Works matching DE "COMPUTER viruses"


Results: 601
    1
    2
    3
    4
    5

    Feedback.

    Published in:
    2006
    Publication type:
    Letter
    6
    7
    8
    9

    PAINTING THE INTERNET.

    Published in:
    Leonardo, 2008, v. 41, n. 2, p. 112, doi. 10.1162/leon.2008.41.2.112
    By:
    • Aycock, John
    Publication type:
    Article
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19

    Real-World Cyberthreats.

    Published in:
    Financial Executive, 2013, v. 29, n. 6, p. 65
    By:
    • Habersetzer, Vernon
    Publication type:
    Article
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29

    Trojan horses in mobile devices.

    Published in:
    Computer Science & Information Systems, 2010, v. 7, n. 4, p. 813, doi. 10.2298/CSIS090330027F
    By:
    • Fuentes, Daniel;
    • Álvarez, Juan A.;
    • Ortega, Juan A.;
    • Gonzalez-Abril, Luis;
    • Velasco, Francisco
    Publication type:
    Article
    30
    31

    Modeling the spread of virus in packets on scale free network.

    Published in:
    International Journal of Modern Physics C: Computational Physics & Physical Computation, 2016, v. 27, n. 6, p. 1, doi. 10.1142/S0129183116500686
    By:
    • Lamzabi, S.;
    • Lazfi, S.;
    • Rachadi, A.;
    • Ez-Zahraouy, H.;
    • Benyoussef, A.
    Publication type:
    Article
    32
    33
    34
    35
    36

    SCAMS: What you need to know.

    Published in:
    Journal of the Australian Traditional Medicine Society, 2017, v. 23, n. 1, p. 36
    By:
    • Pagura, Ingrid
    Publication type:
    Article
    37
    38
    39
    40
    41

    How to stay safe ONLINE.

    Published in:
    Nursing Standard, 2018, v. 32, n. 29, p. 22, doi. 10.7748/ns.32.29.22.s18
    By:
    • Pearce, Lynne
    Publication type:
    Article
    42
    43
    44
    45
    46
    47

    EDITORIAL.

    Published in:
    2010
    By:
    • Watt, Renee J.
    Publication type:
    Editorial
    48
    49
    50

    SITREP.

    Published in:
    Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 4, p. 6
    Publication type:
    Article