Works about COMPUTER viruses
1
- JAMA Network Open, 2025, v. 8, n. 5, p. e2510180, doi. 10.1001/jamanetworkopen.2025.10180
- Jiang, John Xuefeng;
- Ross, Joseph S.;
- Bai, Ge
- Article
2
- Mathematical Methods in the Applied Sciences, 2025, v. 48, n. 8, p. 9272, doi. 10.1002/mma.10798
- Article
3
- Lamp (0047-3936), 2017, v. 74, n. 5, p. 29
- Article
4
- Records Management Quarterly (1986), 1991, v. 25, n. 2, p. 18
- Roy, Patricia Graham;
- Kenny, W.J
- Article
6
- Computing & Control Engineering, 2004, v. 15, n. 1, p. 2
- Article
7
- Computing & Control Engineering, 2003, v. 14, n. 5, p. 4
- Article
9
- Leonardo, 2008, v. 41, n. 2, p. 112, doi. 10.1162/leon.2008.41.2.112
- Article
10
- Instrumentation Science & Technology, 2007, v. 35, n. 4, p. 437, doi. 10.1080/10739140701436595
- Shen, I.‐Cheng;
- Huang, Yi‐Shing;
- Young, Ming‐Shing;
- Huang, Ke‐Nung
- Article
11
- Celal Bayar University Journal of Science, 2021, v. 17, n. 1, p. 67, doi. 10.18466/cbayarfbe.716573
- Article
12
- Journal of Applied Communication Research, 2011, v. 39, n. 1, p. 19, doi. 10.1080/00909882.2010.536844
- Larrimore, Laura;
- Jiang, Li;
- Larrimore, Jeff;
- Markowitz, David;
- Gorski, Scott
- Article
13
- ISSA Journal, 2018, v. 16, n. 2, p. 35
- Article
14
- Journal of Education for Business, 2011, v. 86, n. 2, p. 119, doi. 10.1080/08832323.2010.489587
- Foltz, C.Bryan;
- Renwick, JanetS.
- Article
15
- Journal of Education for Business, 1994, v. 70, n. 2, p. 82, doi. 10.1080/08832323.1994.10117729
- Article
16
- Journal of Education for Business, 1993, v. 68, n. 4, p. 212, doi. 10.1080/08832323.1993.10117615
- Article
17
- ISPRS Annals of Photogrammetry, Remote Sensing & Spatial Information Sciences, 2022, v. 10, n. 4/W3, p. 245, doi. 10.5194/isprs-annals-X-4-W3-2022-245-2022
- Veisi, O.;
- Mohammadi, M.;
- Behnamifard, F.
- Article
18
- Temida, 2024, v. 27, n. 2, p. 201, doi. 10.2298/TEM2402201M
- MILJKOVIĆ, JOVAN;
- MANIĆ, LJILJANA;
- LJUJIĆ, BOJAN
- Article
19
- Financial Executive, 2013, v. 29, n. 6, p. 65
- Article
20
- Financial Executive, 2005, v. 21, n. 5, p. 11
- Marshall, Jeffrey;
- Heffes, Ellen M.
- Article
21
- Financial Executive, 2004, v. 20, n. 9, p. 36
- Article
22
- Financial Executive, 2003, v. 19, n. 9, p. 51
- Article
23
- Financial Executive, 2001, v. 17, n. 9, p. 10
- Article
24
- Financial Executive, 2001, v. 17, n. 8, p. 40
- Article
25
- Financial Executive, 1989, v. 5, n. 2, p. 39
- Article
26
- JOPERD: The Journal of Physical Education, Recreation & Dance, 1999, v. 70, n. 9, p. 10
- Article
27
- TPM: Testing, Psychometrics, Methodology in Applied Psychology, 2014, v. 21, n. 1, p. 51, doi. 10.4473/TPM21.1.4
- MARIANI, MARCO G.;
- ZAPPALÁ, SALVATORE
- Article
28
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2576685
- Zhu, Qingyi;
- Xiang, Pingfan;
- Luo, Xuhang;
- Gan, Chenquan
- Article
29
- Computer Science & Information Systems, 2010, v. 7, n. 4, p. 813, doi. 10.2298/CSIS090330027F
- Fuentes, Daniel;
- Álvarez, Juan A.;
- Ortega, Juan A.;
- Gonzalez-Abril, Luis;
- Velasco, Francisco
- Article
30
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2017, v. 28, n. 9, p. -1, doi. 10.1142/S0129183117501145
- Essouifi, Mohamed;
- Achahbar, Abdelfattah
- Article
31
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2016, v. 27, n. 6, p. 1, doi. 10.1142/S0129183116500686
- Lamzabi, S.;
- Lazfi, S.;
- Rachadi, A.;
- Ez-Zahraouy, H.;
- Benyoussef, A.
- Article
32
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2015, v. 26, n. 6, p. -1, doi. 10.1142/S0129183115500679
- Gao, Chao;
- Zhong, Lu;
- Li, Xianghua;
- Zhang, Zili;
- Shi, Ning
- Article
33
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2014, v. 25, n. 5, p. -1, doi. 10.1142/S0129183114400105
- Sun, Mei;
- Li, Dandan;
- Han, Dun;
- Jia, Changsheng
- Article
34
- Neural Computing & Applications, 2017, v. 28, n. 12, p. 4147, doi. 10.1007/s00521-016-2708-7
- Article
35
- Journal of the Australian Traditional Medicine Society, 2020, v. 26, n. 1, p. 38
- Article
36
- Journal of the Australian Traditional Medicine Society, 2017, v. 23, n. 1, p. 36
- Article
37
- Review of Litigation, 1998, v. 17, n. 2, p. 343
- Article
38
- Medico-Legal Update, 2023, v. 23, p. 20, doi. 10.37506/mlu.v23i5.3461
- Article
40
- Journal of Science Education & Technology, 2008, v. 17, n. 6, p. 523, doi. 10.1007/s10956-008-9102-x
- Article
41
- Nursing Standard, 2018, v. 32, n. 29, p. 22, doi. 10.7748/ns.32.29.22.s18
- Article
42
- MEDSURG Nursing, 2021, v. 30, n. 1, p. 65, doi. 10.62116/msj.2021.30.1.65
- Article
43
- Social Science Computer Review, 2008, v. 26, n. 3, p. 317, doi. 10.1177/0894439307309465
- Wolfe, Scott E.;
- Higgins, George E.;
- Marcum, Catherine D.
- Article
44
- Social Science Computer Review, 2007, v. 25, n. 1, p. 78, doi. 10.1177/0894439306292346
- Hughes, Lorine A.;
- DeLone, Gregory J.
- Article
45
- New York Law School Law Review, 2016, v. 61, n. 3/4, p. 449
- Article
46
- International Journal of Web Services Research, 2015, v. 12, n. 4, p. 48, doi. 10.4018/IJWSR.2015100104
- Bo Zhang;
- Yufeng Wang;
- Qun Jin;
- Jianhua Ma
- Article
48
- Journal of Algorithms & Computational Technology, 2014, v. 8, n. 3, p. 267, doi. 10.1260/1748-3018.8.3.267
- Nianmin, Yao;
- Haifeng, Ma;
- Yong, Han
- Article
49
- Journal of Counterterrorism & Homeland Security International, 2013, v. 19, n. 3, p. 30
- Labaj, Leo;
- Gyongyosi, Nicholas;
- Kamali, Joseph
- Article
50
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 4, p. 6
- Article