Academic literature on the topic 'Computer viruses'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer viruses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer viruses"

1

Melhum, Amera I., and Susan A. Mahmood. "Parasitic Computer Viruses." Journal of Zankoy Sulaimani - Part A 4, no. 1 (2000): 45–50. http://dx.doi.org/10.17656/jzs.10064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gagescu, Raluca. "Computer viruses." Nature Reviews Molecular Cell Biology 2, no. 5 (2001): 324. http://dx.doi.org/10.1038/35073057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weems, Robyn P. "Computer Viruses." Library & Archival Security 14, no. 2 (1998): 51–59. http://dx.doi.org/10.1300/j114v14n02_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Subramanya, S. R., and N. Lakshminarasimhan. "Computer viruses." IEEE Potentials 20, no. 4 (2001): 16–19. http://dx.doi.org/10.1109/45.969588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fountain, V. A. E. "Computer viruses." IEE Review 34, no. 10 (1988): 399. http://dx.doi.org/10.1049/ir:19880159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Morgan Lloyd, Mark. "Computer viruses." IEE Review 35, no. 9 (1989): 338. http://dx.doi.org/10.1049/ir:19890149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Siegel, Michael A. "Computer Viruses." Journal of the American Dental Association 123, no. 11 (1992): 10–12. http://dx.doi.org/10.14219/jada.archive.1992.0303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abelson, Martin N. "Computer viruses." American Journal of Orthodontics and Dentofacial Orthopedics 104, no. 1 (1993): 96–97. http://dx.doi.org/10.1016/s0889-5406(08)80123-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cohen, Fred. "Computer viruses." Computers & Security 6, no. 1 (1987): 22–35. http://dx.doi.org/10.1016/0167-4048(87)90122-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hennessy, Chris. "Computer viruses." Computer Law & Security Review 5, no. 5 (1990): 40. http://dx.doi.org/10.1016/0267-3649(90)90050-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer viruses"

1

Luke, James Steven. "Detecting previously unseen computer viruses." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Szeto, Wai-chi. "Computer virus prevention and control in Hong Kong /." [Hong Kong] : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Posluszny, Frank S. "Overcoming limitations in computer worm models." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-01315-115046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.

Full text
Abstract:
Thesis (Masters Diploma (Information Technology))--Cape Technikon, Cape Town, 1994<br>Computer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in
APA, Harvard, Vancouver, ISO, and other styles
5

Schultz, John S. "Offline forensic analysis of Microsoft Windows XP physical memory." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FSchultz.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Chris Eagle. "September 2006." Includes bibliographical references (p. 73-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xin. "Computer viruses: The threat today and the expected future." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1998.

Full text
Abstract:
<p>This Master’s Thesis within the area computer security concerns ”Computer viruses: The threat today and the expected future”. </p><p>Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today’s influencing factors for near future computer virus epidemics are explained, then it further predicts new possible types of computer viruses in
APA, Harvard, Vancouver, ISO, and other styles
7

Posluszny, III Frank S. "Overcoming Limitations in Computer Worm Models." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/151.

Full text
Abstract:
In less than two decades, destruction and abuse caused by computer viruses and worms have grown from an anomaly to an everyday occurrence. In recent years, the Computer Emergency Response Team (CERT) has recorded a steady increase in software defects and vulnerabilities, similar to those exploited by the Slammer and Code Red worms. In response to such a threat, the academic community has started a set of research projects seeking to understand worm behavior through creation of highly theoretical and generalized models. Staniford et. al. created a model to explain the propagation behaviors of
APA, Harvard, Vancouver, ISO, and other styles
8

Webster, Matthew Paul. "Formal models of reproduction : from computer viruses to artificial life." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501590.

Full text
Abstract:
In this thesis we describe novel approaches to the formal description of systems which reproduce, and show that the resulting models have explanatory power and practical applications, particularly in the domain of computer virology. We start by generating a formal description of computer viruses based on formal methods and notations developed for software engineering. We then prove that our model can be used to detect metamorphic computer viruses, which are designed specifically to avoid well-established signature-based detection methods. Next, we move away from the specific case of reproducin
APA, Harvard, Vancouver, ISO, and other styles
9

林衛華 and Wai-wa Lam. "Multi-agent based human immune system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31221117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lam, Wai-wa. "Multi-agent based human immune system /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2093337X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer viruses"

1

Roberts, Ralph, and Ralph Roberts. Computer viruses: A Compute! book. Edited by Stephen Levy. Compute! Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Henderson, Harry. Computer viruses. Lucent Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stang, David J. Computer viruses. 7th ed. National Computer Security Association, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Denning, Peter J. Computer viruses. Research Institute for Advanced Computer Science, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peers, Eddie. Computer viruses. Deloitte Haskins & Sells, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Collier, Paul. Computer viruses. Member Services Directorate of the Institute of Chartered Accountants in England and Wales, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shea, John M. Combating computer viruses. Gareth Stevens, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

M, Duffy Neil, ed. Managing computer viruses. Oxford University Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hruska, Jan. Computer viruses and anti-virus warfare. Ellis Horwood, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gregory, Peter H. Computer Viruses For Dummies. John Wiley & Sons, Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer viruses"

1

Hunter, John M. D. "Computer Viruses." In Computer Communications and Networks. Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Salomon, David. "Viruses." In Elements of Computer Security. Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ball, Rafael. "Computer Viruses, Computer Worms, and the Self-Replication of Programs." In Viruses in all Dimensions. Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-38826-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marchette, David J. "Computer Viruses and Worms." In Computer Intrusion Detection and Network Monitoring. Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Slade, Robert. "Computer Viruses and Worms." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Slade, Robert. "Computer Operations and Viral Operations." In Guide to Computer Viruses. Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferbrache, David. "Theory of Viruses." In A Pathology of Computer Viruses. Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ferbrache, David. "Apple Macintosh Viruses." In A Pathology of Computer Viruses. Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Belous, Anatoly, and Vitali Saladukha. "Computer Viruses, Malicious Logic, and Spyware." In Viruses, Hardware and Software Trojans. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Slade, Robert. "Introduction: Definitions, Jargon, and Myths." In Guide to Computer Viruses. Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer viruses"

1

Zhang, Xianxiu, Yuming Feng, Yi Yang, and Baojie Zhang. "Toward Understanding How the Saturation Effect Impacts the Spread of Computer Viruses." In 2024 6th International Conference on Electronic Engineering and Informatics (EEI). IEEE, 2024. http://dx.doi.org/10.1109/eei63073.2024.10696820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Popov, George, and Antoaneta Popova. "A Semi-Markovian Model of the Spread of Viruses in a Computer System." In 2024 XXXIII International Scientific Conference Electronics (ET). IEEE, 2024. http://dx.doi.org/10.1109/et63133.2024.10721522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prakash, Om, and Avadhesh Kumar. "Computer Virus Propagation Models: A Mathematical Review." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oudetallah, Jamal, Imane Zouak, Wasim Audeh, et al. "Control of Chaos in Fractional Computer Virus Model." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oudetallah, Jamal, Imane Zouak, Wasim Audeh, et al. "Synchronization of Computer Virus System Using Fractional Calculus." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

BOTH, Paul-Valentin. "Computer Viruses and Methods to Avoid Viruses and Spyware." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.04.

Full text
Abstract:
The purpose of this article is to make a brief presentation of the types of the most common computer viruses and spyware, how they work and to offer a few guidelines on the ways through which we can protect our computers.
APA, Harvard, Vancouver, ISO, and other styles
7

Davis, R. "Exploring computer viruses." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"EVOLUTION OF COMPUTER VIRUSES." In Математическое и программное обеспечение информационных, технических и экономических систем. Издательство Томского государственного университета, 2021. http://dx.doi.org/10.17223/978-5-907442-42-9-2021-34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhattacharya, Prasanta, and William Thies. "Computer viruses in urban Indian telecenters." In the 5th ACM workshop. ACM Press, 2011. http://dx.doi.org/10.1145/1999927.1999940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cohen, F. "Current best practice against computer viruses." In 25th Annual 1991 IEEE International Carnahan Conference on Security Technology. IEEE, 1991. http://dx.doi.org/10.1109/ccst.1991.202223.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer viruses"

1

Wack, John P., and Lisa J. Carnahan. Computer viruses and related threats. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/5608409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), 1992. http://dx.doi.org/10.2172/10133178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tinto, Mario. Computer Viruses: Prevention, Detection, and Treatment. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada477537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kirsch, Robert A., and II. Viruses And Other Computer Pathogens: Should DoD Care? Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada326780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Skormin, Victor, and Douglas Summerville. Recognition of Computer Viruses by Detecting Their Gene of Self Replication. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada448622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Orvis, W. J. Computer virus information update CIAC-2301. Office of Scientific and Technical Information (OSTI), 1994. http://dx.doi.org/10.2172/10151004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Murray, W. P. The Computer Virus: Infection, Removal, and Protection. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada637045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rodriguez Muxica, Natalia. Open configuration options Bioinformatics for Researchers in Life Sciences: Tools and Learning Resources. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0003982.

Full text
Abstract:
The COVID-19 pandemic has shown that bioinformatics--a multidisciplinary field that combines biological knowledge with computer programming concerned with the acquisition, storage, analysis, and dissemination of biological data--has a fundamental role in scientific research strategies in all disciplines involved in fighting the virus and its variants. It aids in sequencing and annotating genomes and their observed mutations; analyzing gene and protein expression; simulation and modeling of DNA, RNA, proteins and biomolecular interactions; and mining of biological literature, among many other c
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!