Works matching DE "COMPUTER worms"
1
- Information (2078-2489), 2015, v. 6, n. 4, p. 613, doi. 10.3390/info6040613
- Jinhua Ma;
- Zhide Chen;
- Jianghua Liu;
- Rongjun Zheng
- Article
2
- Production & Operations Management, 2011, v. 20, n. 4, p. 603, doi. 10.1111/j.1937-5956.2010.01189.x
- Kim, Byung Cho;
- Chen, Pei‐Yu;
- Mukhopadhyay, Tridas
- Article
3
- Neural Computing & Applications, 2017, v. 28, p. 525, doi. 10.1007/s00521-016-2358-9
- Anbar, Mohammed;
- Abdullah, Rosni;
- Munther, Alhamza;
- Al-Betar, Mohammed;
- Saad, Redhwan
- Article
4
- Neural Computing & Applications, 2009, v. 18, n. 7, p. 663, doi. 10.1007/s00521-009-0238-2
- Stopel, Dima;
- Moskovitch, Robert;
- Boger, Zvi;
- Shahar, Yuval;
- Elovici, Yuval
- Article
5
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 3, p. 397, doi. 10.1007/s12083-016-0538-0
- Rguibi, Mohamed Amine;
- Moussa, Najem
- Article
6
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 6, p. 1008, doi. 10.1007/s12083-014-0306-y
- Jafarabadi, Ahmad;
- Azgomi, Mohammad
- Article
7
- IEEE Internet Computing, 2010, v. 14, n. 3, p. 77, doi. 10.1109/MIC.2010.72
- Hanna, Steve;
- Thomson, Susan
- Article
8
- ComputerWorld Hong Kong, 2011, v. 28, n. 1, p. 30
- Article
9
- ComputerWorld Hong Kong, 2010, v. 26, n. 4, p. 21
- Article
10
- ComputerWorld Hong Kong, 2008, p. 47
- Article
11
- Journal of Supercomputing, 2010, v. 51, n. 2, p. 167, doi. 10.1007/s11227-009-0283-8
- Article
12
- Intel Technology Journal, 2009, v. 13, n. 2, p. 130
- Chandrashekar, Jaideep;
- Orrin, Steve;
- Livadas, Carl;
- Schooler, Eve M.
- Article
13
- Intel Technology Journal, 2009, v. 13, n. 2, p. 112
- Cornett, Linden;
- Grewal, Ken;
- Men Long;
- Millier, Marc;
- Williams, Steve
- Article
14
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 9, p. 40
- Arastouie, Narges;
- Arastooie, Naeemeh;
- Salimi, Elham;
- Soltanali, Saeed
- Article
15
- PLoS ONE, 2015, v. 10, n. 5, p. 1, doi. 10.1371/journal.pone.0127478
- Zhang, Changwang;
- Zhou, Shi;
- Chain, Benjamin M.
- Article
16
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
- Laorden, Carlos;
- Sanz, Borja;
- Santos, Igor;
- Galán-García, Patxi;
- Bringas, Pablo G.
- Article
17
- Computer Systems Science & Engineering, 2009, v. 24, n. 3, p. 157
- Yang Xiang;
- Xiang Fan;
- Wen Tao Zhu
- Article
18
- Computer Engineering & Applications Journal, 2020, v. 9, n. 3, p. 175, doi. 10.18495/comengapp.v9i3.348
- Ochieng, Nelson;
- Mwangi, Waweru;
- Ateya, Ismail
- Article
19
- Journal of Criminal Investigation, 2011, v. 4, n. 2, p. 101
- Article
20
- Neural Network World, 2017, n. 1, p. 5, doi. 10.14311/NNW.2017.27.001
- Chaudhary, P.;
- Gupta, B. B.
- Article
21
- Neural Network World, 2016, n. 6, p. 539
- Zhang, Z.;
- Sangaiah, A. K.
