Academic literature on the topic 'Computer viruses. Cyberterrorism. Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer viruses. Cyberterrorism. Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer viruses. Cyberterrorism. Computer networks"

1

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Full text
Abstract:
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of particular danger. The Russian military in Syria is constantly confronted with terrorist attacks: the Khmeimim aerospace forces base is regularly attacked with unmanned air vehicles - drones. Terrorist acts with the use of computer and network technologies are no less dangerous. The destructive potential of cyberterrorism is determined by the widespread computerization of state and public life, the implementation of projects to create smart cities, including smart transportation, as well as the intensive development of the Internet of things. The purpose of the article is to analyze new criminal threats to state and public security, as well as to study high-tech ways of committing crimes such as sabotage, terrorist acts, and other crimes of a terrorist nature. The cost of their consequences for society is very high, and criminals do not always need to attack social objects directly - it is enough to spread panic among the population using online media, social networks and websites of authorities of various levels, after obtaining illegal access to them. The article describes some of the techniques already used to commit crimes of sabotage and terrorism. The authors draw attention to the priority of cybersecurity both for engineers of devices with elements of artificial intelligence, and for lawmakers who should pay attention to methods of technical forecasting when developing legal norms aimed at prevention of new ways of committing such crimes. When writing the article, the authors used a wide range of Russian and foreign sources of legal, statistical, sociological and other information. The authors used such research methods as analysis, synthesis, deduction, induction, formal legal method as well as comparative legal method.
APA, Harvard, Vancouver, ISO, and other styles
2

Schöneburg, E. "Neural networks hunt computer viruses." Neurocomputing 2, no. 5-6 (July 1991): 243–48. http://dx.doi.org/10.1016/0925-2312(91)90027-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grover, Derrick. "Computer viruses." Computer Law & Security Review 8, no. 1 (January 1992): 30–31. http://dx.doi.org/10.1016/0267-3649(92)90122-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

FitzGerald, Jerry. "Detecting Computer Viruses." EDPACS 16, no. 9 (March 1989): 1–6. http://dx.doi.org/10.1080/07366988909450532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Górka, Marek. "Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa." Cywilizacja i Polityka 15, no. 15 (October 26, 2017): 295–315. http://dx.doi.org/10.5604/01.3001.0010.5473.

Full text
Abstract:
Cyberterrorism creates serious and rapidly growing threats to society and the critical infrastructure of the state. This creates significant changes in the prevention and fight against terrorism. The digital world in which society is lived provides a wide range of opportunities for cybercrime as it initiates and encourages the use of hidden Internet capabilities. Cyberterrorism is a crime that is directed against the state and its citizens. Currently, computer networks are at risk and are attacked daily due to inter alia. The inability to maintain dynamic development of web services and widely available hacking tools and techniques. This is the most difficult challenge in the fight against cyberterrorism. However, the term itself is often misused and abused. Understanding the dangers of cyberterrorism must begin with a clear definition of its definition.
APA, Harvard, Vancouver, ISO, and other styles
6

Balthrop, J. "COMPUTER SCIENCE: Technological Networks and the Spread of Computer Viruses." Science 304, no. 5670 (April 23, 2004): 527–29. http://dx.doi.org/10.1126/science.1095845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shah, Devavrat, and Tauhid Zaman. "Detecting sources of computer viruses in networks." ACM SIGMETRICS Performance Evaluation Review 38, no. 1 (June 12, 2010): 203–14. http://dx.doi.org/10.1145/1811099.1811063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fan, W., and K. H. Yeung. "Online social networks—Paradise of computer viruses." Physica A: Statistical Mechanics and its Applications 390, no. 2 (January 2011): 189–97. http://dx.doi.org/10.1016/j.physa.2010.09.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Piqueira, Jose Roberto Castilh, Betyna Fernandez Navarro, and Luiz Henrique Alves Monteiro. "Epidemiological Models Applied to Viruses in Computer Networks." Journal of Computer Science 1, no. 1 (January 1, 2005): 31–34. http://dx.doi.org/10.3844/jcssp.2005.31.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Highland, Harold Joseph. "Computer Viruses Can Be Deadly!" EDPACS 15, no. 12 (June 1988): 1–6. http://dx.doi.org/10.1080/07366988809450491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer viruses. Cyberterrorism. Computer networks"

1

Saw, Tee Huu. "Evaluation of a multi-agent system for simulation and analysis of distributed denial-of-service attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FSaw.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2003.
Thesis advisor(s): James B. Michael, Mikhail Auguston. Includes bibliographical references (p. 52-54). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Sherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Argauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wiberg, Kenneth C. "Identifying Supervisory Control and Data Acquisition (SCADA) systems on a network via remote reconnaissance." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2527.

Full text
Abstract:
Presidential Decision Directive (PDD) 63 calls for improving the security of Supervisory Control and Data Acquisition (SCADA) and other control systems which operate the critical infrastructure of the United States. In the past, these industrial computer systems relied on security through obscurity. Recent economic and technical shifts within the controls industry have increased their vulnerability to cyber attack. Concurrently, their value as a target has been recognized by terrorist organizations and competing nation states. Network reconnaissance is a basic tool that allows computer security managers to understand their complex systems. However, existing reconnaissance tools incorporate little or no understanding of control systems. This thesis provides a conceptual analysis for the creation of a SCADA network exploration/reconnaissance tool. Several reconnaissance techniques were researched and reviewed in a laboratory environment to determine their utility for SCADA system discovery. Additionally, an application framework using common non-SCADA security tools was created to provide a proof of concept. Development of a viable tool for identifying SCADA systems remotely will help improve critical infrastructure security by improving situational awareness for network managers.
APA, Harvard, Vancouver, ISO, and other styles
7

Vega, Juan Carlos. "Computer network operations methodology." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FVega.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hart, Dennis. "An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FHart.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Kah Wai. "Distributed deployment of Therminators in the network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCheng%5Kah.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer viruses. Cyberterrorism. Computer networks"

1

Jacobson, George V. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Day-MacLeod, Deirdre. Viruses and spam. New York: Rosen Central, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bowden, Mark. Worm: The first digital world war. New York: Grove Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Are we prepared for cyberwar? : hearing before ... 106th Congress, 2nd session, March 9, 2000. Washingotn, DC: U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. Washington, DC: U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Widodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Widodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kong jian xin xi dui kang. Beijing Shi: Guo fang gong ye chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer viruses. Cyberterrorism. Computer networks"

1

Hunter, John M. D. "Computer Viruses." In Computer Communications and Networks, 115–33. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Slade, Robert. "Computer Viruses and Worms." In Handbook of Computer Networks, 440–53. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Chunming. "Computer Viruses Propagation Model on Dynamic Switching Networks." In Science of Cyber Security, 81–95. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03026-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Walrand, Jean. "Networks: A." In Probability in Electrical Engineering and Computer Science, 71–92. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49995-2_5.

Full text
Abstract:
AbstractSocial networks connect people and enable them to exchange information. News and rumors spread through these networks. We explore models of such propagations. The technology behind social networks is the internet where packets travel from queue to queue. We explain some key results about queueing networks.Section 5.1 explores a model of how rumors spread in a social network. Epidemiologists use similar models to study the spread of viruses. Section 5.2 explains the cascade of choices in a social network where one person’s choice is influenced by those of people she knows. Section 5.3 shows how seeding the market with advertising or free products affects adoptions. Section 5.4 studies a model of how media can influence the eventual consensus in a social network. Section 5.5 explores the randomness of the consensus in a group. Sections 5.6 and 5.7 present a different class of network models where customers queue for service. Section 5.6 studies a single queue and Sect. 5.7 analyzes a network of queues. Section 5.8 explains a classical optimization problem in a communication network: how to choose the capacities of different links. Section 5.9 discusses the suitability of queueing networks as models of the internet. Section 5.10 presents a classical result about a class of queueing networks known as product-form networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Zimeras, Stelios. "Mathematical Models for Computer Virus." In Advances in Healthcare Information Systems and Administration, 203–12. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8021-8.ch009.

Full text
Abstract:
Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the internet by various means such as file downloading, email, exploiting security holes in software, etc. In general, epidemic models assume that individuals go through a series of states at a certain constant set of rates. Different epidemic models have been proposed based on the characteristics of the systems and the topology of the network. In this chapter, an analysis of various epidemic models will be analyzed under differential mathematical systems.
APA, Harvard, Vancouver, ISO, and other styles
6

P, Saranya, TanmayThapliyal, and AvibhashBajpai. "Detection of Pneumonia from X-Ray Images Using Convolutional Neural Networks." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200192.

Full text
Abstract:
Pneumonia is an infection which is caused by bacteria or viruses. Early diagnosis is critical to treat the disease successfully without delaying the treatment much. In most of the cases and as per the usual process the patient with pneumonia-like symptoms can be dragonized via frontal and lateral chest x-ray images, which are then seen over by the naked eye by doctors or radiologists. The diagnoses can be misleading and confusing as the appearance of the disease can be unclear in X-ray images and can put the doctor in a dilemma, as the features may not be visible clearly via naked eyes. That is why computer-aided diagnosis is generally required to guide clinicians. The model is based upon the convolutional neural network architecture, wherein pre-processed images are fed to the developed network layers and trained to provide us results with high accuracy of 94.3%, a precision rate of 93.18%, recall of 98.20% and an F1 score of 95.63%. The objective of the work is to design a model that can provide fast and accurate analysis which not only may save diagnosis cost, but also provide invaluable time for the doctors to begin the treatment if the disease is detected early.
APA, Harvard, Vancouver, ISO, and other styles
7

Garuba, Abdul Rahman. "Computer Virus Phenomena in Cybercafé." In Security and Software for Cybercafes, 186–204. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch012.

