-
1
Macintosh Computer Viruses: Descriptions and Eradication Methods
Published 1989-10-01Subjects: “…Computer virus…”
Get full text
Article -
2
Hopf bifurcation analysis for an epidemic model over the Internet with two delays
Published 2018-03-01Subjects: “…Computer virus…”
Get full text
Article -
3
A Risk Management Approach to Double-Virus Tradeoff Problem
Published 2019-01-01Subjects: “…Computer virus…”
Get full text
Article -
4
HOPF- bifurcation analysis of delayed computer virus model with holling type iii incidence function and treatment
Published 2022-03-01Subjects: “…Computer virus model…”
Get full text
Article -
5
Nonstandard Finite Difference Scheme for a Computer Virus Model
Published 2020-12-01Subjects: “…computer virus…”
Get full text
Article -
6
Optimal Control of SLBRS with Recovery Rates
Published 2023-12-01Subjects: “…computer virus…”
Get full text
Article -
7
Hopf bifurcation of a computer virus spreading model in the network with limited anti-virus ability
Published 2017-06-01Subjects: Get full text
Article -
8
A dynamic model of viruses with the effect of removable media on a computer network with heterogeneous immunity
Published 2020-06-01Subjects: “…Computer virus…”
Get full text
Article -
9
Algebraic Structures Induced by the Insertion and Detection of Malware
Published 2023-07-01Subjects: Get full text
Article -
10
A delayed e-epidemic SLBS model for computer virus
Published 2019-09-01Subjects: Get full text
Article -
11
Analysis of a SEIR-KS Mathematical Model For Computer Virus Propagation in a Periodic Environment
Published 2020-05-01Subjects: Get full text
Article -
12
State feedback impulsive control of computer worm and virus with saturated incidence
Published 2018-11-01Subjects: Get full text
Article -
13
THE OPTIMAL CONTROL IN THE MODELOF NETWORK SECURITY FROM MALICIOUS CODE
Published 2016-12-01Subjects: “…computer virus…”
Get full text
Article -
14
COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM
Published 2020-12-01Subjects: Get full text
Article -
15
A Survey on Artificial Intelligence in Malware as Next-Generation Threats
Published 2019-12-01Subjects: Get full text
Article -
16
Constructing a Macro Virus to Upgrading Antivirus Programs
Published 2011-03-01Subjects: Get full text
Article -
17
A delayed computer virus model with nonlinear incidence rate
Published 2019-01-01Subjects: “…computer virus…”
Get full text
Article -
18
Optimal Control Strategy for SLBRS with Two Control Inputs
Published 2023-09-01Subjects: “…computer virus…”
Get full text
Article -
19
Study of data center communication network topologies using complex network propagation model
Published 2023-05-01Subjects: Get full text
Article -
20
Real time database system data security collection scheme
Published 2016-10-01Subjects: Get full text
Article