- Article
22
- Concurrency & Computation: Practice & Experience, 2011, v. 23, n. 12, p. 1367, doi. 10.1002/cpe.1617
- Wahid, Alif;
- Leckie, Christopher;
- Zhou, Chenfeng
- Article
23
- Telecommunication Systems, 2017, v. 64, n. 1, p. 135, doi. 10.1007/s11235-016-0164-4
- Article
24
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 95, doi. 10.1007/s11235-009-9241-2
- Hatahet, Sinan;
- Bouabdallah, Abdelmadjid;
- Challal, Yacine
- Article
25
- Journal of Industrial Design & Engineering Graphics, 2015, v. 10, p. 37
- Article
26
- Journal of Engineering Science & Technology Review, 2009, v. 2, n. 1, p. 43
- Article
27
- Berkeley Journal of International Law, 2012, v. 30, n. 2, p. 525
- Article
28
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 4, p. 617, doi. 10.1109/TDSC.2010.69
- Ramachandran, Krishna K.;
- Sikdar, Biplab
- Article
29
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. 377, doi. 10.1109/TDSC.2010.13
- Wei Yu;
- Xun Wang;
- Calyam, Prasad;
- Dong Xuan;
- Wei Zhao
- Article
30
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 424, doi. 10.1109/TDSC.2008.74
- Kinder, Johannes;
- Katzenbeisser, Stefan;
- Schallhart, Christian;
- Veith, Helmut
- Article
31
- Survival (0039-6338), 2013, v. 55, n. 2, p. 81, doi. 10.1080/00396338.2013.784468
- Bronk, Christopher;
- Tikk-Ringas, Eneken
- Article
32
- Survival (0039-6338), 2011, v. 53, n. 1, p. 23, doi. 10.1080/00396338.2011.555586
- Farwell, JamesP.;
- Rohozinski, Rafal
- Article
33
- Boston Review, 2008, v. 33, n. 2, p. 7
- Article
34
- Journal: American Water Works Association, 2010, v. 102, n. 11, p. 30, doi. 10.1002/j.1551-8833.2010.tb11335.x
- Article
35
- Research & Exploration in Laboratory, 2014, v. 33, n. 8, p. 119
- WANG Guang-wei;
- PAN Hong;
- FAN Ming-yu
- Article
36
- Scientific Reports, 2015, p. 9924, doi. 10.1038/srep09924
- Zhang, Changwang;
- Zhou, Shi;
- Miller, Joel C.;
- Cox, Ingemar J.;
- Chain, Benjamin M.
- Article
37
- TWMS Journal of Applied & Engineering Mathematics, 2025, v. 15, n. 2, p. 342
- JANAGARAJ, R.;
- JONES, G. MARIA;
- MARIA SELVAM, A. GEORGE
- Article
38
- International Journal of Modeling, Simulation & Scientific Computing, 2024, v. 15, n. 6, p. 1, doi. 10.1142/S1793962325500175
- Aziz, Noor;
- Rizvi, Syed T. R.;
- Ali, Kashif;
- Seadawy, Aly R.
- Article
39
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 3, p. 111
- Yang Liu;
- Bai-ling Wang;
- Kai-kun Dong;
- Le-jun Chi;
- Ci Zhang;
- Ming Rao
- Article
40
- Security Studies, 2013, v. 22, n. 3, p. 365, doi. 10.1080/09636412.2013.816122
- Article
41
- Computer Science & Telecommunications, 2015, v. 46, n. 2, p. 36
- Article
42
- Computer Science & Telecommunications, 2010, v. 27, n. 4, p. 48
- Rasheed, Mohammad M.;
- Ghazali, Osman;
- Md Norwawi, Norita
- Article
43
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 43, doi. 10.1353/gia.2018.0006
- Dinniss, Heather A. Harrison
- Article
44
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 1965, doi. 10.1007/s11277-016-3298-5
- Rajarajan, G.;
- Ganesan, Lakshmanan
- Article
45
- ISSA Journal, 2024, v. 22, n. 5, p. 24
- Article
46
- ISSA Journal, 2019, v. 17, n. 2, p. 7
- Article
47
- ISSA Journal, 2018, v. 16, n. 2, p. 35
- Article
48
- Tecnura, 2014, v. 18, n. 42, p. 12, doi. 10.14483/udistrital.jour.tecnura.2014.4.a01
- GUEVARA LÓPEZ, PEDRO;
- SALVADOR VALDEZ MARTÍNEZ, JORGE;
- AUDELO GONZÁLEZ, JESÚS;
- DELGADO REYES, GUSTAVO
- Article
49
- INFORMS Journal on Computing, 2022, v. 34, n. 2, p. 1257, doi. 10.1287/ijoc.2021.1077
- Tang, Shaojie;
- Liu, Siyuan;
- Han, Xu;
- Qiao, Yu
- Article
50
- Science World Journal, 2016, v. 11, n. 1, p. 32
- Ahmad, Muhammad Aminu;
- Magaji, Abubakar S.;
- Dari, Sani
- Article