-
81
-
82
Analysis and effectiveness of signature based in detecting metamorphic virus [electronic resource] /
Published 2010Subjects: -
83
A virus disaster recovery plan framework for academic computing center /
Published 2014Subjects: “…Computer viruses…”
-
84
A virus disaster recovery plan framework for academic computing center [electronic resource] /
Published 2014Subjects: “…Computer viruses…”
-
85
Enhanced cuckoo malware analysis performance using cloud computing
Published 2013Subjects: Get full text
Thesis -
86
-
87
COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM
Published 2020-12-01Subjects: Get full text
Article -
88
A Survey on Artificial Intelligence in Malware as Next-Generation Threats
Published 2019-12-01Subjects: Get full text
Article -
89
Constructing a Macro Virus to Upgrading Antivirus Programs
Published 2011-03-01Subjects: Get full text
Article -
90
Optimal Control Strategy for SLBRS with Two Control Inputs
Published 2023-09-01Subjects: “…computer virus…”
Get full text
Article -
91
-
92
-
93
Supervised machine learning approach for detection of malicious executables /
Published 2013Subjects: -
94
Supervised machine learning approach for detection of malicious executables [electronic resource] /
Published 2013Subjects: -
95
Study of data center communication network topologies using complex network propagation model
Published 2023-05-01Subjects: Get full text
Article -
96
ANALYSIS OF THE STABILITY OF THE MALWARE PROPAGATION MODEL
Published 2014-09-01Subjects: Get full text
Article -
97
-
98
Disruptive security technologies with mobile code and peer-to-peer networks /
Published 2005Subjects: -
99
Energy-Efficient Patching Strategy for Wireless Sensor Networks
Published 2019-01-01Subjects: Get full text
Article -
100
A Comparative Analysis of VirLock and Bacteriophage <i>ϕ</i>6 through the Lens of Game Theory
Published 2023-11-01Subjects: Get full text
Article