Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,975,959 papers from all fields of science
Search
Sign In
Create Free Account
Zombie (computer science)
Known as:
Zombie virus
, Zombie (computing)
, Computer zombie
Expand
In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Alureon
Bagle (computer worm)
Blue Frog
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Reseña: Zombie, de Mike Wilson #NotAboutZombies
Daniel Guajardo
2015
Corpus ID: 192562826
Review
2014
Review
2014
Investigating the Dynamics of Bystander Behavior in Child Sexual Abuse Incidents
C. Leonard
2014
Corpus ID: 140411066
It is well known that child sexual abuse is a long standing problem in society. Much has been researched concerning the pedophile…
Expand
2014
2014
Managing DDoS attacks on Virtual Machines by Segregated Policy Management
E. Krishna
,
E.Sandhya
,
M. Karthik
2014
Corpus ID: 168968997
Security is considered as most crucial aspect in cloud computing. It has attracted lots of research in the recent years. On the…
Expand
2014
2014
Individualization and the aporias of modernity
V. Argyrou
2014
Corpus ID: 148689843
Ulrich Beck’s musings on individualization have been described as a theory that provides a convincing explanation of what is…
Expand
2014
2014
Ze śmiercią im do twarzy: żywe trupy końca XX wieku
Mikołaj Marcela
2014
Corpus ID: 190135301
Mikolaj Marcela Death Becomes Them: Living Dead at the End of the 20th Century It seems that the return of the living dead in…
Expand
2012
2012
Things Come Alive: Rise of the Zombies
S. Christiansen
2012
Corpus ID: 186776955
2007
2007
How to Build a Robot Army: Tips on Defending Planet Earth Against Alien Invaders, Ninjas, and Zombies
Daniel H. Wilson
2007
Corpus ID: 111811039
Defend yourselfand your planetagainst the onslaught of evil at your door. It goes without saying that robots kill. They hunt…
Expand
2005
2005
A Study of Make-up Artists and Character's Special Make-up Effects in the Twentieth Century's Films
Chang Mee-Sook
,
Yang Sook-hi
2005
Corpus ID: 190568303
This study was motivated not only by the important role of the special make-up effects in films, but also by the prominent…
Expand
2004
2004
Malicious codes in depth Taxonomy of malicious Code
M. Heidari
2004
Corpus ID: 9737457
Malicious code refers to a broad category of software threats to your network and systems. Perhaps the most sophisticated types…
Expand
1996
1996
Explaining the evolution of consciousness: The other hard problem
Thomas W. Polger
,
O. Flanagan
1996
Corpus ID: 141507484
Recently some philosophers interested in consciousness have begun to turn their attention to the question of what evolutionary…
Expand