Academic literature on the topic 'Computer viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer viruses"
Melhum, Amera I., and Susan A. Mahmood. "Parasitic Computer Viruses." Journal of Zankoy Sulaimani - Part A 4, no. 1 (2000): 45–50. http://dx.doi.org/10.17656/jzs.10064.
Full textGagescu, Raluca. "Computer viruses." Nature Reviews Molecular Cell Biology 2, no. 5 (2001): 324. http://dx.doi.org/10.1038/35073057.
Full textWeems, Robyn P. "Computer Viruses." Library & Archival Security 14, no. 2 (1998): 51–59. http://dx.doi.org/10.1300/j114v14n02_07.
Full textSubramanya, S. R., and N. Lakshminarasimhan. "Computer viruses." IEEE Potentials 20, no. 4 (2001): 16–19. http://dx.doi.org/10.1109/45.969588.
Full textFountain, V. A. E. "Computer viruses." IEE Review 34, no. 10 (1988): 399. http://dx.doi.org/10.1049/ir:19880159.
Full textMorgan Lloyd, Mark. "Computer viruses." IEE Review 35, no. 9 (1989): 338. http://dx.doi.org/10.1049/ir:19890149.
Full textSiegel, Michael A. "Computer Viruses." Journal of the American Dental Association 123, no. 11 (1992): 10–12. http://dx.doi.org/10.14219/jada.archive.1992.0303.
Full textAbelson, Martin N. "Computer viruses." American Journal of Orthodontics and Dentofacial Orthopedics 104, no. 1 (1993): 96–97. http://dx.doi.org/10.1016/s0889-5406(08)80123-0.
Full textCohen, Fred. "Computer viruses." Computers & Security 6, no. 1 (1987): 22–35. http://dx.doi.org/10.1016/0167-4048(87)90122-2.
Full textHennessy, Chris. "Computer viruses." Computer Law & Security Review 5, no. 5 (1990): 40. http://dx.doi.org/10.1016/0267-3649(90)90050-l.
Full textDissertations / Theses on the topic "Computer viruses"
Luke, James Steven. "Detecting previously unseen computer viruses." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274015.
Full textSzeto, Wai-chi. "Computer virus prevention and control in Hong Kong /." [Hong Kong] : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302371.
Full textPosluszny, Frank S. "Overcoming limitations in computer worm models." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-01315-115046.
Full textWeideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.
Full textSchultz, John S. "Offline forensic analysis of Microsoft Windows XP physical memory." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FSchultz.pdf.
Full textLi, Xin. "Computer viruses: The threat today and the expected future." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1998.
Full textPosluszny, III Frank S. "Overcoming Limitations in Computer Worm Models." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/151.
Full textWebster, Matthew Paul. "Formal models of reproduction : from computer viruses to artificial life." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501590.
Full text林衛華 and Wai-wa Lam. "Multi-agent based human immune system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31221117.
Full textLam, Wai-wa. "Multi-agent based human immune system /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2093337X.
Full textBooks on the topic "Computer viruses"
Roberts, Ralph, and Ralph Roberts. Computer viruses: A Compute! book. Edited by Stephen Levy. Compute! Books, 1988.
Find full textStang, David J. Computer viruses. 7th ed. National Computer Security Association, 1991.
Find full textDenning, Peter J. Computer viruses. Research Institute for Advanced Computer Science, 1988.
Find full textCollier, Paul. Computer viruses. Member Services Directorate of the Institute of Chartered Accountants in England and Wales, 1991.
Find full textBook chapters on the topic "Computer viruses"
Hunter, John M. D. "Computer Viruses." In Computer Communications and Networks. Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_12.
Full textSalomon, David. "Viruses." In Elements of Computer Security. Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_2.
Full textBall, Rafael. "Computer Viruses, Computer Worms, and the Self-Replication of Programs." In Viruses in all Dimensions. Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-38826-3_4.
Full textMarchette, David J. "Computer Viruses and Worms." In Computer Intrusion Detection and Network Monitoring. Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_6.
Full textSlade, Robert. "Computer Viruses and Worms." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch28.
Full textSlade, Robert. "Computer Operations and Viral Operations." In Guide to Computer Viruses. Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_4.
Full textFerbrache, David. "Theory of Viruses." In A Pathology of Computer Viruses. Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_3.
Full textFerbrache, David. "Apple Macintosh Viruses." In A Pathology of Computer Viruses. Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_6.
Full textBelous, Anatoly, and Vitali Saladukha. "Computer Viruses, Malicious Logic, and Spyware." In Viruses, Hardware and Software Trojans. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_2.
Full textSlade, Robert. "Introduction: Definitions, Jargon, and Myths." In Guide to Computer Viruses. Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_1.
Full textConference papers on the topic "Computer viruses"
Zhang, Xianxiu, Yuming Feng, Yi Yang, and Baojie Zhang. "Toward Understanding How the Saturation Effect Impacts the Spread of Computer Viruses." In 2024 6th International Conference on Electronic Engineering and Informatics (EEI). IEEE, 2024. http://dx.doi.org/10.1109/eei63073.2024.10696820.
Full textPopov, George, and Antoaneta Popova. "A Semi-Markovian Model of the Spread of Viruses in a Computer System." In 2024 XXXIII International Scientific Conference Electronics (ET). IEEE, 2024. http://dx.doi.org/10.1109/et63133.2024.10721522.
Full textPrakash, Om, and Avadhesh Kumar. "Computer Virus Propagation Models: A Mathematical Review." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064109.
Full textOudetallah, Jamal, Imane Zouak, Wasim Audeh, et al. "Control of Chaos in Fractional Computer Virus Model." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013727.
Full textOudetallah, Jamal, Imane Zouak, Wasim Audeh, et al. "Synchronization of Computer Virus System Using Fractional Calculus." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013551.
Full textBOTH, Paul-Valentin. "Computer Viruses and Methods to Avoid Viruses and Spyware." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.04.
Full textDavis, R. "Exploring computer viruses." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113403.
Full text"EVOLUTION OF COMPUTER VIRUSES." In Математическое и программное обеспечение информационных, технических и экономических систем. Издательство Томского государственного университета, 2021. http://dx.doi.org/10.17223/978-5-907442-42-9-2021-34.
Full textBhattacharya, Prasanta, and William Thies. "Computer viruses in urban Indian telecenters." In the 5th ACM workshop. ACM Press, 2011. http://dx.doi.org/10.1145/1999927.1999940.
Full textCohen, F. "Current best practice against computer viruses." In 25th Annual 1991 IEEE International Carnahan Conference on Security Technology. IEEE, 1991. http://dx.doi.org/10.1109/ccst.1991.202223.
Full textReports on the topic "Computer viruses"
Wack, John P., and Lisa J. Carnahan. Computer viruses and related threats. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-166.
Full textBrown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/5608409.
Full textBrown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10133178.
Full textTinto, Mario. Computer Viruses: Prevention, Detection, and Treatment. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada477537.
Full textKirsch, Robert A., and II. Viruses And Other Computer Pathogens: Should DoD Care? Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada326780.
Full textSkormin, Victor, and Douglas Summerville. Recognition of Computer Viruses by Detecting Their Gene of Self Replication. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada448622.
Full textOrvis, W. J. Computer virus information update CIAC-2301. Office of Scientific and Technical Information (OSTI), 1994. http://dx.doi.org/10.2172/10151004.
Full textMurray, W. P. The Computer Virus: Infection, Removal, and Protection. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada637045.
Full textRodriguez Muxica, Natalia. Open configuration options Bioinformatics for Researchers in Life Sciences: Tools and Learning Resources. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0003982.
Full text