Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,238,899 papers from all fields of science
Search
Sign In
Create Free Account
Virus Bulletin
Virus Bulletin is a magazine about the prevention, detection and removal of malware and spam. It regularly features analyses of the latest virus…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
360安全卫士 (360 Safeguard)
Antivirus software
Comparison of antivirus software
Dr. Web
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A neural network controller new methodology for the ATR-42 morphing wing actuation
A. B. Mosbah
,
R. Botez
,
T. Dao
,
M. Guezguez
,
Mahdi Zaag
2016
Corpus ID: 56394640
A morphing wing model is used to improve aircraft performance. To obtain the desired airfoils, electrical actuators are used…
Expand
2014
2014
Ancient Maxim, Modern Problems: De Minimis, Cumulative Environmental Effects and Risk-Based Regulation
M. Olszynski
2014
Corpus ID: 152483692
This article considers the questions of when and how the ancient common law maxim de minimis non curat lex – the law does not…
Expand
2013
2013
Exploiting visual appearance to cluster and detect rogue software
Christian J. Dietrich
,
C. Rossow
,
N. Pohlmann
ACM Symposium on Applied Computing
2013
Corpus ID: 15126342
Rogue software, such as Fake A/V and ransomware, trick users into paying without giving return. We show that using a perceptual…
Expand
2011
2011
Effectiveness and efficiency of a customized versus conventional orthodontic bracket system
D. J. Weber
2011
Corpus ID: 16454835
DENNIS J. WEBER II: Effectiveness and Efficiency of a Customized Versus Conventional Orthodontic Bracket System (Under the…
Expand
2011
2011
International Arms Control and Law Enforcement in the Information Revolution
Yury Barmin
,
Grace Jones
,
Zev Winkelman
,
S. Moiseeva
2011
Corpus ID: 167700693
Cyberspace infl uences nearly every human being in the world, as well as virtually every area of government, industry, commerce…
Expand
2008
2008
Intellectual property, copyright, and fair use in education
S. Lakhan
,
M. Khurana
Academic Leadership: The Online Journal
2008
Corpus ID: 151236882
As with other rights, such as liberty and organization, intellectual property (IP) rights are oftenoverlooked or disregarded…
Expand
2003
2003
Dale Dry Lake -- New Classification, Revised Recovery Information
Robert S. Verish
2003
Corpus ID: 16225253
Introduction: This paper reports on a recent characterization of the Dale Dry Lake meteorite by researchers at UCLA. This stone…
Expand
2000
2000
The Evolving Virus Threat
Carey Nachenberg
2000
Corpus ID: 14394267
Over the past twenty years, computer viruses have evolved from simple computer programs capable of spreading on a single PC to…
Expand
1999
1999
Viruses and Lotus Notes:- Have the Virus Writers Finally Met Their Match?
Martin Overton
1999
Corpus ID: 110599328
companies are standardising on Lotus Notes/Domino as a groupware solution. With this move towards a standard groupware product…
Expand
Review
1964
Review
1964
Survey Method in Approaching Library Problems
M. F. Tauber
1964
Corpus ID: 61819272
ANY L I B R A R I A N W H O E X A M I N E S Library Literature will soon be aware of the number and kinds of library surveys…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE