Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Trojan horse (computing)

Known as: Trojan horse virus, Web Trojans, Trojan software 
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2010
Review
2010
Editor's note:Today's integrated circuits are vulnerable to hardware Trojans, which are malicious alterations to the circuit… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
We expect a future where we are surrounded by embedded devices, ranging from Java-enabled cell phones to sensor networks and… Expand
  • figure 2
  • figure 1
  • figure 5
  • figure 4
Highly Cited
2002
Highly Cited
2002
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services have reached tens of millions… Expand
  • figure 1
  • figure 2
  • figure 3
Review
1999
Review
1999
(Each chapter concludes with a Summary, Nomenclature Introduced, and Readings. Foreword. Preface. 1. Introduction: The Need for… Expand
Highly Cited
1998
Highly Cited
1998
Abstract Because it is so difficult to monitor and manage every aspect of biodiversity, several shortcuts have been proposed… Expand
Highly Cited
1998
Highly Cited
1998
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction… Expand
  • table 2
  • table 1
Highly Cited
1995
Highly Cited
1995
The classic guide to network securityi¾–now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet… Expand
Review
1993
Review
1993
Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1987
Highly Cited
1987
  • D. Denning
  • IEEE Transactions on Software Engineering
  • 1987
  • Corpus ID: 10028835
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand