Journal articles on the topic 'Computer viruses. Cyberterrorism. Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer viruses. Cyberterrorism. Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Full textSchöneburg, E. "Neural networks hunt computer viruses." Neurocomputing 2, no. 5-6 (July 1991): 243–48. http://dx.doi.org/10.1016/0925-2312(91)90027-9.
Full textGrover, Derrick. "Computer viruses." Computer Law & Security Review 8, no. 1 (January 1992): 30–31. http://dx.doi.org/10.1016/0267-3649(92)90122-p.
Full textFitzGerald, Jerry. "Detecting Computer Viruses." EDPACS 16, no. 9 (March 1989): 1–6. http://dx.doi.org/10.1080/07366988909450532.
Full textGórka, Marek. "Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa." Cywilizacja i Polityka 15, no. 15 (October 26, 2017): 295–315. http://dx.doi.org/10.5604/01.3001.0010.5473.
Full textBalthrop, J. "COMPUTER SCIENCE: Technological Networks and the Spread of Computer Viruses." Science 304, no. 5670 (April 23, 2004): 527–29. http://dx.doi.org/10.1126/science.1095845.
Full textShah, Devavrat, and Tauhid Zaman. "Detecting sources of computer viruses in networks." ACM SIGMETRICS Performance Evaluation Review 38, no. 1 (June 12, 2010): 203–14. http://dx.doi.org/10.1145/1811099.1811063.
Full textFan, W., and K. H. Yeung. "Online social networks—Paradise of computer viruses." Physica A: Statistical Mechanics and its Applications 390, no. 2 (January 2011): 189–97. http://dx.doi.org/10.1016/j.physa.2010.09.034.
Full textPiqueira, Jose Roberto Castilh, Betyna Fernandez Navarro, and Luiz Henrique Alves Monteiro. "Epidemiological Models Applied to Viruses in Computer Networks." Journal of Computer Science 1, no. 1 (January 1, 2005): 31–34. http://dx.doi.org/10.3844/jcssp.2005.31.34.
Full textHighland, Harold Joseph. "Computer Viruses Can Be Deadly!" EDPACS 15, no. 12 (June 1988): 1–6. http://dx.doi.org/10.1080/07366988809450491.
Full textFord, R. "The wrong stuff? [computer viruses]." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 86–89. http://dx.doi.org/10.1109/msp.2004.27.
Full textWilding, Edward. "Computer viruses — a management overview." Computer Law & Security Review 8, no. 2 (March 1992): 66–69. http://dx.doi.org/10.1016/0267-3649(92)90090-v.
Full textYang, Xiaofan, and Lu-Xing Yang. "Towards the Epidemiological Modeling of Computer Viruses." Discrete Dynamics in Nature and Society 2012 (2012): 1–11. http://dx.doi.org/10.1155/2012/259671.
Full textPiqueira, José R. C., and Felipe Barbosa Cesar. "Dynamical Models for Computer Viruses Propagation." Mathematical Problems in Engineering 2008 (2008): 1–11. http://dx.doi.org/10.1155/2008/940526.
Full textZajac, Bernard P. "Computer viruses can they be prevented?" Computer Law & Security Review 5, no. 1 (May 1989): 18–21. http://dx.doi.org/10.1016/0267-3649(89)90167-2.
Full textAhmad, Ashraf, Yousef Abu Hour, and Mahmoud H. DarAssi. "Effects of computer networks' viruses under the of removable devices." International Journal of Dynamical Systems and Differential Equations 10, no. 3 (2020): 233. http://dx.doi.org/10.1504/ijdsde.2020.10030022.
Full textAhmad, Ashraf, Yousef Abu Hour, and Mahmoud H. DarAssi. "Effects of computer networks' viruses under the of removable devices." International Journal of Dynamical Systems and Differential Equations 10, no. 3 (2020): 233. http://dx.doi.org/10.1504/ijdsde.2020.107808.
Full textLesko, S. A., A. S. Alyoshkin, and V. V. Filatov. "Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses." Russian Technological Journal 7, no. 3 (June 9, 2019): 7–27. http://dx.doi.org/10.32362/2500-316x-2019-7-3-7-27.
Full textWalden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.
Full textBamaarouf, O., A. Ould Baba, S. Lamzabi, A. Rachadi, and H. Ez-Zahraouy. "Effects of maximum node degree on computer virus spreading in scale-free networks." International Journal of Modern Physics B 31, no. 26 (October 17, 2017): 1750182. http://dx.doi.org/10.1142/s021797921750182x.
Full textCastillo-Zúñiga, Iván, Francisco Javier Luna-Rosas, Laura C. Rodríguez-Martínez, Jaime Muñoz-Arteaga, Jaime Iván López-Veyna, and Mario A. Rodríguez-Díaz. "Internet Data Analysis Methodology for Cyberterrorism Vocabulary Detection, Combining Techniques of Big Data Analytics, NLP and Semantic Web." International Journal on Semantic Web and Information Systems 16, no. 1 (January 2020): 69–86. http://dx.doi.org/10.4018/ijswis.2020010104.
Full textYeh, Wei-Chang, Edward Lin, and Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus." Complexity 2021 (July 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.
Full textZhang, Chunming. "Global Behavior of a Computer Virus Propagation Model on Multilayer Networks." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/2153195.
Full textZhang, Chunming, Tianliang Feng, Yun Zhao, and Guifeng Jiang. "A New Model for Capturing the Spread of Computer Viruses on Complex-Networks." Discrete Dynamics in Nature and Society 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/956893.
Full textWhitson, Roger. "Review: Jussi Parikka, Digital Contagions: A Media Archaeology of Computer Viruses." Theory, Culture & Society 34, no. 7-8 (October 27, 2017): 293–98. http://dx.doi.org/10.1177/0263276417736593.
