Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

ZeroAccess botnet

Known as: ZeroAccess, Zero Access, Sirefef 
ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems. It is used to download other malware on an infected… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Trajectory outlier detection is a fundamental building block for many location-based service (LBS) applications, with a large… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Summary Intrusion detection systems (IDS) are systems aimed at analyzing and detecting security problems. The IDS may be… Expand
  • table 2
  • table 1
  • table 3
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2016
Highly Cited
2016
A new traffic flow behavior analysis method has been proposed to detect botnets irrespective of their control structures… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2014
2014
Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2013
2013
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2012
2012
With urban cities grappling with the problem of energy Shortages and many regions in developing countries still remaining unlit… Expand
  • figure 1
  • figure 4
  • figure 5
  • table I
  • figure 2
Is this relevant?
2012
2012
In this paper, we propose a systematic approach to designing and deploying a RFID Assisted Navigation System (RFID-ANS) for… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
2006
2006
Analysis of worst-case message transmission times in CAN networks is usually performed assuming the availability of an infinite… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2006
2006
Both senders and receivers of telecommunications messages derive benefits, creating the possibility of externalities. We explore… Expand
Is this relevant?