Academic literature on the topic 'Computer viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer viruses"
Melhum, Amera I., and Susan A. Mahmood. "Parasitic Computer Viruses." Journal of Zankoy Sulaimani - Part A 4, no. 1 (September 5, 2000): 45–50. http://dx.doi.org/10.17656/jzs.10064.
Full textGagescu, Raluca. "Computer viruses." Nature Reviews Molecular Cell Biology 2, no. 5 (May 2001): 324. http://dx.doi.org/10.1038/35073057.
Full textWeems, Robyn P. "Computer Viruses." Library & Archival Security 14, no. 2 (August 18, 1998): 51–59. http://dx.doi.org/10.1300/j114v14n02_07.
Full textSubramanya, S. R., and N. Lakshminarasimhan. "Computer viruses." IEEE Potentials 20, no. 4 (2001): 16–19. http://dx.doi.org/10.1109/45.969588.
Full textFountain, V. A. E. "Computer viruses." IEE Review 34, no. 10 (1988): 399. http://dx.doi.org/10.1049/ir:19880159.
Full textMorgan Lloyd, Mark. "Computer viruses." IEE Review 35, no. 9 (1989): 338. http://dx.doi.org/10.1049/ir:19890149.
Full textSiegel, Michael A. "Computer Viruses." Journal of the American Dental Association 123, no. 11 (November 1992): 10–12. http://dx.doi.org/10.14219/jada.archive.1992.0303.
Full textAbelson, Martin N. "Computer viruses." American Journal of Orthodontics and Dentofacial Orthopedics 104, no. 1 (July 1993): 96–97. http://dx.doi.org/10.1016/s0889-5406(08)80123-0.
Full textCohen, Fred. "Computer viruses." Computers & Security 6, no. 1 (February 1987): 22–35. http://dx.doi.org/10.1016/0167-4048(87)90122-2.
Full textHennessy, Chris. "Computer viruses." Computer Law & Security Review 5, no. 5 (January 1990): 40. http://dx.doi.org/10.1016/0267-3649(90)90050-l.
Full textDissertations / Theses on the topic "Computer viruses"
Luke, James Steven. "Detecting previously unseen computer viruses." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274015.
Full textSzeto, Wai-chi. "Computer virus prevention and control in Hong Kong /." [Hong Kong] : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302371.
Full textPosluszny, Frank S. "Overcoming limitations in computer worm models." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-01315-115046.
Full textWeideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.
Full textComputer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in industry was measured by sending a questionnaire to 388 companies country-wide. &~ average of 2l,5% of the respondents claimed detrimental effects to information stored on disk due to computer viruses. This and other data was used to guide laboratory experiments on the actual damage done by computer viruses to stored information. A set of test disks was prepared to represent programs and data of a typical PC user in industry. Fifteen different virus programs were used individually to infect the test disks. After each infection, all the test disks were inspected to ascertain damage to data, system and program files as well as to separate disk sectors. The research established that: The damage done by computer viruses to stored information is generally limited to one file or disk area. Where damage to stored information did occur, it was often reversible. Irrational user responses to virus symptoms provide a large potential source for damage to stored information. The availability of master program disks (for program file restoration) and recent, validated data backup is essential to recovery from a computer virus infection. A user can solve most problems caused by virus infections if he has a basic understanding of disk structure, i.e. tracks, sectors, sides, the FAT, etc, and of the use of disk utility programs like Norton Utilities or PCTools. The fact that some of the findings of prominent virus researchers could not be verified, suggests that virus programs could be unstable. Claims regarding the damage inflicted by viruses must be considered to be valid only for a specific copy of the virus under discussion. The importance of using original application software (to minimize the transfer of viruses and to enable program file restoration) , regular back-ups (to enable data file restoration) and basic user awareness (infection prevention, symptoms, the use of anti-viral and utility programs, etc.) was emphasized. The average PC user should be able to clear up a virus infection without assistance by following the given disinfection procedure. Suggestions for further study include virus origins, generations, mutations, multiple infections, and the effect of viruses on computer networks.
Schultz, John S. "Offline forensic analysis of Microsoft Windows XP physical memory." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FSchultz.pdf.
Full textThesis Advisor(s): Chris Eagle. "September 2006." Includes bibliographical references (p. 73-74). Also available in print.
Li, Xin. "Computer viruses: The threat today and the expected future." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1998.
Full textThis Master’s Thesis within the area computer security concerns ”Computer viruses: The threat today and the expected future”.
Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today’s influencing factors for near future computer virus epidemics are explained, then it further predicts new possible types of computer viruses in the near future; Furthermore, currently available anti-virus technologies are analyzed concerning both advantages and disadvantages; Finally, new promising trends in computer virus defence are explored in details.
Posluszny, III Frank S. "Overcoming Limitations in Computer Worm Models." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/151.
Full textWebster, Matthew Paul. "Formal models of reproduction : from computer viruses to artificial life." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501590.
Full text林衛華 and Wai-wa Lam. "Multi-agent based human immune system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31221117.
Full textLam, Wai-wa. "Multi-agent based human immune system /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2093337X.
Full textBooks on the topic "Computer viruses"
Roberts, Ralph, and Ralph Roberts. Computer viruses: A Compute! book. Edited by Stephen Levy. Greensboro, NC: Compute! Books, 1988.
Find full textStang, David J. Computer viruses. 7th ed. [Washington, D.C.]: National Computer Security Association, 1991.
Find full textDenning, Peter J. Computer viruses. [Moffett Field, Calif.?]: Research Institute for Advanced Computer Science, 1988.
Find full textCollier, Paul. Computer viruses. London: Member Services Directorate of the Institute of Chartered Accountants in England and Wales, 1991.
Find full textM, Duffy Neil, ed. Managing computer viruses. Oxford: Oxford University Press, 1992.
Find full textHruska, Jan. Computer viruses and anti-virus warfare. New York: Ellis Horwood, 1990.
Find full textGregory, Peter H. Computer Viruses For Dummies. New York: John Wiley & Sons, Ltd., 2004.
Find full textBook chapters on the topic "Computer viruses"
Hunter, John M. D. "Computer Viruses." In Computer Communications and Networks, 115–33. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_12.
Full textSalomon, David. "Viruses." In Elements of Computer Security, 37–97. London: Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_2.
Full textBall, Rafael. "Computer Viruses, Computer Worms, and the Self-Replication of Programs." In Viruses in all Dimensions, 73–85. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-38826-3_4.
Full textMarchette, David J. "Computer Viruses and Worms." In Computer Intrusion Detection and Network Monitoring, 215–40. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4757-3458-4_6.
Full textSlade, Robert. "Computer Viruses and Worms." In Handbook of Computer Networks, 440–53. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch28.
Full textSlade, Robert. "Computer Operations and Viral Operations." In Guide to Computer Viruses, 91–130. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_4.
Full textFerbrache, David. "Theory of Viruses." In A Pathology of Computer Viruses, 31–54. London: Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_3.
Full textFerbrache, David. "Apple Macintosh Viruses." In A Pathology of Computer Viruses, 153–66. London: Springer London, 1992. http://dx.doi.org/10.1007/978-1-4471-1774-2_6.
Full textBelous, Anatoly, and Vitali Saladukha. "Computer Viruses, Malicious Logic, and Spyware." In Viruses, Hardware and Software Trojans, 101–207. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_2.
Full textSlade, Robert. "Introduction: Definitions, Jargon, and Myths." In Guide to Computer Viruses, 3–28. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_1.
Full textConference papers on the topic "Computer viruses"
BOTH, Paul-Valentin. "Computer Viruses and Methods to Avoid Viruses and Spyware." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.04.
Full textDavis, R. "Exploring computer viruses." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113403.
Full text"EVOLUTION OF COMPUTER VIRUSES." In Математическое и программное обеспечение информационных, технических и экономических систем. Издательство Томского государственного университета, 2021. http://dx.doi.org/10.17223/978-5-907442-42-9-2021-34.
Full textBhattacharya, Prasanta, and William Thies. "Computer viruses in urban Indian telecenters." In the 5th ACM workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1999927.1999940.
Full textCohen, F. "Current best practice against computer viruses." In 25th Annual 1991 IEEE International Carnahan Conference on Security Technology. IEEE, 1991. http://dx.doi.org/10.1109/ccst.1991.202223.
Full textGladychev, Nikolai. "Computer Viruses: The Abstract Theory Revisited." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0008942704060414.
Full textTavori, Jhonatan, and Hanoch Levy. "Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment." In NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2023. http://dx.doi.org/10.1109/noms56928.2023.10154217.
Full textTsarava, Katerina, Manuel Ninaus, Tereza Hannemann, Kristina Volná, Korbinian Moeller, and Cyril Brom. "Teaching primary school children about computer viruses." In WiPSCE '20: Workshop in Primary and Secondary Computing Education. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3421590.3421660.
Full textTsarava, Katerina, Manuel Ninaus, Tereza Hannemann, Kristina Volná, Korbinian Moeller, and Cyril Brom. "Fostering Knowledge of Computer Viruses among Children." In Koli Calling '20: 20th Koli Calling International Conference on Computing Education Research. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3428029.3428033.
Full textHannemann, Tereza, Tereza Stárková, Pavel Ježek, Kristina Volná, Kateřina Kačerovská, and Cyril Brom. "Eight-Year-Olds' Conceptions of Computer Viruses." In WiPSCE'19: 14th Workshop in Primary and Secondary Computing Education. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3361721.3361726.
Full textReports on the topic "Computer viruses"
Wack, John P., and Lisa J. Carnahan. Computer viruses and related threats. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-166.
Full textBrown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), March 1992. http://dx.doi.org/10.2172/5608409.
Full textBrown, D. R. An introduction to computer viruses. Office of Scientific and Technical Information (OSTI), March 1992. http://dx.doi.org/10.2172/10133178.
Full textTinto, Mario. Computer Viruses: Prevention, Detection, and Treatment. Fort Belvoir, VA: Defense Technical Information Center, March 1990. http://dx.doi.org/10.21236/ada477537.
Full textKirsch, Robert A., and II. Viruses And Other Computer Pathogens: Should DoD Care? Fort Belvoir, VA: Defense Technical Information Center, April 1997. http://dx.doi.org/10.21236/ada326780.
Full textSkormin, Victor, and Douglas Summerville. Recognition of Computer Viruses by Detecting Their Gene of Self Replication. Fort Belvoir, VA: Defense Technical Information Center, March 2006. http://dx.doi.org/10.21236/ada448622.
Full textOrvis, W. J. Computer virus information update CIAC-2301. Office of Scientific and Technical Information (OSTI), January 1994. http://dx.doi.org/10.2172/10151004.
Full textMurray, W. P. The Computer Virus: Infection, Removal, and Protection. Fort Belvoir, VA: Defense Technical Information Center, September 1993. http://dx.doi.org/10.21236/ada637045.
Full textRodriguez Muxica, Natalia. Open configuration options Bioinformatics for Researchers in Life Sciences: Tools and Learning Resources. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0003982.
Full text