Skip to search formSkip to main contentSkip to account menu

ZeroAccess botnet

Known as: ZeroAccess, Zero Access, Sirefef 
ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems. It is used to download other malware on an infected… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Trajectory outlier detection is a fundamental building block for many location-based service (LBS) applications, with a large… 
Highly Cited
2017
Highly Cited
2017
Intrusion detection systems (IDS) are systems aimed at analyzing and detecting security problems. The IDS may be structured into… 
2017
2017
Sense amplifiers provide amplification to the very small voltage change in the memory datapath in near-zero access time. The sub… 
Highly Cited
2016
Highly Cited
2016
Highly Cited
2014
Highly Cited
2014
Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting… 
Highly Cited
2013
Highly Cited
2013
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet… 
2006
2006
Analysis of worst-case message transmission times in CAN networks is usually performed assuming the availability of an infinite… 
2006
2006
Both senders and receivers of telecommunications messages derive benefits, creating the possibility of externalities. We explore… 
1999
1999
Dynamic Associative Access Memory (DAAM) chips are processor-in-memory chips wherein a large number of small processing elements…