Academic literature on the topic 'Computer viruses'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer viruses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer viruses"

1

Melhum, Amera I., and Susan A. Mahmood. "Parasitic Computer Viruses." Journal of Zankoy Sulaimani - Part A 4, no. 1 (September 5, 2000): 45–50. http://dx.doi.org/10.17656/jzs.10064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gagescu, Raluca. "Computer viruses." Nature Reviews Molecular Cell Biology 2, no. 5 (May 2001): 324. http://dx.doi.org/10.1038/35073057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weems, Robyn P. "Computer Viruses." Library & Archival Security 14, no. 2 (August 18, 1998): 51–59. http://dx.doi.org/10.1300/j114v14n02_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Subramanya, S. R., and N. Lakshminarasimhan. "Computer viruses." IEEE Potentials 20, no. 4 (2001): 16–19. http://dx.doi.org/10.1109/45.969588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fountain, V. A. E. "Computer viruses." IEE Review 34, no. 10 (1988): 399. http://dx.doi.org/10.1049/ir:19880159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Morgan Lloyd, Mark. "Computer viruses." IEE Review 35, no. 9 (1989): 338. http://dx.doi.org/10.1049/ir:19890149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Siegel, Michael A. "Computer Viruses." Journal of the American Dental Association 123, no. 11 (November 1992): 10–12. http://dx.doi.org/10.14219/jada.archive.1992.0303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abelson, Martin N. "Computer viruses." American Journal of Orthodontics and Dentofacial Orthopedics 104, no. 1 (July 1993): 96–97. http://dx.doi.org/10.1016/s0889-5406(08)80123-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cohen, Fred. "Computer viruses." Computers & Security 6, no. 1 (February 1987): 22–35. http://dx.doi.org/10.1016/0167-4048(87)90122-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hennessy, Chris. "Computer viruses." Computer Law & Security Review 5, no. 5 (January 1990): 40. http://dx.doi.org/10.1016/0267-3649(90)90050-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer viruses"

1

Luke, James Steven. "Detecting previously unseen computer viruses." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Szeto, Wai-chi. "Computer virus prevention and control in Hong Kong /." [Hong Kong] : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Posluszny, Frank S. "Overcoming limitations in computer worm models." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-01315-115046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.

Full text
Abstract:
Thesis (Masters Diploma (Information Technology))--Cape Technikon, Cape Town, 1994
Computer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in industry was measured by sending a questionnaire to 388 companies country-wide. &~ average of 2l,5% of the respondents claimed detrimental effects to information stored on disk due to computer viruses. This and other data was used to guide laboratory experiments on the actual damage done by computer viruses to stored information. A set of test disks was prepared to represent programs and data of a typical PC user in industry. Fifteen different virus programs were used individually to infect the test disks. After each infection, all the test disks were inspected to ascertain damage to data, system and program files as well as to separate disk sectors. The research established that: The damage done by computer viruses to stored information is generally limited to one file or disk area. Where damage to stored information did occur, it was often reversible. Irrational user responses to virus symptoms provide a large potential source for damage to stored information. The availability of master program disks (for program file restoration) and recent, validated data backup is essential to recovery from a computer virus infection. A user can solve most problems caused by virus infections if he has a basic understanding of disk structure, i.e. tracks, sectors, sides, the FAT, etc, and of the use of disk utility programs like Norton Utilities or PCTools. The fact that some of the findings of prominent virus researchers could not be verified, suggests that virus programs could be unstable. Claims regarding the damage inflicted by viruses must be considered to be valid only for a specific copy of the virus under discussion. The importance of using original application software (to minimize the transfer of viruses and to enable program file restoration) , regular back-ups (to enable data file restoration) and basic user awareness (infection prevention, symptoms, the use of anti-viral and utility programs, etc.) was emphasized. The average PC user should be able to clear up a virus infection without assistance by following the given disinfection procedure. Suggestions for further study include virus origins, generations, mutations, multiple infections, and the effect of viruses on computer networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Schultz, John S. "Offline forensic analysis of Microsoft Windows XP physical memory." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FSchultz.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Chris Eagle. "September 2006." Includes bibliographical references (p. 73-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xin. "Computer viruses: The threat today and the expected future." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1998.

Full text
Abstract:

This Master’s Thesis within the area computer security concerns ”Computer viruses: The threat today and the expected future”.

Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today’s influencing factors for near future computer virus epidemics are explained, then it further predicts new possible types of computer viruses in the near future; Furthermore, currently available anti-virus technologies are analyzed concerning both advantages and disadvantages; Finally, new promising trends in computer virus defence are explored in details.

APA, Harvard, Vancouver, ISO, and other styles
7

Posluszny, III Frank S. "Overcoming Limitations in Computer Worm Models." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/151.

Full text
Abstract:
In less than two decades, destruction and abuse caused by computer viruses and worms have grown from an anomaly to an everyday occurrence. In recent years, the Computer Emergency Response Team (CERT) has recorded a steady increase in software defects and vulnerabilities, similar to those exploited by the Slammer and Code Red worms. In response to such a threat, the academic community has started a set of research projects seeking to understand worm behavior through creation of highly theoretical and generalized models. Staniford et. al. created a model to explain the propagation behaviors of such worms in computer network environments. Their model makes use of the Kermack-McKendrick biological model of propagation as applied to digital systems. Liljenstam et. al. add a spatial perspective to this model, varying the infection rate by the scanning worms' source and destination groups. These models have been shown to describe generic Internet-scale behavior. However, they are lacking from a localized (campus-scale) network perspective. We make the claim that certain real-world constraints, such as bandwidth and heterogeneity of hosts, affect the propagation of worms and thus should not be ignored when creating models for analysis. In setting up a testing environment for this hypothesis, we have identified areas that need further work in the computer worm research community. These include availability of real-world data, a generalized and behaviorally complete worm model, and packet-based simulations. The major contributions of this thesis involve a parameterized, algorithmic worm model, an openly available worm simulation package (based on SSFNet and SSF.App.Worm), analysis of test results showing justification to our claim, and suggested future directions.
APA, Harvard, Vancouver, ISO, and other styles
8

Webster, Matthew Paul. "Formal models of reproduction : from computer viruses to artificial life." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501590.

Full text
Abstract:
In this thesis we describe novel approaches to the formal description of systems which reproduce, and show that the resulting models have explanatory power and practical applications, particularly in the domain of computer virology. We start by generating a formal description of computer viruses based on formal methods and notations developed for software engineering. We then prove that our model can be used to detect metamorphic computer viruses, which are designed specifically to avoid well-established signature-based detection methods. Next, we move away from the specific case of reproducing programs, and consider formal models of reproducing things in general. We show that we can develop formal models of the ecology of a reproducer, based on a formalisation of Gibson's theory of affordances.
APA, Harvard, Vancouver, ISO, and other styles
9

林衛華 and Wai-wa Lam. "Multi-agent based human immune system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31221117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lam, Wai-wa. "Multi-agent based human immune system /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2093337X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer viruses"

1

Roberts, Ralph, and Ralph Roberts. Computer viruses: A Compute! book. Edited by Stephen Levy. Greensboro, NC: Compute! Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Henderson, Harry. Computer viruses. San Diego, Calf: Lucent Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stang, David J. Computer viruses. 7th ed. [Washington, D.C.]: National Computer Security Association, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Denning, Peter J. Computer viruses. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peers, Eddie. Computer viruses. [London]: Deloitte Haskins & Sells, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Collier, Paul. Computer viruses. London: Member Services Directorate of the Institute of Chartered Accountants in England and Wales, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shea, John M. Combating computer viruses. New York: Gareth Stevens, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

M, Duffy Neil, ed. Managing computer viruses. Oxford: Oxford University Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hruska, Jan. Computer viruses and anti-virus warfare. New York: Ellis Horwood, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gregory, Peter H. Computer Viruses For Dummies. New York: John Wiley & Sons, Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer viruses"

1

Hunter, John M. D. "Computer Viruses." In Computer Communications and Networks, 115–33. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Salomon, David. "Viruses." In Elements of Computer Security, 37–97. London: Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ball, Rafael. "Computer Viruses, Computer Worms, and the Self-Replication of Programs." In Viruses in all Dimensions, 73–85. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-38826-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marchette, David J. "Computer Viruses and Worms." In Computer Intrusion Detection and Network Monitoring, 215–40. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Slade, Robert. "Computer Viruses and Worms." In Handbook of Computer Networks, 440–53. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Slade, Robert. "Computer Operations and Viral Operations." In Guide to Computer Viruses, 91–130. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferbrache, David. "Theory of Viruses." In A Pathology of Computer Viruses, 31–54. London: Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ferbrache, David. "Apple Macintosh Viruses." In A Pathology of Computer Viruses, 153–66. London: Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Belous, Anatoly, and Vitali Saladukha. "Computer Viruses, Malicious Logic, and Spyware." In Viruses, Hardware and Software Trojans, 101–207. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Slade, Robert. "Introduction: Definitions, Jargon, and Myths." In Guide to Computer Viruses, 3–28. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer viruses"

1

BOTH, Paul-Valentin. "Computer Viruses and Methods to Avoid Viruses and Spyware." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.04.

Full text
Abstract:
The purpose of this article is to make a brief presentation of the types of the most common computer viruses and spyware, how they work and to offer a few guidelines on the ways through which we can protect our computers.
APA, Harvard, Vancouver, ISO, and other styles
2

Davis, R. "Exploring computer viruses." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"EVOLUTION OF COMPUTER VIRUSES." In Математическое и программное обеспечение информационных, технических и экономических систем. Издательство Томского государственного университета, 2021. http://dx.doi.org/10.17223/978-5-907442-42-9-2021-34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhattacharya, Prasanta, and William Thies. "Computer viruses in urban Indian telecenters." In the 5th ACM workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1999927.1999940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cohen, F. "Current best practice against computer viruses." In 25th Annual 1991 IEEE International Carnahan Conference on Security Technology. IEEE, 1991. http://dx.doi.org/10.1109/ccst.1991.202223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gladychev, Nikolai. "Computer Viruses: The Abstract Theory Revisited." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0008942704060414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tavori, Jhonatan, and Hanoch Levy. "Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment." In NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2023. http://dx.doi.org/10.1109/noms56928.2023.10154217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tsarava, Katerina, Manuel Ninaus, Tereza Hannemann, Kristina Volná, Korbinian Moeller, and Cyril Brom. "Teaching primary school children about computer viruses." In WiPSCE '20: Workshop in Primary and Secondary Computing Education. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3421590.3421660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tsarava, Katerina, Manuel Ninaus, Tereza Hannemann, Kristina Volná, Korbinian Moeller, and Cyril Brom. "Fostering Knowledge of Computer Viruses among Children." In Koli Calling '20: 20th Koli Calling International Conference on Computing Education Research. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3428029.3428033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hannemann, Tereza, Tereza Stárková, Pavel Ježek, Kristina Volná, Kateřina Kačerovská, and Cyril Brom. "Eight-Year-Olds' Conceptions of Computer Viruses." In WiPSCE'19: 14th Workshop in Primary and Secondary Computing Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3361721.3361726.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer viruses"

1

Wack, John P., and Lisa J. Carnahan. Computer viruses and related threats. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), March 1992. http://dx.doi.org/10.2172/5608409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), March 1992. http://dx.doi.org/10.2172/10133178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tinto, Mario. Computer Viruses: Prevention, Detection, and Treatment. Fort Belvoir, VA: Defense Technical Information Center, March 1990. http://dx.doi.org/10.21236/ada477537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kirsch, Robert A., and II. Viruses And Other Computer Pathogens: Should DoD Care? Fort Belvoir, VA: Defense Technical Information Center, April 1997. http://dx.doi.org/10.21236/ada326780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Skormin, Victor, and Douglas Summerville. Recognition of Computer Viruses by Detecting Their Gene of Self Replication. Fort Belvoir, VA: Defense Technical Information Center, March 2006. http://dx.doi.org/10.21236/ada448622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Orvis, W. J. Computer virus information update CIAC-2301. Office of Scientific and Technical Information (OSTI), January 1994. http://dx.doi.org/10.2172/10151004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Murray, W. P. The Computer Virus: Infection, Removal, and Protection. Fort Belvoir, VA: Defense Technical Information Center, September 1993. http://dx.doi.org/10.21236/ada637045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rodriguez Muxica, Natalia. Open configuration options Bioinformatics for Researchers in Life Sciences: Tools and Learning Resources. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0003982.

Full text
Abstract:
The COVID-19 pandemic has shown that bioinformatics--a multidisciplinary field that combines biological knowledge with computer programming concerned with the acquisition, storage, analysis, and dissemination of biological data--has a fundamental role in scientific research strategies in all disciplines involved in fighting the virus and its variants. It aids in sequencing and annotating genomes and their observed mutations; analyzing gene and protein expression; simulation and modeling of DNA, RNA, proteins and biomolecular interactions; and mining of biological literature, among many other critical areas of research. Studies suggest that bioinformatics skills in the Latin American and Caribbean region are relatively incipient, and thus its scientific systems cannot take full advantage of the increasing availability of bioinformatic tools and data. This dataset is a catalog of bioinformatics software for researchers and professionals working in life sciences. It includes more than 300 different tools for varied uses, such as data analysis, visualization, repositories and databases, data storage services, scientific communication, marketplace and collaboration, and lab resource management. Most tools are available as web-based or desktop applications, while others are programming libraries. It also includes 10 suggested entries for other third-party repositories that could be of use.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography