Search

Your search keyword '"COMPUTER worms"' showing total 86 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER worms" Remove constraint Descriptor: "COMPUTER worms" Database Supplemental Index Remove constraint Database: Supplemental Index
86 results on '"COMPUTER worms"'

Search Results

1. In Defense of the 'Helminthiasis': A Technofeminist reading of the 1988 Internet Worm.

2. The Threat of Cyber Terrorism and What International Law Should (Try To) Do about It.

3. The Impact of Predators on Malicious Worms Propagation: a Theoretical Approach.

4. CyberSN finds the cyber professionals to do the job.

5. Improving sensor network immunity under worm attacks: A software diversity approach.

6. Integrated Static and Dynamic Analysis for Malware Detection.

7. Investigation of Feature Selection Methods for Android Malware Analysis.

8. Designing Optimized Architecture for Network Security Devices.

9. CHAPTER 5: Detecting and Countering Malware & Spyware.

10. SECURITY THREAT SOURCES AND SUPPLIERS: A MANAGEMENT THREAT PROCESS MODEL.

11. Employing Machine Learning Algorithms to Detect Unknown Scanning and Email Worms.

12. "A CORRELATION STUDY ON VALUE ORIENTATION AND YOUTH LIFE STYLE".

13. PEACETIME CYBER-ESPIONAGE: A DANGEROUS BUT NECESSARY GAME.

14. CYBERCRIME: AN OVERVIEW OF THE FEDERAL COMPUTER FRAUD AND ABUSE STATUTE AND RELATED FEDERAL CRIMINAL LAWS.

15. ATTACK MODELS FOR VIRTUAL MACHINE SURVIVABILITY ANALYSIS.

16. BLENDED LEARNING APPROACH IN LEARNING MATHEMATICS.

18. Robust ICSs Critical for Guarding Against Cyber Threats.

19. The Analysis of Random Propagating Worms using Network Bandwidth.

20. Grid-Based Internet Worm Behavior Simulator.

21. Nine lives.

22. Propagation of active worms: A survey.

23. An Overview of Content-Based Spam Filtering Techniques.

24. An Architecture for Automatic and Adaptive Defense.

25. Worm holes.

26. Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding.

27. Revealing network threats, fears.

28. Exploiting Software Vulnerabilities.

29. PROTECT YOUR PCs.

30. Protecting the Internet Without Wrecking It: How to meet the security threat.

31. STUXNET REPORTS DISMAY LAWMAKERS; INVESTIGATION, LEGISLATION SOUGHT.

32. Are we losing the virus wars?

33. MALWARE: AN OVERVIEW.

34. Influential spreaders identification in complex networks with potential edge weight based k-shell degree neighborhood method.

35. CYBER SECURITY: THREATS MULTIPLY, BUT AWARENESS AND DEFENCES ARE STRENGTHENED.

36. Technology Roundup.

37. Worm.

39. Zoo.

40. VBS.SST.

41. SST Virus.

42. Slammer.

43. Script Vulnerability.

44. Sadmind.

45. QAZ.

46. Polymorphic Virus.

47. Morris Worm.

48. Melissa Virus.

49. Infection.

50. IM Worm.

Catalog

Books, media, physical & digital resources