Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,864,830 papers from all fields of science
Search
Sign In
Create Free Account
Vector (malware)
Known as:
Attack vector
, Vector
A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Attack surface
Buffer overflow
Computer virus
JavaScript
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Exploring the Golden Mean Between Leakage and Fault Resilience and Practice
Christoph Dobraunig
,
Bart Mennink
,
R. Primas
IACR Cryptology ePrint Archive
2020
Corpus ID: 211221637
The area of leakage resilient cryptography aims to provide proofs under the assumption that the side channel leakage of…
Expand
Review
2018
Review
2018
An Energy-Efficient Secure Adaptive Cloud-of-Things (CoT) Framework to Facilitate Undergraduate STEM Education
J. He
,
Meng Han
,
P. Bobbie
Conference on Information Technology Education
2018
Corpus ID: 53089523
This paper presents an adaptive framework (web application) that supports secure, end-to-end Internet of Things (IoT) sensing…
Expand
2016
2016
JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities
Shashank Gupta
,
B. Gupta
Secur. Commun. Networks
2016
Corpus ID: 23567868
This paper presents an injection and clustering-based sanitization framework, i.e. JS-SAN (JavaScript SANitizer) for the…
Expand
2015
2015
vulnerabilities IDENTIFYING AND ADDRESSING THE
K. Slavov
,
D. Migault
,
M. Pourzandi
2015
Corpus ID: 33621739
2014
2014
Attacking Random Keypads through Click Timing Analysis
Charles Fleming
,
Ning Cui
,
Dawei Liu
,
Hai-Ning Liang
International Conference on Cyber-Enabled…
2014
Corpus ID: 1267830
This paper introduces a new method for attacking Personal Identification Numbers (PINs) through analysis of time delay between…
Expand
2013
2013
Pseudonymous Smart Metering without a Trusted Third Party
Sören Finster
,
Ingmar Baumgart
12th IEEE International Conference on Trust…
2013
Corpus ID: 17874390
Privacy concerns in smart metering are one of the most discussed challenges encountered by introducing the smart grid. Several…
Expand
Review
2013
Review
2013
Security of QR Codes
Ioannis Kapsalis
2013
Corpus ID: 55619150
The 2-dimensional barcodes known as QR (Quick Response) Codes are increasing their popularity as they appear in more places in…
Expand
2011
2011
The state of HTTP declarative security in online banking websites
Aditya K. Sood
,
R. Enbody
2011
Corpus ID: 62733256
2011
2011
L-WMxD: Lexical based Webmail XSS Discoverer
Zhushou Tang
,
Haojin Zhu
,
Z. Cao
,
Shuai Zhao
Conference on Computer Communications Workshops
2011
Corpus ID: 17158276
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz…
Expand
2006
2006
XSS Viruses: Cross-site scripting viruses and worms - a new attack vector
Wade Alcorn
2006
Corpus ID: 62243021
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE