Academic literature on the topic 'Computer viruses. Cyberterrorism. Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer viruses. Cyberterrorism. Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer viruses. Cyberterrorism. Computer networks"
Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Full textSchöneburg, E. "Neural networks hunt computer viruses." Neurocomputing 2, no. 5-6 (July 1991): 243–48. http://dx.doi.org/10.1016/0925-2312(91)90027-9.
Full textGrover, Derrick. "Computer viruses." Computer Law & Security Review 8, no. 1 (January 1992): 30–31. http://dx.doi.org/10.1016/0267-3649(92)90122-p.
Full textFitzGerald, Jerry. "Detecting Computer Viruses." EDPACS 16, no. 9 (March 1989): 1–6. http://dx.doi.org/10.1080/07366988909450532.
Full textGórka, Marek. "Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa." Cywilizacja i Polityka 15, no. 15 (October 26, 2017): 295–315. http://dx.doi.org/10.5604/01.3001.0010.5473.
Full textBalthrop, J. "COMPUTER SCIENCE: Technological Networks and the Spread of Computer Viruses." Science 304, no. 5670 (April 23, 2004): 527–29. http://dx.doi.org/10.1126/science.1095845.
Full textShah, Devavrat, and Tauhid Zaman. "Detecting sources of computer viruses in networks." ACM SIGMETRICS Performance Evaluation Review 38, no. 1 (June 12, 2010): 203–14. http://dx.doi.org/10.1145/1811099.1811063.
Full textFan, W., and K. H. Yeung. "Online social networks—Paradise of computer viruses." Physica A: Statistical Mechanics and its Applications 390, no. 2 (January 2011): 189–97. http://dx.doi.org/10.1016/j.physa.2010.09.034.
Full textPiqueira, Jose Roberto Castilh, Betyna Fernandez Navarro, and Luiz Henrique Alves Monteiro. "Epidemiological Models Applied to Viruses in Computer Networks." Journal of Computer Science 1, no. 1 (January 1, 2005): 31–34. http://dx.doi.org/10.3844/jcssp.2005.31.34.
Full textHighland, Harold Joseph. "Computer Viruses Can Be Deadly!" EDPACS 15, no. 12 (June 1988): 1–6. http://dx.doi.org/10.1080/07366988809450491.
Full textDissertations / Theses on the topic "Computer viruses. Cyberterrorism. Computer networks"
Saw, Tee Huu. "Evaluation of a multi-agent system for simulation and analysis of distributed denial-of-service attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FSaw.pdf.
Full textThesis advisor(s): James B. Michael, Mikhail Auguston. Includes bibliographical references (p. 52-54). Also available online.
Sherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.
Full textArgauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.
Full textTamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.
Full textDalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Full textWiberg, Kenneth C. "Identifying Supervisory Control and Data Acquisition (SCADA) systems on a network via remote reconnaissance." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2527.
Full textVega, Juan Carlos. "Computer network operations methodology." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FVega.pdf.
Full textHart, Dennis. "An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FHart.pdf.
Full textThesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Full textCheng, Kah Wai. "Distributed deployment of Therminators in the network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCheng%5Kah.pdf.
Full textBooks on the topic "Computer viruses. Cyberterrorism. Computer networks"
Jacobson, George V. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009.
Find full textWilson, Clay. Computer attack and cyberterrorism. NY: Nova Science Publishers, 2009.
Find full textParikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Are we prepared for cyberwar? : hearing before ... 106th Congress, 2nd session, March 9, 2000. Washingotn, DC: U.S. G.P.O., 2000.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. Washington, DC: U.S. G.P.O., 2001.
Find full textWidodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.
Find full textWidodo. Sistem pemidanaan dalam cyber crime. Sleman, Yogyakarta: Laksbang Mediatama, 2009.
Find full textBook chapters on the topic "Computer viruses. Cyberterrorism. Computer networks"
Hunter, John M. D. "Computer Viruses." In Computer Communications and Networks, 115–33. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_12.
Full textSlade, Robert. "Computer Viruses and Worms." In Handbook of Computer Networks, 440–53. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch28.
Full textZhang, Chunming. "Computer Viruses Propagation Model on Dynamic Switching Networks." In Science of Cyber Security, 81–95. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03026-1_6.
Full textWalrand, Jean. "Networks: A." In Probability in Electrical Engineering and Computer Science, 71–92. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49995-2_5.
Full textZimeras, Stelios. "Mathematical Models for Computer Virus." In Advances in Healthcare Information Systems and Administration, 203–12. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8021-8.ch009.
Full textP, Saranya, TanmayThapliyal, and AvibhashBajpai. "Detection of Pneumonia from X-Ray Images Using Convolutional Neural Networks." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200192.
Full textGaruba, Abdul Rahman. "Computer Virus Phenomena in Cybercafé." In Security and Software for Cybercafes, 186–204. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch012.
Full textZimeras, Stelios. "Computer Virus Models and Analysis in M-Health IT Systems." In Advances in Healthcare Information Systems and Administration, 284–97. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9861-1.ch014.
Full textAikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology, 386–94. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.
Full textSobh, Tarek, and Heba Z. El-Fiqi. "Early Worm Detection for Minimizing Damage in E-Service Networks." In Handbook of Research on E-Services in the Public Sector, 336–58. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-789-3.ch027.
Full textConference papers on the topic "Computer viruses. Cyberterrorism. Computer networks"
Shah, Devavrat, and Tauhid Zaman. "Detecting sources of computer viruses in networks." In the ACM SIGMETRICS international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1811039.1811063.
Full textYuan-bo Chai, Wan-li Chen, Hua-qin Jiang, and Chao Liu. "Propagation of computer viruses via pseudodigital mobile communications networks." In International Conference on Cyberspace Technology (CCT 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2151.
Full textYe, Qiu-Sun. "A Practical VCR Technique of Preventing Computer Viruses' Creeping in Networks." In 2009 Second International Workshop on Knowledge Discovery and Data Mining. WKDD 2009. IEEE, 2009. http://dx.doi.org/10.1109/wkdd.2009.173.
Full textLesko, Sergey, Anton Aleshkin, and Dmitry Ermak. "Model of The Dynamics of the Spread in Computer Networks of Evolving Viruses, Subject to Obsolescence and Lag in the Action of Protection." In 2019 XXI International Conference Complex Systems: Control and Modeling Problems (CSCMP). IEEE, 2019. http://dx.doi.org/10.1109/cscmp45713.2019.8976837.
Full text