Works matching Computer worms
1
- Nonlinear Dynamics, 2016, v. 85, n. 3, p. 1561, doi. 10.1007/s11071-016-2779-0
- Zhang, Meng;
- Song, Guohua;
- Chen, Lansun
- Article
2
- Revista Ingeniería e Investigación, 2015, v. 35, n. 1, p. 79, doi. 10.15446/ing.investig.v35n1.44323
- Guevara, P.;
- Delgado, G.;
- Audelo, J.;
- Valdez, J. S.;
- Pérez, H. M.
- Article
3
- Computer Engineering & Applications Journal, 2020, v. 9, n. 3, p. 175, doi. 10.18495/comengapp.v9i3.348
- Ochieng, Nelson;
- Mwangi, Waweru;
- Ateya, Ismail
- Article
4
- Tecnura, 2014, v. 18, n. 42, p. 12, doi. 10.14483/udistrital.jour.tecnura.2014.4.a01
- GUEVARA LÓPEZ, PEDRO;
- SALVADOR VALDEZ MARTÍNEZ, JORGE;
- AUDELO GONZÁLEZ, JESÚS;
- DELGADO REYES, GUSTAVO
- Article
5
- Neural Computing & Applications, 2009, v. 18, n. 7, p. 663, doi. 10.1007/s00521-009-0238-2
- Stopel, Dima;
- Moskovitch, Robert;
- Boger, Zvi;
- Shahar, Yuval;
- Elovici, Yuval
- Article
6
- TWMS Journal of Applied & Engineering Mathematics, 2025, v. 15, n. 2, p. 342
- JANAGARAJ, R.;
- JONES, G. MARIA;
- MARIA SELVAM, A. GEORGE
- Article
7
- PLoS ONE, 2015, v. 10, n. 5, p. 1, doi. 10.1371/journal.pone.0127478
- Zhang, Changwang;
- Zhou, Shi;
- Chain, Benjamin M.
- Article
8
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 424, doi. 10.1109/TDSC.2008.74
- Kinder, Johannes;
- Katzenbeisser, Stefan;
- Schallhart, Christian;
- Veith, Helmut
- Article
9
- Abstract & Applied Analysis, 2013, p. 1, doi. 10.1155/2013/286209
- Chunming Zhang;
- Yun Zhao;
- Yingjiang Wu
- Article
10
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9756982
- Yao, Yu;
- Fu, Qiang;
- Yang, Wei;
- Wang, Ying;
- Sheng, Chuan
- Article
11
- Journal of Medical Systems, 2002, v. 26, n. 3, p. 221, doi. 10.1023/A:1015062301029
- Kobayashi, Shinji;
- Goudge, Masamichi;
- Makie, Toshio;
- Hanada, Eisuke;
- Harada, Mine;
- Nose, Yoshiaki
- Article
12
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. 377, doi. 10.1109/TDSC.2010.13
- Wei Yu;
- Xun Wang;
- Calyam, Prasad;
- Dong Xuan;
- Wei Zhao
- Article
13
- International Journal of Information Security, 2006, v. 5, n. 3, p. 186, doi. 10.1007/s10207-006-0081-8
- Oorschot, Paul;
- Robert, Jean-Marc;
- Martin, Miguel
- Article
14
- International Journal of Computer Mathematics, 2018, v. 95, n. 9, p. 1775, doi. 10.1080/00207160.2017.1336550
- Upadhyay, Ranjit Kumar;
- Kumari, Sangeeta
- Article
15
- Applicable Analysis, 2006, v. 85, n. 9, p. 1025, doi. 10.1080/00036810600835078
- Article
16
- Security Studies, 2013, v. 22, n. 3, p. 365, doi. 10.1080/09636412.2013.816122
- Article
17
- Computer Science & Telecommunications, 2010, v. 27, n. 4, p. 48
- Rasheed, Mohammad M.;
- Ghazali, Osman;
- Md Norwawi, Norita
- Article
18
- INFORMS Journal on Computing, 2022, v. 34, n. 2, p. 1257, doi. 10.1287/ijoc.2021.1077
- Tang, Shaojie;
- Liu, Siyuan;
- Han, Xu;
- Qiao, Yu
- Article
20
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/4656480
- Ochieng, Nelson;
- Mwangi, Waweru;
- Ateya, Ismail
- Article
21
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 3, p. 8
- Article
22
- Fractal & Fractional, 2021, v. 5, n. 2, p. 1, doi. 10.3390/fractalfract5020032
- Uçar, Esmehan;
- Uçar, Sümeyra;
- Evirgen, Fırat;
- Özdemir, Necati
- Article
23
- IUP Journal of Information Technology, 2013, v. 9, n. 3, p. 31
- Francisca Nonyelum, Ogwueleka
- Article
24
- International Journal of Intelligence & Counterintelligence, 2014, v. 27, n. 3, p. 465, doi. 10.1080/08850607.2014.900291
- Article
25
- Production & Operations Management, 2011, v. 20, n. 4, p. 603, doi. 10.1111/j.1937-5956.2010.01189.x
- Kim, Byung Cho;
- Chen, Pei‐Yu;
- Mukhopadhyay, Tridas
- Article
26
- Neural Computing & Applications, 2017, v. 28, p. 525, doi. 10.1007/s00521-016-2358-9
- Anbar, Mohammed;
- Abdullah, Rosni;
- Munther, Alhamza;
- Al-Betar, Mohammed;
- Saad, Redhwan
- Article
27
- ComputerWorld Hong Kong, 2008, p. 47
- Article
29
- Intel Technology Journal, 2009, v. 13, n. 2, p. 130
- Chandrashekar, Jaideep;
- Orrin, Steve;
- Livadas, Carl;
- Schooler, Eve M.
- Article
30
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
- Laorden, Carlos;
- Sanz, Borja;
- Santos, Igor;
- Galán-García, Patxi;
- Bringas, Pablo G.
- Article
31
- Journal of Criminal Investigation, 2011, v. 4, n. 2, p. 101
- Article
32
- Berkeley Journal of International Law, 2012, v. 30, n. 2, p. 525
- Article
33
- International Journal of Modeling, Simulation & Scientific Computing, 2024, v. 15, n. 6, p. 1, doi. 10.1142/S1793962325500175
- Aziz, Noor;
- Rizvi, Syed T. R.;
- Ali, Kashif;
- Seadawy, Aly R.
- Article
34
- George Washington International Law Review, 2014, v. 46, n. 1, p. 199
- Article
35
- Strategic Studies Quarterly, 2012, v. 6, n. 3, p. 88
- Article
36
- TCE: The Chemical Engineer, 2010, n. 834, p. 10
- Article
37
- Ethics & Information Technology, 2008, v. 10, n. 1, p. 11, doi. 10.1007/s10676-008-9150-1
- Article
38
- Nature, 2003, v. 425, n. 6955, p. 228, doi. 10.1038/425228b
- Article
39
- Nature, 2003, v. 425, n. 6953, p. 3, doi. 10.1038/425003a
- Article
40
- Leonardo, 2008, v. 41, n. 2, p. 112, doi. 10.1162/leon.2008.41.2.112
- Article
41
- IT Professional, 2008, v. 10, n. 2, p. 7
- Article
42
- Journal of Diplomacy & International Relations, 2013, v. 14, n. 1, p. 49
- Farwell, James P.;
- Arakelian, Darby
- Article
43
- Journal of Intelligent Information Systems, 2010, v. 35, n. 1, p. 123, doi. 10.1007/s10844-009-0092-9
- Article
44
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1297, doi. 10.1002/sec.1415
- Seo, Eunsoo;
- Dogan, Gulustan;
- Abdelzaher, Tarek;
- Brown, Theodore
- Article
45
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1103, doi. 10.1002/sec.1403
- Tafazzoli, Tala;
- Sadeghiyan, Babak
- Article
46
- GYANODAYA: The Journal of Progressive Education, 2012, v. 5, n. 2, p. 1
- Article
47
- GYANODAYA: The Journal of Progressive Education, 2011, v. 4, n. 1, p. 15
- Article
48
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 1/2, p. 69
- Article
49
- Annals of the University of Petrosani Economics, 2009, v. 9, n. 4, p. 205
- Article
50
- Financial Executive, 2004, v. 20, n. 9, p. 36
- Article