Search

Your search keyword '"COMPUTER worms"' showing total 716 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER worms" Remove constraint Descriptor: "COMPUTER worms"
716 results on '"COMPUTER worms"'

Search Results

1. Glossary.

2. Managing extreme AI risks amid rapid progress.

3. Echoes of a Legacy: Career Reflections of William H. Murray.

5. Building an Efficient System to Detect Computer Worms in Websites Based on Ensemble Ada Boosting and SVM Classifiers Algorithms

6. Dynamic analysis and optimal control of worm propagation model with saturated incidence rate

7. Computer worms in control automation systems: Risk dynamics.

8. Toward Robust Monitoring of Malicious Outbreaks.

9. Parameter estimation of a susceptible–infected–recovered–dead computer worm model.

10. A Fractional SAIDR Model in the Frame of Atangana--Baleanu Derivative.

11. Topology-aware vulnerability mitigation worms : defensive worms

12. Hidden Markov Model-Based Attack Detection for Networked Control Systems Subject to Random Packet Dropouts.

14. Microsoft, Beset by Hacks, Grapples With Problem Years in the Making.

15. Dynamics of a controlled discontinuous computer worm system.

16. Reducing Generalization Error Using Autoencoders for The Detection of Computer Worms.

17. Unleashing the Digital Twin's Potential for ICS Security.

19. A probability distribution function for investigating node infection and removal times.

20. Moving Target Defense Approach to Detecting Stuxnet-Like Attacks.

21. Throwback Attack: Researchers worry Flame malware might be the next evolution of Stuxnet.

22. Analytic Solutions of the deterministic SEIA worm model by homotopy perturbation method.

23. Stability Analysis of Deterministic SEIAWorm Model by Reproductive Number.

24. Diffusivity of wormlike particles in isotropic melts and the influence of local nematization.

25. A Cellular Automata Model for Mobile Worm Propagation

26. In Defense of the 'Helminthiasis': A Technofeminist reading of the 1988 Internet Worm.

27. THE SHADOW WAR.

28. Conficker: the enemy within.

29. Inside the shady world of cyber weapons.

30. ON SOCIALISTS, SOVIETS, AND SKIPPING THAT EXTRA LATTE FOR ONCE.

31. A SIR e-Epidemic Model for Computer Worms Based on Cellular Automata

32. Detecting Computer Worms in the Cloud

33. Bifurcation analysis of an e-epidemic model in wireless sensor network.

34. The Threat of Cyber Terrorism and What International Law Should (Try To) Do about It.

35. The Impact of Predators on Malicious Worms Propagation: a Theoretical Approach.

36. Some estimation problems in epidemic modeling.

37. The impact of hesitation on passive worm spreading in P2P networks.

38. A methodology to measure and monitor level of operational effectiveness of a CSOC.

39. An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate.

40. The Post Exploitation Malware Era.

41. Delay Induced Hopf Bifurcation of an Epidemic Model with Graded Infection Rates for Internet Worms.

42. NADTW: new approach for detecting TCP worm.

44. Microsoft Vows to Revamp Security Products After Repeated Hacks.

45. Study of the stability of a SEIRS model for computer worm propagation.

46. A Decoy Framework to Protect Server from Wireless Network Worms.

47. Search Rank Fraud and Malware Detection in Google Play.

48. A stochastic worm model.

49. A NOVEL FRAMEWORK TO ALLEVIATE DISSEMINATION OF XSS WORMS IN ONLINE SOCIAL NETWORK (OSN) USING VIEW SEGREGATION.

50. A WORM type polymer electrical memory based on polyethersulfone with carbazole derivatives.

Catalog

Books, media, physical & digital resources