Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,951,056 papers from all fields of science
Search
Sign In
Create Free Account
Zombie (computer science)
Known as:
Zombie virus
, Zombie (computing)
, Computer zombie
Expand
In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
42 relations
Alureon
Bagle (computer worm)
Blue Frog
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The Bloomsbury introduction to popular fiction
C. Berberich
2014
Corpus ID: 191278196
Acknowledgements Contributors' Details Christine Berberich, 'Introduction: The Popular / Literature versus literature Part I…
Expand
2014
2014
Individualization and the aporias of modernity
V. Argyrou
2014
Corpus ID: 148689843
Ulrich Beck’s musings on individualization have been described as a theory that provides a convincing explanation of what is…
Expand
Highly Cited
2013
Highly Cited
2013
Preventing DDoS attacks by identifier/locator separation
Hongbin Luo
,
Yi Lin
,
Hongke Zhang
,
M. Zukerman
IEEE Network
2013
Corpus ID: 12769860
Identifier/locator separation is a promising solution to the current Internet scaling problems. In this article, we argue that…
Expand
2013
2013
ConnectionScore: a statistical technique to resist application-layer DDoS attacks
Hakem Beitollahi
,
Geert Deconinck
Journal of Ambient Intelligence and Humanized…
2013
Corpus ID: 12315784
In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests…
Expand
2011
2011
Botnet Command Detection using Virtual Honeynet
J. S. Bhatia
,
R. Sehgal
,
Sanjeev Kumar
2011
Corpus ID: 5464696
Internet attacks are growing with time, threats are increasing to disable infrastructure to those that also target peoples and…
Expand
Review
2011
Review
2011
Perceptions of an Active Classroom: Exploration of Movement and Collaboration With Fourth Grade Students
Carrie Braniff
2011
Corpus ID: 146494568
After teaching and substitute teaching in various classrooms, I was determined to have a classroom full of movement and energy…
Expand
2006
2006
Dynamic Port 25 Blocking to Control SPAM Zombies
Jonathan Schmidt
International Conference on Email and Anti-Spam
2006
Corpus ID: 34942095
paper presents the results of a case study in which outbound SPAM, here referring to excessive amounts of bulk-generated e- mail…
Expand
2006
2006
The metamorphosis of malware writers
D. Bradbury
Computers & security
2006
Corpus ID: 39259645
2003
2003
Fearing the Dark: The Val Lewton Career
Edmund G. Bansak
2003
Corpus ID: 190779387
Cat People (1942) and I Walked with a Zombie (1943) established Val Lewtons hauntingly graceful style where suggestion was often…
Expand
1996
1996
Explaining the evolution of consciousness: The other hard problem
Thomas W. Polger
,
O. Flanagan
1996
Corpus ID: 141507484
Recently some philosophers interested in consciousness have begun to turn their attention to the question of what evolutionary…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE