Skip to search formSkip to main contentSkip to account menu

Vector (malware)

Known as: Attack vector, Vector 
A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
The area of leakage resilient cryptography aims to provide proofs under the assumption that the side channel leakage of… 
Review
2018
Review
2018
This paper presents an adaptive framework (web application) that supports secure, end-to-end Internet of Things (IoT) sensing… 
2016
2016
This paper presents an injection and clustering-based sanitization framework, i.e. JS-SAN (JavaScript SANitizer) for the… 
2014
2014
This paper introduces a new method for attacking Personal Identification Numbers (PINs) through analysis of time delay between… 
2013
2013
Privacy concerns in smart metering are one of the most discussed challenges encountered by introducing the smart grid. Several… 
Review
2013
Review
2013
The 2-dimensional barcodes known as QR (Quick Response) Codes are increasing their popularity as they appear in more places in… 
2011
2011
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz…