Works matching Computer worms
Results: 198
Basic definitions for discrete modeling of computer worms epidemics.
- Published in:
- Revista Ingeniería e Investigación, 2015, v. 35, n. 1, p. 79, doi. 10.15446/ing.investig.v35n1.44323
- By:
- Publication type:
- Article
A state feedback impulse model for computer worm control.
- Published in:
- Nonlinear Dynamics, 2016, v. 85, n. 3, p. 1561, doi. 10.1007/s11071-016-2779-0
- By:
- Publication type:
- Article
Reducing Generalization Error Using Autoencoders for The Detection of Computer Worms.
- Published in:
- Computer Engineering & Applications Journal, 2020, v. 9, n. 3, p. 175, doi. 10.18495/comengapp.v9i3.348
- By:
- Publication type:
- Article
Aproximación numérica del modelo epidemiológico SI para la propagación de gusanos informáticos, simulación y análisis de su error.
- Published in:
- Tecnura, 2014, v. 18, n. 42, p. 12, doi. 10.14483/udistrital.jour.tecnura.2014.4.a01
- By:
- Publication type:
- Article
Using artificial neural networks to detect unknown computer worms.
- Published in:
- Neural Computing & Applications, 2009, v. 18, n. 7, p. 663, doi. 10.1007/s00521-009-0238-2
- By:
- Publication type:
- Article
Hybrid Epidemics—A Case Study on Computer Worm Conficker.
- Published in:
- PLoS ONE, 2015, v. 10, n. 5, p. 1, doi. 10.1371/journal.pone.0127478
- By:
- Publication type:
- Article
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9756982
- By:
- Publication type:
- Article
An Impulse Dynamic Model for Computer Worms.
- Published in:
- Abstract & Applied Analysis, 2013, p. 1, doi. 10.1155/2013/286209
- By:
- Publication type:
- Article
Proactive Detection of Computer Worms Using Model Checking.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 424, doi. 10.1109/TDSC.2008.74
- By:
- Publication type:
- Article
A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.
- Published in:
- Journal of Medical Systems, 2002, v. 26, n. 3, p. 221, doi. 10.1023/A:1015062301029
- By:
- Publication type:
- Article
A monitoring system for detecting repeated packets with applications to computer worms.
- Published in:
- International Journal of Information Security, 2006, v. 5, n. 3, p. 186, doi. 10.1007/s10207-006-0081-8
- By:
- Publication type:
- Article
Modeling and Detection of Camouflaging Worm.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. 377, doi. 10.1109/TDSC.2010.13
- By:
- Publication type:
- Article
Bifurcation analysis of an e-epidemic model in wireless sensor network.
- Published in:
- International Journal of Computer Mathematics, 2018, v. 95, n. 9, p. 1775, doi. 10.1080/00207160.2017.1336550
- By:
- Publication type:
- Article
Toward Robust Monitoring of Malicious Outbreaks.
- Published in:
- INFORMS Journal on Computing, 2022, v. 34, n. 2, p. 1257, doi. 10.1287/ijoc.2021.1077
- By:
- Publication type:
- Article
Stuxnet and the Limits of Cyber Warfare.
- Published in:
- Security Studies, 2013, v. 22, n. 3, p. 365, doi. 10.1080/09636412.2013.816122
- By:
- Publication type:
- Article
Deconstru Stuxnet: The Beast Is Loose.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 3, p. 8
- By:
- Publication type:
- Article
A Fractional SAIDR Model in the Frame of Atangana--Baleanu Derivative.
- Published in:
- Fractal & Fractional, 2021, v. 5, n. 2, p. 1, doi. 10.3390/fractalfract5020032
- By:
- Publication type:
- Article
Tackling the Threats of Internet Worms.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Optimizing Computer Worm Detection Using Ensembles.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/4656480
- By:
- Publication type:
- Article
Server Worm Detection by Using Intelligent Failure Connection Algorithm.
- Published in:
- Computer Science & Telecommunications, 2010, v. 27, n. 4, p. 48
- By:
- Publication type:
- Article
Worm Attack Detection in Network-Based System.
- Published in:
- IUP Journal of Information Technology, 2013, v. 9, n. 3, p. 31
- By:
- Publication type:
- Article
THE DARK CLOUD: UNDERSTANDING AND DEFENDING AGAINST BOTNETS AND STEALTHY MALWARE.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 130
- By:
- Publication type:
- Article
The benevolent health worm : comparing Western human rights-based ethics and Confucian duty-based moral philosophy.
- Published in:
- Ethics & Information Technology, 2008, v. 10, n. 1, p. 11, doi. 10.1007/s10676-008-9150-1
- By:
- Publication type:
- Article
when insiders GO outside the lines.
- Published in:
- Financial Executive, 2004, v. 20, n. 9, p. 36
- By:
- Publication type:
- Article
Network Security: As the Worms Turn.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 49
- By:
- Publication type:
- Article
Bifurcation and sensitivity analysis along with the numerical simulations of susceptible breaking-out quarantine treatment recovered computer model.