Full text
Abstract:
The chapter examines the concepts, history, sources, spread, detection, and removal of computer viruses. The increase in the number of computers and accessibility to Internet has made it easy for hackers to invade systems all over the world. Computer viruses have reached epidemic numbers in many computer environments resulting in computer security vulnerabilities. Cybercafés systems/networks are potential objects of virus attacks due to the fact that they are connected to the Net. Cybercafé managers should have a good understanding of the risk and controls associated with various security technologies. It is the hope of the author that adequate awareness and understanding of the destructive devices by cybercafé managers and computer users generally will help secure their systems. It is recommended that cybercafé administrators develop a security policy for both employees and users.
APA, Harvard, Vancouver, ISO, and other styles
8

Zimeras, Stelios. "Computer Virus Models and Analysis in M-Health IT Systems." In Advances in Healthcare Information Systems and Administration, 284–97. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9861-1.ch014.

Full text
Abstract:
Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the Internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the Internet by various means such as file downloading, email, exploiting security holes in software, etc. Epidemiological models have traditionally been used to understand and predict the outcome of virus outbreaks in human or animal populations. However, the same models were recently applied to the analysis of computer virus epidemics. In this work we present various computer virus spread models combined with applications to e-health systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Aikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology, 386–94. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.

Full text
Abstract:
The modern network and Internet security vulnerabilities expose state and local government networks to numerous threats such as denial of service (DoS) attacks, computer viruses, unauthorized access, confidentiality breaches, and so forth. For example, in June 2005, the state of Delaware saw a spike of 141,000 instances of “suspicious activity” due to a variant of the mytopb worm, which could have brought the state’s network to its knees had appropriate steps not been taken (Jarrett, 2005; National Association of State Chief Information Officers [NASCIO], 2006b). On an average day, the state of Michigan blocks 22,059 spam e-mails, 21,702 e-mail viruses, 4,239 Web defacements, and six remote computer takeover attempts. Delaware fends off nearly 3,000 attempts at entering the state’s network daily (NASCIO, 2006b). Governments have the obligation to manage their information security risks by securing mission- critical internal resources such as financial records and taxpayer sensitive information on their networks. Consequently, public-sector information security officers are faced with the challenge to contain damage from compromised systems, prevent internally and Internet-launched attacks, provide systems for logging and intrusion detection, and build frameworks for administrators to securely manage government networks (Oxlenhandler, 2003). This chapter discusses some of the cost-effective measures needed to address government agency information security vulnerabilities and related threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Sobh, Tarek, and Heba Z. El-Fiqi. "Early Worm Detection for Minimizing Damage in E-Service Networks." In Handbook of Research on E-Services in the Public Sector, 336–58. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-789-3.ch027.

Full text
Abstract:
One of the most powerful weapons for attackers is the Internet worm. Specifically, a worm attacks vulnerable computer systems and employs self-propagating methods to flood the Internet rapidly. Since a “Worm” is self-propagated through the connected network, it doesn’t need human interaction or file transmission to replicate itself. It spreads in minutes; Slammer worms infect about 75,000 nodes through the internet in about 10 minutes. Since most of antivirus programs detect viruses based on their signature, then this approach can’t detect new viruses or worms till being updated with their signature, which can’t be known unless some systems had already been infected. This highlights worms are still on the top of malware threats attacking computer systems, although the evolution of worms detection techniques. Early detection of unknown worms is still a problem. This chapter produce a method for detecting unknown worms based on local victim information. The proposed system uses Artificial Neural Network (ANN) for classifying worm/ nonworm traffic and predicting the percentage of infection in the infected network. This prediction can be used to support decision making processes for network administrators to respond quickly to worm propagation in an accurate procedure.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer viruses. Cyberterrorism. Computer networks"

1

Shah, Devavrat, and Tauhid Zaman. "Detecting sources of computer viruses in networks." In the ACM SIGMETRICS international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1811039.1811063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan-bo Chai, Wan-li Chen, Hua-qin Jiang, and Chao Liu. "Propagation of computer viruses via pseudodigital mobile communications networks." In International Conference on Cyberspace Technology (CCT 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Qiu-Sun. "A Practical VCR Technique of Preventing Computer Viruses' Creeping in Networks." In 2009 Second International Workshop on Knowledge Discovery and Data Mining. WKDD 2009. IEEE, 2009. http://dx.doi.org/10.1109/wkdd.2009.173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lesko, Sergey, Anton Aleshkin, and Dmitry Ermak. "Model of The Dynamics of the Spread in Computer Networks of Evolving Viruses, Subject to Obsolescence and Lag in the Action of Protection." In 2019 XXI International Conference Complex Systems: Control and Modeling Problems (CSCMP). IEEE, 2019. http://dx.doi.org/10.1109/cscmp45713.2019.8976837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography