Works matching Computer viruses and worms
Results: 39
Computers Under Attack: Intruders, Worms, and Viruses.
- Published in:
- 1991
- By:
- Publication type:
- Book Review
STATE FEEDBACK IMPULSIVE CONTROL OF COMPUTER WORM AND VIRUS WITH SATURATED INCIDENCE.
- Published in:
- Mathematical Biosciences & Engineering, 2018, v. 15, n. 6, p. 1465, doi. 10.3934/mbe.2018067
- By:
- Publication type:
- Article
ABOUT SECURING ECONOMICAL APPLICATION ON OUR SYSTEM BY PROTECTING OUR COMPUTER FROM INTRUDERS.
- Published in:
- Annals of the University of Petrosani Economics, 2009, v. 9, n. 4, p. 205
- By:
- Publication type:
- Article
THE DARK CLOUD: UNDERSTANDING AND DEFENDING AGAINST BOTNETS AND STEALTHY MALWARE.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 130
- By:
- Publication type:
- Article
Various Malware Handling Technique.
- Published in:
- Central Asia & the Caucasus (14046091), 2022, v. 23, n. 1, p. 794, doi. 10.37178/ca-c.23.1.071
- By:
- Publication type:
- Article
Wanted: cyber-czars.
- Published in:
- Nature, 2009, v. 458, n. 7241, p. 945, doi. 10.1038/458945a
- Publication type:
- Article
when insiders GO outside the lines.
- Published in:
- Financial Executive, 2004, v. 20, n. 9, p. 36
- By:
- Publication type:
- Article
Network Security: As the Worms Turn.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 49
- By:
- Publication type:
- Article
PROTECTING ONLINE PRIVACY.
- Published in:
- CPA Journal, 2001, v. 71, n. 11, p. 66
- By:
- Publication type:
- Article
Malware Threats: How to Protect Your Organization.
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2014, v. 33, n. 3, p. 13
- By:
- Publication type:
- Article
A DISCRETE MATHEMATICAL MODEL TO SIMULATE MALWARE SPREADING.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2012, v. 23, n. 10, p. -1, doi. 10.1142/S0129183112500647
- By:
- Publication type:
- Article
DEFENDING AMERICA AGAINST CHINESE CYBER ESPIONAGE THROUGH THE USE OF ACTIVE DEFENSES.
- Published in:
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- By:
- Publication type:
- Article
Spyware Poses Greater Threat.
- Published in:
- IT Professional, 2008, v. 10, n. 2, p. 7
- Publication type:
- Article
Arming yourself in the virus war.
- Published in:
- Public Relations Tactics, 2003, v. 10, n. 12, p. 6
- By:
- Publication type:
- Article
A Review of Security and Privacy Concerns in the Internet of Things (IoT).
- Published in:
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/5724168
- By:
- Publication type:
- Article
Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?
- Published in:
- Social Science Computer Review, 2007, v. 25, n. 1, p. 78, doi. 10.1177/0894439306292346
- By:
- Publication type:
- Article
Stuxnet successor surfaces.
- Published in:
- TCE: The Chemical Engineer, 2011, n. 845, p. 8
- Publication type:
- Article
Keeping Up the Fight.
- Published in:
- Government Technology, 2009, v. 22, n. 12, p. 36
- By:
- Publication type:
- Article
Cybersecurity of information systems at the National Archives and Records Service of South Africa.
- Published in:
- South African Journal of Libraries & Information Science, 2023, v. 89, n. 1, p. 1, doi. 10.7553/89-1-2306
- By:
- Publication type:
- Article
A Fractional SAIDR Model in the Frame of Atangana--Baleanu Derivative.
- Published in:
- Fractal & Fractional, 2021, v. 5, n. 2, p. 1, doi. 10.3390/fractalfract5020032
- By:
- Publication type:
- Article
Securing your PC and protecting your privacy.
- Published in:
- 2005
- By:
- Publication type:
- Journal Article
SECURING YOUR PC AND PROTECTING YOUR PRIVACY.
- Published in:
- Online Journal of Issues in Nursing, 2005, v. 10, n. 1, p. 14
- By:
- Publication type:
- Article
Collective classification for spam filtering.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
- By:
- Publication type:
- Article
THE COMPUTER "VIRUS" AS METAPHOR.
- Published in:
- ETC: A Review of General Semantics, 1990, v. 47, n. 2, p. 177
- By:
- Publication type:
- Article
CYBERCRIME: AN OVERVIEW OF THE FEDERAL COMPUTER FRAUD AND ABUSE STATUTE AND RELATED FEDERAL CRIMINAL LAWS.
- Published in:
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 1/2, p. 69
- By:
- Publication type:
- Article
Comprehensive Analysis of IoT Malware Evasion Techniques.
- Published in:
- Engineering, Technology & Applied Science Research, 2021, v. 11, n. 4, p. 7495, doi. 10.48084/etasr.4296
- By:
- Publication type:
- Article
Mathematical Models for Malware Propagation.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/6046353
- By:
- Publication type:
- Article
Viruses and the practice computer: keeping the bogeyman at bay.
- Published in:
- In Practice (0263841X), 2003, v. 25, n. 2, p. 108, doi. 10.1136/inpract.25.2.108
- By:
- Publication type:
- Article
Protecting the Internet Without Wrecking It: Fixing Web insecurity requires more than a caring community.
- Published in:
- Boston Review, 2008, v. 33, n. 2, p. 19
- By:
- Publication type:
- Article
PAINTING THE INTERNET.
- Published in:
- Leonardo, 2008, v. 41, n. 2, p. 112, doi. 10.1162/leon.2008.41.2.112
- By:
- Publication type:
- Article
LDA를 활용한 네트워크 위협 시그니처 추출기법.
- Published in:
- Journal of Internet Computing & Services, 2018, v. 19, n. 1, p. 1, doi. 10.7472/jksii.2018.19.1.1
- By:
- Publication type:
- Article
Is your computer secure?
- Published in:
- Canadian Journal of Rural Medicine (Joule Inc.), 2011, v. 16, n. 4, p. 137
- By:
- Publication type:
- Article
INTERNET SERVICE PROVIDERS SHOULD BLOCK UNUSED PORTS, SAYS STUDY.
- Published in:
- Computing & Control Engineering, 2003, v. 14, n. 5, p. 4
- Publication type:
- Article
Experts fear network paralysis as computer worms blast Internet.
- Published in:
- Nature, 2003, v. 425, n. 6953, p. 3, doi. 10.1038/425003a
- By:
- Publication type:
- Article
基于SEIPQR 模型的工控蠕虫防御策略.
- Published in:
- Chinese Journal of Network & Information Security, 2022, v. 8, n. 3, p. 169, doi. 10.11959/j.issn.2096-109x.2022032
- By:
- Publication type:
- Article
A Stochastic Model of Multivirus Dynamics.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. 30, doi. 10.1109/TDSC.2011.33
- By:
- Publication type:
- Article
Bookshelf.
- Published in:
- Management Review, 1997, v. 86, n. 5, p. 23
- Publication type:
- Article
The Effect of Liability and Patch Release on Software Security: The Monopoly Case.
- Published in:
- Production & Operations Management, 2011, v. 20, n. 4, p. 603, doi. 10.1111/j.1937-5956.2010.01189.x
- By:
- Publication type:
- Article
Cyber Attacks and the Laws of War.
- Published in:
- Berkeley Journal of International Law, 2012, v. 30, n. 2, p. 525
- By:
- Publication type:
- Article