- Published in:
- International Journal of Modeling, Simulation & Scientific Computing, 2024, v. 15, n. 6, p. 1, doi. 10.1142/S1793962325500175
- By:
- Publication type:
- Article
Spyware Poses Greater Threat.
- Published in:
- IT Professional, 2008, v. 10, n. 2, p. 7
- Publication type:
- Article
ATTACK MODELS FOR VIRTUAL MACHINE SURVIVABILITY ANALYSIS.
- Published in:
- Journal of Criminal Investigation, 2011, v. 4, n. 2, p. 101
- By:
- Publication type:
- Article
Stuxnet targets uranium enrichment plants.
- Published in:
- TCE: The Chemical Engineer, 2010, n. 834, p. 10
- Publication type:
- Article
"A CORRELATION STUDY ON VALUE ORIENTATION AND YOUTH LIFE STYLE".
- Published in:
- GYANODAYA: The Journal of Progressive Education, 2012, v. 5, n. 2, p. 1
- By:
- Publication type:
- Article
BLENDED LEARNING APPROACH IN LEARNING MATHEMATICS.
- Published in:
- GYANODAYA: The Journal of Progressive Education, 2011, v. 4, n. 1, p. 15
- By:
- Publication type:
- Article
Collective classification for spam filtering.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
- By:
- Publication type:
- Article
Computers Under Attack: Intruders, Worms, and Viruses.
- Published in:
- 1991
- By:
- Publication type:
- Book Review
Root cause diagnosis in error-propagating networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1297, doi. 10.1002/sec.1415
- By:
- Publication type:
- Article
A stochastic model for the size of worm origin.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1103, doi. 10.1002/sec.1403
- By:
- Publication type:
- Article
CYBERCRIME: AN OVERVIEW OF THE FEDERAL COMPUTER FRAUD AND ABUSE STATUTE AND RELATED FEDERAL CRIMINAL LAWS.
- Published in:
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 1/2, p. 69
- By:
- Publication type:
- Article
ABOUT SECURING ECONOMICAL APPLICATION ON OUR SYSTEM BY PROTECTING OUR COMPUTER FROM INTRUDERS.
- Published in:
- Annals of the University of Petrosani Economics, 2009, v. 9, n. 4, p. 205
- By:
- Publication type:
- Article
Design of a multi_agent system for worm spreading_reduction.
- Published in:
- Journal of Intelligent Information Systems, 2010, v. 35, n. 1, p. 123, doi. 10.1007/s10844-009-0092-9
- By:
- Publication type:
- Article
PAINTING THE INTERNET.
- Published in:
- Leonardo, 2008, v. 41, n. 2, p. 112, doi. 10.1162/leon.2008.41.2.112
- By:
- Publication type:
- Article
The Specter of Non-Obvious Warfare.
- Published in:
- Strategic Studies Quarterly, 2012, v. 6, n. 3, p. 88
- By:
- Publication type:
- Article
What Does Iran's Cyber Capability Mean For Future Conflict?
- Published in:
- Journal of Diplomacy & International Relations, 2013, v. 14, n. 1, p. 49
- By:
- Publication type:
- Article
Barbarians still at the gates.
- Published in:
- ComputerWorld Hong Kong, 2008, p. 47
- By:
- Publication type:
- Article
Academics sidelined in battle against computer worms.
- Published in:
- Nature, 2003, v. 425, n. 6955, p. 228, doi. 10.1038/425228b
- By:
- Publication type:
- Article
Experts fear network paralysis as computer worms blast Internet.
- Published in:
- Nature, 2003, v. 425, n. 6953, p. 3, doi. 10.1038/425003a
- By:
- Publication type:
- Article
NADTW: new approach for detecting TCP worm.
- Published in:
- Neural Computing & Applications, 2017, v. 28, p. 525, doi. 10.1007/s00521-016-2358-9
- By:
- Publication type:
- Article
HACKING BACK: REEVALUATING THE LEGALITY OF RETALIATORY CYBERATTACKS.
- Published in:
- George Washington International Law Review, 2014, v. 46, n. 1, p. 199
- By:
- Publication type:
- Article
A probability distribution function for investigating node infection and removal times.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2020, v. 31, n. 2, p. 1, doi. 10.1002/ett.3753
- By:
- Publication type:
- Article
The Effect of Liability and Patch Release on Software Security: The Monopoly Case.
- Published in:
- Production & Operations Management, 2011, v. 20, n. 4, p. 603, doi. 10.1111/j.1937-5956.2010.01189.x
- By:
- Publication type:
- Article
Cyber Attacks and the Laws of War.
- Published in:
- Berkeley Journal of International Law, 2012, v. 30, n. 2, p. 525
- By:
- Publication type:
- Article
Dynamic Analysis of a Suspected Stuxnet Malicious Code.
- Published in:
- Research & Exploration in Laboratory, 2014, v. 33, n. 8, p. 119
- By:
- Publication type:
- Article