Full textQin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.
Full textDeng, Shiguo, Qianshun Yuan, Jing Zhang, and Huijie Yang. "Response of gene regulatory networks after infection of H3N2 virus." Journal of Bioinformatics and Computational Biology 19, no. 04 (July 21, 2021): 2150017. http://dx.doi.org/10.1142/s0219720021500177.
Full textNeagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (May 1, 2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.
Full textSandham, D. "Will viruses leap to mobiles?" Communications Engineer 4, no. 2 (April 1, 2006): 24–27. http://dx.doi.org/10.1049/ce:20060203.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textKyurkchiev, Nikolay. "A New Class of “Growth Functions” with Polynomial Variable Transfer Generated by Real Reaction Networks." Cybernetics and Information Technologies 20, no. 6 (December 1, 2020): 74–81. http://dx.doi.org/10.2478/cait-2020-0062.
Full textAl-zubidi, Azhar, Nadia F. AL-Bakri, Rajaa K. Hasoun, Soukaena Hassan Hashim, and Haider Th Salim Alrikabi. "Mobile Application to Detect Covid-19 Pandemic by Using Classification Techniques: Proposed System." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (August 23, 2021): 34. http://dx.doi.org/10.3991/ijim.v15i16.24195.
Full textAlqahtani, Abdulrahman. "Towards a framework for the potential cyber-terrorist threat to critical national infrastructure." Information & Computer Security 23, no. 5 (November 9, 2015): 532–69. http://dx.doi.org/10.1108/ics-09-2014-0060.
Full textLiu, Lan, Ryan K. L. Ko, Guangming Ren, and Xiaoping Xu. "Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks." Security and Communication Networks 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/2910310.
Full textYin, Rui, Yu Zhang, Xinrui Zhou, and Chee Keong Kwoh. "Time series computational prediction of vaccines for influenza A H3N2 with recurrent neural networks." Journal of Bioinformatics and Computational Biology 18, no. 01 (February 2020): 2040002. http://dx.doi.org/10.1142/s0219720020400028.
Full textFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Full textZajac, Bernard P. "The legal implications of viruses." Computer Law & Security Review 4, no. 4 (November 1988): 36–37. http://dx.doi.org/10.1016/0267-3649(88)90153-7.
Full textTu, Xiao, Guo-Ping Jiang, Yurong Song, and Xiaoling Wang. "Control of Multiple Viruses Interacting and Propagating in Multilayer Networks." Mathematical Problems in Engineering 2020 (July 10, 2020): 1–14. http://dx.doi.org/10.1155/2020/9014353.
Full textAchahbar, Abdelfattah, and Mohamed Essouifi. "Discrete stochastic modelling of computer viruses prevalence on a reduced scale-free network." International Journal of Computer Applications in Technology 63, no. 3 (2020): 257. http://dx.doi.org/10.1504/ijcat.2020.10031588.
Full textEssouifi, Mohamed, and Abdelfattah Achahbar. "Discrete stochastic modelling of computer viruses prevalence on a reduced scale-free network." International Journal of Computer Applications in Technology 63, no. 3 (2020): 257. http://dx.doi.org/10.1504/ijcat.2020.109353.
Full textWANG, Wei, Peng-Tao ZHANG, Ying TAN, and Xin-Gui HE. "A Feature Extraction Method of Computer Viruses Based on Artificial Immune and Code Relevance." Chinese Journal of Computers 34, no. 2 (May 19, 2011): 204–15. http://dx.doi.org/10.3724/sp.j.1016.2011.00204.
Full textPaul, N. "A Closer Look at Viruses and Worms." IEEE Security and Privacy Magazine 3, no. 4 (July 2005): 7. http://dx.doi.org/10.1109/msp.2005.86.
Full textEssouifi, Mohamed, and Abdelfattah Achahbar. "A mixed SIR-SIS model to contain a virus spreading through networks with two degrees." International Journal of Modern Physics C 28, no. 09 (September 2017): 1750114. http://dx.doi.org/10.1142/s0129183117501145.
Full textSwanson, Don R., Neil R. Smalheiser, and A. Bookstein. "Information discovery from complementary literatures: Categorizing viruses as potential weapons." Journal of the American Society for Information Science and Technology 52, no. 10 (2001): 797–812. http://dx.doi.org/10.1002/asi.1135.
Full textAL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.
Full textSHANKER, O., and TAD HOGG. "EPIDEMIOLOGY MODEL ON SHORTCUT AND SMALL WORLD NETWORKS." Modern Physics Letters B 23, no. 10 (April 20, 2009): 1249–62. http://dx.doi.org/10.1142/s0217984909019387.
Full textPalmieri, Francesco, and Ugo Fiore. "Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system." International Journal of Wireless and Mobile Computing 2, no. 1 (2007): 47. http://dx.doi.org/10.1504/ijwmc.2007.013795.
Full textGelenbe, Erol. "Dealing with software viruses: A biological paradigm." Information Security Technical Report 12, no. 4 (2007): 242–50. http://dx.doi.org/10.1016/j.istr.2007.11.002.
Full textChu, Hai-Cheng, Der-Jiunn Deng, and Han-Chieh Chao. "Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics." Multimedia Systems 17, no. 4 (November 14, 2010): 341–49. http://dx.doi.org/10.1007/s00530-010-0216-7.
Full textLiu, Guiyun, Junqiang Li, Zhongwei Liang, and Zhimin Peng. "Analysis of Time-Delay Epidemic Model in Rechargeable Wireless Sensor Networks." Mathematics 9, no. 9 (April 27, 2021): 978. http://dx.doi.org/10.3390/math9090978.
Full text