Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,763 papers from all fields of science
Search
Sign In
Create Free Account
Zombie (computer science)
Known as:
Zombie virus
, Zombie (computing)
, Computer zombie
Expand
In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Alureon
Bagle (computer worm)
Blue Frog
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
DDoS attack detection using machine learning techniques in cloud computing environments
Marwane Zekri
,
S. E. Kafhali
,
N. Aboutabit
,
Y. Saadi
International Conference on Cloud Computing…
2017
Corpus ID: 46877551
Cloud computing is a revolution in IT technology that provides scalable, virtualized on-demand resources to the end users with…
Expand
2017
2017
Value, violence, and the ethics of gaming
Michael Goerger
Ethics and Information Technology
2017
Corpus ID: 30850122
I argue for two theses. First, many arguments against violent gaming rely on what I call the contamination thesis, drawing their…
Expand
2015
2015
Zombies Go to Toronto: Zombifying Shame in Nalo Hopkinson’s Brown Girl in the Ring
Rebecca Romdhani
2015
Corpus ID: 56225499
Caribbean-Canadian Nalo Hopkinson’s speculative fiction novel Brown Girl in the Ring (1998) is set in a near future dystopian…
Expand
Highly Cited
2013
Highly Cited
2013
Preventing DDoS attacks by identifier/locator separation
Hongbin Luo
,
Yi Lin
,
Hongke Zhang
,
M. Zukerman
IEEE Network
2013
Corpus ID: 12769860
Identifier/locator separation is a promising solution to the current Internet scaling problems. In this article, we argue that…
Expand
Highly Cited
2012
Highly Cited
2012
Tackling Application-layer DDoS Attacks
Hakem Beitollahi
,
Geert Deconinck
ANT/MobiWIS
2012
Corpus ID: 2669548
Highly Cited
2012
Highly Cited
2012
Slaves, Cannibals, and Infected Hyper-Whites: The Race and Religion of Zombies
E. Mcalister
2012
Corpus ID: 144725423
The first decade of the new millennium saw renewed interest in popular culture featuring zombies. This essay shows that a…
Expand
Highly Cited
2011
Highly Cited
2011
Where the Conflict Really Lies: Science, Religion, and Naturalism
Alvin Plantinga
2011
Corpus ID: 169075480
Chapter 1 Evolution and Christian Belief (1) Chapter 2 Evolution and Christian Belief (2) Chapter 3 Divine Action in the World…
Expand
Highly Cited
2007
Highly Cited
2007
Please Biofeed the Zombies: Enhancing the Gameplay and Display of a Horror Game Using Biofeedback
A. Dekker
,
Erik Malcolm Champion
DiGRA Conference
2007
Corpus ID: 15607079
This paper describes an investigation into how real-time but low-cost biometric information can be interpreted by computer games…
Expand
Highly Cited
2005
Highly Cited
2005
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Zhenkai Liang
,
R. Sekar
Conference on Computer and Communications…
2005
Corpus ID: 8675081
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society…
Expand
Highly Cited
2005
Highly Cited
2005
Robust TCP Stream Reassembly in the Presence of Adversaries
Sarang Dharmapurikar
,
V. Paxson
USENIX Security Symposium
2005
Corpus ID: 16051139
There is a growing interest in designing high-speed network devices to perform packet processing at semantic levels above the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE