Works matching DE "COMPUTER worms"
1
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 79
- GU-HSIN LAI;
- CHEN-SEN OUYANG;
- CHIA-MEI CHEN
- Article
2
- ISSA Journal, 2024, v. 22, n. 5, p. 24
- Article
3
- ISSA Journal, 2019, v. 17, n. 2, p. 7
- Article
4
- ISSA Journal, 2018, v. 16, n. 2, p. 35
- Article
5
- Intel Technology Journal, 2009, v. 13, n. 2, p. 130
- Chandrashekar, Jaideep;
- Orrin, Steve;
- Livadas, Carl;
- Schooler, Eve M.
- Article
6
- Intel Technology Journal, 2009, v. 13, n. 2, p. 112
- Cornett, Linden;
- Grewal, Ken;
- Men Long;
- Millier, Marc;
- Williams, Steve
- Article
7
- Scientific Reports, 2015, p. 9924, doi. 10.1038/srep09924
- Zhang, Changwang;
- Zhou, Shi;
- Miller, Joel C.;
- Cox, Ingemar J.;
- Chain, Benjamin M.
- Article
8
- TWMS Journal of Applied & Engineering Mathematics, 2025, v. 15, n. 2, p. 342
- JANAGARAJ, R.;
- JONES, G. MARIA;
- MARIA SELVAM, A. GEORGE
- Article
9
- Journal of Engineering Science & Technology Review, 2009, v. 2, n. 1, p. 43
- Article
10
- GYANODAYA: The Journal of Progressive Education, 2012, v. 5, n. 2, p. 1
- Article
11
- GYANODAYA: The Journal of Progressive Education, 2011, v. 4, n. 1, p. 15
- Article
12
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- Article
13
- High Performance Polymers, 2016, v. 28, n. 10, p. 1183, doi. 10.1177/0954008315621122
- Fang, Jiyong;
- Wang, Qinhong;
- Yue, Xigui;
- Wang, Guibin;
- Jiang, Zhenhua
- Article
14
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
- Laorden, Carlos;
- Sanz, Borja;
- Santos, Igor;
- Galán-García, Patxi;
- Bringas, Pablo G.
- Article
15
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 4, p. 617, doi. 10.1109/TDSC.2010.69
- Ramachandran, Krishna K.;
- Sikdar, Biplab
- Article
16
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. 377, doi. 10.1109/TDSC.2010.13
- Wei Yu;
- Xun Wang;
- Calyam, Prasad;
- Dong Xuan;
- Wei Zhao
- Article
17
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 424, doi. 10.1109/TDSC.2008.74
- Kinder, Johannes;
- Katzenbeisser, Stefan;
- Schallhart, Christian;
- Veith, Helmut
- Article
18
- IAENG International Journal of Computer Science, 2018, v. 45, n. 3, p. 371
- Qingyi Zhu;
- Yi Jiang;
- Ye Zhang
- Article
19
- Robotica, 2011, v. 29, n. 4, p. 571, doi. 10.1017/S0263574710000421
- Gallardo-Alvarado, Jaime;
- Lesso-Arroyo, Raúl;
- García-Miranda, J. Santos
- Article
20
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 3, p. 8
- Article
21
- International Journal of Modeling, Simulation & Scientific Computing, 2024, v. 15, n. 6, p. 1, doi. 10.1142/S1793962325500175
- Aziz, Noor;
- Rizvi, Syed T. R.;
- Ali, Kashif;
- Seadawy, Aly R.
- Article
22
- Neural Computing & Applications, 2017, v. 28, p. 525, doi. 10.1007/s00521-016-2358-9
- Anbar, Mohammed;
- Abdullah, Rosni;
- Munther, Alhamza;
- Al-Betar, Mohammed;
- Saad, Redhwan
- Article
23
- Neural Computing & Applications, 2009, v. 18, n. 7, p. 663, doi. 10.1007/s00521-009-0238-2
- Stopel, Dima;
- Moskovitch, Robert;
- Boger, Zvi;
- Shahar, Yuval;
- Elovici, Yuval
- Article
24
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 3, p. 397, doi. 10.1007/s12083-016-0538-0
- Rguibi, Mohamed Amine;
- Moussa, Najem
- Article
25
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 6, p. 1008, doi. 10.1007/s12083-014-0306-y
- Jafarabadi, Ahmad;
- Azgomi, Mohammad
- Article
26
- Asia-Pacific Defence Reporter, 2016, v. 42, n. 7, p. 74
- Article
27
- Computer Science & Telecommunications, 2015, v. 46, n. 2, p. 36
- Article
28
- Computer Science & Telecommunications, 2010, v. 27, n. 4, p. 48
- Rasheed, Mohammad M.;
- Ghazali, Osman;
- Md Norwawi, Norita
- Article
29
- Informatica (03505596), 2007, v. 31, n. 3, p. 269
- Article
30
- MNASSA: Monthly Notes of the Astronomical Society of Southern Africa, 2008, v. 67, n. 9/10, p. 184
- Article
31
- Research & Exploration in Laboratory, 2014, v. 33, n. 8, p. 119
- WANG Guang-wei;
- PAN Hong;
- FAN Ming-yu
- Article
32
- International Journal of Information Security, 2018, v. 17, n. 2, p. 121, doi. 10.1007/s10207-017-0365-1
- Shah, Ankit;
- Ganesan, Rajesh;
- Jajodia, Sushil;
- Cam, Hasan
- Article
33
- International Journal of Information Security, 2016, v. 15, n. 4, p. 361, doi. 10.1007/s10207-015-0297-6
- Miao, Qiguang;
- Liu, Jiachen;
- Cao, Ying;
- Song, Jianfeng
- Article
34
- International Journal of Information Security, 2011, v. 10, n. 5, p. 269, doi. 10.1007/s10207-011-0132-7
- Kong, Deguang;
- Jhi, Yoon-Chan;
- Gong, Tao;
- Zhu, Sencun;
- Liu, Peng;
- Xi, Hongsheng
- Article
35
- International Journal of Information Security, 2007, v. 6, n. 6, p. 361, doi. 10.1007/s10207-007-0032-z
- Anagnostakis, Kostas;
- Greenwald, Michael;
- Ioannidis, Sotiris;
- Keromytis, Angelos
- Article
36
- Journal of Criminal Investigation, 2011, v. 4, n. 2, p. 101
- Article
37
- Computer Journal, 2015, v. 58, n. 10, p. 2758, doi. 10.1093/comjnl/bxv047
- ABED GRÉGIO, ANDRÉ RICARDO;
- MONTE AFONSO, VITOR;
- FERNANDES FILHO, DARIO SIMÕES;
- DE GEUS, PAULO LÍCIO;
- JINO, MARIO
- Article
38
- Computer Journal, 2011, v. 54, n. 10, p. 1700, doi. 10.1093/comjnl/bxr082
- Wang, Yini;
- Wen, Sheng;
- Cesare, Silvio;
- Zhou, Wanlei;
- Xiang, Yang
- Article
39
- Computer Journal, 2010, v. 53, n. 10, p. 1576, doi. 10.1093/comjnl/bxq009
- Giannetsos, Thanassis;
- Dimitriou, Tassos;
- Krontiris, Ioannis;
- Prasad, Neeli R.
- Article
40
- Computer Journal, 1998, v. 41, n. 7, p. 444, doi. 10.1093/comjnl/41.7.444
- Thimbleby, H.;
- Anderson, S.;
- Cairns, P.
- Article
41
- Information (2078-2489), 2015, v. 6, n. 4, p. 613, doi. 10.3390/info6040613
- Jinhua Ma;
- Zhide Chen;
- Jianghua Liu;
- Rongjun Zheng
- Article
42
- Annals of the University of Petrosani Economics, 2009, v. 9, n. 4, p. 205
- Article
43
- ComputerWorld Hong Kong, 2011, v. 28, n. 1, p. 30
- Article
44
- ComputerWorld Hong Kong, 2010, v. 26, n. 4, p. 21
- Article
45
- ComputerWorld Hong Kong, 2008, p. 47
- Article
46
- Survival (0039-6338), 2013, v. 55, n. 2, p. 81, doi. 10.1080/00396338.2013.784468
- Bronk, Christopher;
- Tikk-Ringas, Eneken
- Article
47
- Survival (0039-6338), 2011, v. 53, n. 1, p. 23, doi. 10.1080/00396338.2011.555586
- Farwell, JamesP.;
- Rohozinski, Rafal
- Article
48
- Journal of Intelligent Information Systems, 2010, v. 35, n. 1, p. 123, doi. 10.1007/s10844-009-0092-9
- Article
49
- Journal of Intelligent Information Systems, 2010, v. 35, n. 1, p. 1, doi. 10.1007/s10844-009-0086-7
- Yanfang Ye;
- Tao Li;
- Kai Huang;
- Qingshan Jiang;
- Yong Chen
- Article
50
- Nature, 2007, v. 449, n. 7160, p. 287, doi. 10.1038/449287a
- Article