Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,261,456 papers from all fields of science
Search
Sign In
Create Free Account
ZeroAccess botnet
Known as:
ZeroAccess
, Zero Access
, Sirefef
Expand
ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems. It is used to download other malware on an infected…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
19 relations
Alureon
Bagle (computer worm)
Bitcoin
Botnet
Expand
Broader (1)
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling
Hao-qing Wu
,
Weiwei Sun
,
Baihua Zheng
CIKM
2017
Corpus ID: 5249375
Trajectory outlier detection is a fundamental building block for many location-based service (LBS) applications, with a large…
Expand
2017
2017
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet
Yizheng Chen
,
Panagiotis Kintis
,
M. Antonakakis
,
Yacin Nadji
,
D. Dagon
,
Michael Farrell
Comput. Secur.
2017
Corpus ID: 41160937
Highly Cited
2017
Highly Cited
2017
Statistical fingerprint‐based intrusion detection system (SF‐IDS)
L. Boero
,
Marco Cello
,
M. Marchese
,
Enrico Mariconti
,
T. Naqash
,
S. Zappatore
Int. J. Commun. Syst.
2017
Corpus ID: 34667210
Intrusion detection systems (IDS) are systems aimed at analyzing and detecting security problems. The IDS may be structured into…
Expand
2017
2017
A Low-Voltage 13T Latch-Type Sense Amplifier with Regenerative Feedback for Ultra Speed Memory Access
V. M. Tripathi
,
Sandeep Mishra
,
Jyotishman Saikia
,
A. Dandapat
30th International Conference on VLSI Design and…
2017
Corpus ID: 6875675
Sense amplifiers provide amplification to the very small voltage change in the memory datapath in near-zero access time. The sub…
Expand
Highly Cited
2016
Highly Cited
2016
Botnet detection via mining of traffic flow characteristics
G. Venkatesh
,
R. Anitha
Comput. Electr. Eng.
2016
Corpus ID: 11692541
Highly Cited
2014
Highly Cited
2014
Characterizing Large-Scale Click Fraud in ZeroAccess
P. Pearce
,
Vacha Dave
,
+6 authors
G. Voelker
CCS
2014
Corpus ID: 8272028
Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting…
Expand
Highly Cited
2013
Highly Cited
2013
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C. Rossow
,
Dennis Andriesse
,
+4 authors
H. Bos
IEEE Symposium on Security and Privacy
2013
Corpus ID: 7771252
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet…
Expand
2006
2006
Evaluating message transmission times in Controller Area Networks without buffer preemption
M. Natale
2006
Corpus ID: 15001019
Analysis of worst-case message transmission times in CAN networks is usually performed assuming the availability of an infinite…
Expand
2006
2006
Customer or Complementor? Intercarrier Compensation with Two-Sided Benefits
Benjamin E. Hermalin
,
M. Katz
2006
Corpus ID: 21329451
Both senders and receivers of telecommunications messages derive benefits, creating the possibility of externalities. We explore…
Expand
1999
1999
The dynamic associative access memory chip and its application to SIMD processing and full-text database retrieval
G. Lipovski
,
Clement T. Yu
Records of the IEEE International Workshop on…
1999
Corpus ID: 44245126
Dynamic Associative Access Memory (DAAM) chips are processor-in-memory chips wherein a large number of small processing elements…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE