-
101
Multi-computer malware detection systems with metamorphic functionality
Published 2024-02-01Subjects: Get full text
Article -
102
COMPUTER VIROLOGY: TOWARD DESIGNING AN IDEAL ANTI.VIRUS SYSTEM
Published 2003-09-01Subjects: “…Computer viruses, virus execution, virus detection, virus infection, virus eradication, virus spreading…”
Get full text
Article -
103
Optimal cybersecurity management of an IP video surveillance system using neural network technologies
Published 2023-01-01Subjects: Get full text
Article -
104
Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data
Published 2022-01-01Subjects: Get full text
Article -
105
-
106
-
107
-
108
-
109
Perkakasan dan firmware anti virus ... [et al.] / [mikrofilem]
Published 2000Subjects: “…Computer viruses…”
-
110
Sistem pelanggan mel elektronik dengan antaramuka pengimbas virus [microfilm] /
Published 2002Subjects: -
111
-
112
Radiation-Based Virus Attack and Defense Reliability Optimization Design
Published 2016-08-01“…The last of a computer virus spread in the network established a relevant mathematical model. …”
Get full text
Article -
113
METAPHORS IN COMPUTER VIROLOGY DISCOURSE
Published 2013-10-01“…The object of the investigation is the concept “computer virus” and its linguistic representation in a computer virology discourse. …”
Get full text
Article -
114
The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach.
Published 2015-01-01“…For that purpose, a new epidemic model of computer virus, known as the node-based SLBS model, is proposed. …”
Get full text
Article -
115
Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches
Published 2022-10-01Get full text
Article -
116
Identifying infection sources in a network
Published 2015“…Such networks are susceptible to rapidly spreading “infection”, which can have different meanings under different contexts, including a contagious disease, a computer virus or a rumor. Timely identification of the infection sources (the index cases of a contagious disease, the original servers that injected a computer virus into the Internet, or the rumor origins that started a rumor in a social network) is critical for limiting the damage caused by the infection. …”
Get full text
Thesis -
117
WHAT TO DO IN AN EMERGENCY : PRACTICAL ADVICE FOR EVERY SITUATION /
Published 2011“…You'll also find clear, practical advice for dealing with a blocked toilet, a computer virus or an encounter with a snarling dog. Armed with this book, you'll be able to cope with anything.…”
text -
118
Saving thanehaven /
Published 2014“…And can it be true what people are saying: that Noble actually lives inside a computer (whatever that is), and that Rufus is a computer virus? A fast-paced story with a hilarious combination of characters that pushes the boundaries of space and time.…”
-
119
Classification of polymorphic virus based on integrated features
Published 2018“…We extracted 49 features from 700 polymorphic computer virus samples from Netherland Net Lab and VXHeaven, which includes benign and polymorphic virus function. …”
Get full text
Article -
120
Virus in the computer and smartphone system / Mohammad Faiz Hafizuddin Johari
Published 2015“…The purpose of this research is to do research on how far a computer virus can go. It because computer virus is same to human virus that can transfer from one person to another or from a computer to other computer. …”
Get full text
Student Project