Skip to search formSkip to main contentSkip to account menu

Trojan horse (computing)

Known as: Trojan horse virus, Web Trojans, Trojan software 
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
We propose a structured prediction architecture for images centered around deep recurrent neural networks. The proposed network… 
Highly Cited
2012
Highly Cited
2012
This work offers a framework which does not rely on a Golden IC (GIC) during hardware Trojan (HT) detection. GIC is a Trojan-free… 
2012
2012
Hardware Trojan (HT) is a growing concern for the semiconductor industry. As a non-invasive and inexpensive approach, side… 
2011
2011
Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as… 
Highly Cited
2010
Highly Cited
2010
We present an analysis of 18 short-cadence (SC) transit light curves of TrES-2b using quarter 0 (Q0) and quarter 1 (Q1) from the… 
Highly Cited
2008
Highly Cited
2008
Mobile phones running open operating systems such as Google Android will soon be the norm in cellular networks. These systems… 
Highly Cited
2004
Highly Cited
2004
1994
1994
convenient, but they are also dangerous. Modes of attacks include the following:. Exhaustive attacks. Attempting password attacks… 
Review
1983
Review
1983
This informative and easy-to-read book is the most comprehensive and current overview of the behavioral traits of horses and…