cited
2011
Highly Cited
2011
Internet of Things Security Analysis
G. Gan
,
Zeyong Lu
,
Jun Jiang
Information Theory and Applications Workshop
2011
Corpus ID: 16740400
Internet of Things is an up-and-coming information and technology industry, and in such an environment of the concept and the…
Expand
Highly Cited
2009
Highly Cited
2009
On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
A. Bossler
,
T. Holt
2009
Corpus ID: 14469467
IntroductionThe Internet and World Wide Web have dramatically altered the way we communicate, live, and conduct business around…
Expand
Highly Cited
2007
Highly Cited
2007
Detecting System Emulators
Thomas Raffetseder
,
Christopher Krügel
,
E. Kirda
Information Security Conference
2007
Corpus ID: 12025670
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or…
Expand
Highly Cited
2006
Highly Cited
2006
Dynamic Analysis of Malicious Code
Ulrich Bayer
,
Andreas Moser
,
Christopher Krügel
,
E. Kirda
Journal in Computer Virology
2006
Corpus ID: 17075499
Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or…
Expand
Highly Cited
2005
Highly Cited
2005
Responsibility to Protect or Trojan Horse? The Crisis in Darfur and Humanitarian Intervention after Iraq
A. Bellamy
Ethics and International Affairs
2005
Corpus ID: 155040762
What does the world's engagement with the unfolding crisis in Darfur tell us about the impact of the Iraq war on the norm of…
Expand
Highly Cited
2004
Highly Cited
2004
Mobile phones as computing devices: the viruses are coming!
D. Dagon
,
T. Martin
,
Thad Starner
IEEE pervasive computing
2004
Corpus ID: 14224399
Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers…
Expand
Highly Cited
1995
Highly Cited
1995
Holding intruders accountable on the Internet
Stuart Staniford-Chen
,
Todd L. Heberlein
Proceedings IEEE Symposium on Security and…
1995
Corpus ID: 16313883
This paper addresses the problem of tracing intruders who obscure their identity by logging through a chain of multiple machines…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE