Works matching DE "COMPUTER worms"


Results: 114
    1
    2
    3

    Random Security News.

    Published in:
    ISSA Journal, 2019, v. 17, n. 2, p. 7
    By:
    • Slade, Robert
    Publication type:
    Article
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14

    Collective classification for spam filtering.

    Published in:
    Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
    By:
    • Laorden, Carlos;
    • Sanz, Borja;
    • Santos, Igor;
    • Galán-García, Patxi;
    • Bringas, Pablo G.
    Publication type:
    Article
    15
    16

    Modeling and Detection of Camouflaging Worm.

    Published in:
    IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. 377, doi. 10.1109/TDSC.2010.13
    By:
    • Wei Yu;
    • Xun Wang;
    • Calyam, Prasad;
    • Dong Xuan;
    • Wei Zhao
    Publication type:
    Article
    17
    18
    19
    20
    21
    22

    NADTW: new approach for detecting TCP worm.

    Published in:
    Neural Computing & Applications, 2017, v. 28, p. 525, doi. 10.1007/s00521-016-2358-9
    By:
    • Anbar, Mohammed;
    • Abdullah, Rosni;
    • Munther, Alhamza;
    • Al-Betar, Mohammed;
    • Saad, Redhwan
    Publication type:
    Article
    23
    24
    25
    26
    27
    28
    29
    30

    Extraterrestrial Computer Virus.

    Published in:
    MNASSA: Monthly Notes of the Astronomical Society of Southern Africa, 2008, v. 67, n. 9/10, p. 184
    Publication type:
    Article
    31
    32
    33
    34
    35
    36
    37

    Toward a Taxonomy of Malware Behaviors.

    Published in:
    Computer Journal, 2015, v. 58, n. 10, p. 2758, doi. 10.1093/comjnl/bxv047
    By:
    • ABED GRÉGIO, ANDRÉ RICARDO;
    • MONTE AFONSO, VITOR;
    • FERNANDES FILHO, DARIO SIMÕES;
    • DE GEUS, PAULO LÍCIO;
    • JINO, MARIO
    Publication type:
    Article
    38

    The Microcosmic Model of Worm Propagation.

    Published in:
    Computer Journal, 2011, v. 54, n. 10, p. 1700, doi. 10.1093/comjnl/bxr082
    By:
    • Wang, Yini;
    • Wen, Sheng;
    • Cesare, Silvio;
    • Zhou, Wanlei;
    • Xiang, Yang
    Publication type:
    Article
    39
    40
    41
    42
    43
    44
    45
    46

    The Cyber Attack on Saudi Aramco.

    Published in:
    Survival (0039-6338), 2013, v. 55, n. 2, p. 81, doi. 10.1080/00396338.2013.784468
    By:
    • Bronk, Christopher;
    • Tikk-Ringas, Eneken
    Publication type:
    Article
    47

    Stuxnet and the Future of Cyber War.

    Published in:
    Survival (0039-6338), 2011, v. 53, n. 1, p. 23, doi. 10.1080/00396338.2011.555586
    By:
    • Farwell, JamesP.;
    • Rohozinski, Rafal
    Publication type:
    Article
    48
    49
    50