Zombie (computer science)

Known as: Zombie virus, Zombie (computing), Computer zombie 
In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2012
2012
Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 4
  • figure 7
Is this relevant?
2010
2010
Idle port scanning uses side-channel attacks to bounce scans off of a “zombie” host to stealthily scan a victim IP address and… (More)
Is this relevant?
2010
2010
In the literature on Alzheimer’s disease (AD), scholars have noted how both the disease and the people who are diagnosed as… (More)
Is this relevant?
2009
2009
One of the most important threats to personal and corporate Internet security is the proliferation of Zombie PCs operating as an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper describes an investigation into how real-time but low-cost biometric information can be interpreted by computer games… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Client puzzles have been advocated as a promising countermeasure to denial-of-service (DoS) attacks in recent years. However, how… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2006
2006
How can better email worms be created? How can spyware claim more victims? How can better spam be sent? It turns out that these… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
There is a growing interest in designing high-speed network devices to perform packet processing at semantic levels above the… (More)
  • table 1
  • figure 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
1991
1991
Subtle differences in the method of constructing arguments in inheritance systems can result in profound differences in both the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 7
Is this relevant?