Vector (malware)

Known as: Attack vector, Vector 
A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Bit coin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transactions are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2015
2015
Interference between processes executing on shared hardware can be used to mount performance-degradation attacks. However, in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2015
2015
Cyberattackers often attack the weakest point of system, which is increasingly the people who use and interact with a computer… (More)
  • table III
  • table IV
Is this relevant?
2014
2014
A new mechanism aimed at misleading a power system control center about the source of a data attack is proposed. As a man-in-the… (More)
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
The Internet of Things (IoT) was of a vision in which all physical objects are tagged and uniquely identified using RFID… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
False data injection attacks have recently been introduced as an important class of cyber attacks against smart grid's wide area… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
The adoption of smartphones, devices transforming from simple communication devices to ‘smart’ and multipurpose devices, is… (More)
  • table 1
  • figure 1
  • table 2
  • table 4
  • table 3
Is this relevant?
2011
2011
As most modern cryptographic Radio Frequency Identification (RFID) devices are based on ciphers that are secure from a purely… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
—— In this paper, we study stealthy false-data attacks against state estimators in power networks. The focus is on applications… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?