Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,017,888 papers from all fields of science
Search
Sign In
Create Free Account
Antivirus software
Known as:
Virus scan
, Anti-virus product
, A.V. Software
Expand
Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AVG
Antichrist (virus hoax)
Avast Antivirus
BIOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
On information loss in AdS3/CFT2
A. Fitzpatrick
,
J. Kaplan
,
Daliang Li
,
Junpu Wang
Journal of High Energy Physics
2016
Corpus ID: 115133896
We discuss information loss from black hole physics in AdS3, focusing on two sharp signatures infecting CFT2 correlators at large…
Expand
Highly Cited
2014
Highly Cited
2014
Privacy-Preserving Public Auditing For Secure Cloud Storage
Mr. Navanath Jadhav
,
Mrs. L.Laxmi
2014
Corpus ID: 9074320
By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put…
Expand
Review
2010
Review
2010
THE LONG-TERM EVOLUTION OF THE GALACTIC DISK TRACED BY DISSOLVING STAR CLUSTERS
J. Bland-Hawthorn
,
M. Krumholz
,
K. Freeman
2010
Corpus ID: 119119734
The Galactic disk retains vast amount of information about how it came to be and how it evolved over cosmic time. However, we…
Expand
Highly Cited
2006
Highly Cited
2006
Biogeographic and nearshore-offshore trends in isotope ratios of intertidal mussels and their food sources around the coast of southern Africa
J. Hill
,
C. McQuaid
,
S. Kaehler
2006
Corpus ID: 56031263
There are broad differences in oceanography and primary production around the south- ern African coast that are likely to give…
Expand
Highly Cited
2004
Highly Cited
2004
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
Benoît Libert
,
J. Quisquater
International Conference on Theory and Practice…
2004
Corpus ID: 5604544
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the Diffie-Hellman problem in Gap…
Expand
Highly Cited
2004
Highly Cited
2004
Protocol analysis in intrusion detection using decision tree
Tarek Abbes
,
A. Bouhoula
,
M. Rusinowitch
International Conference on Information…
2004
Corpus ID: 5107531
Network based intrusion detection are the most deployed IDS. They frequently rely on signature matching detection method and…
Expand
Highly Cited
2001
Highly Cited
2001
Ion microprobe UPb zircon geochronology and isotopic evidence for a trans-crustal suture in the Lapland–Kola Orogen, northern Fennoscandian Shield
J. Daly
,
V. Balagansky
,
+6 authors
D. Bridgwater
2001
Corpus ID: 26591901
Highly Cited
2000
Highly Cited
2000
Variability in mercury concentrations of great skuas Catharacta skua: the influence of colony, diet and trophic status inferred from stable isotope signatures
S. Bearhop
,
R. Phillips
,
Thompson
,
S. Waldron
,
R. Furness
2000
Corpus ID: 38292367
A range of parameters thought to contribute to intra-specific variation in mercury levels were investigated using the feathers…
Expand
Highly Cited
1990
Highly Cited
1990
Weak-link-free behaviour of high-angle YBa2Cu3O7–δ grain boundaries in high magnetic fields
S. Babcock
,
X. Cai
,
D. Kaiser
,
D. Larbalestier
Nature
1990
Corpus ID: 4316041
A CRUCIAL issue in both the physics and the application of high-temperature superconductors is the low transport critical current…
Expand
Highly Cited
1987
Highly Cited
1987
The significance of source versus process in the tectonic controls of magma genesis
R. Arculus
1987
Corpus ID: 44752873
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE