Dissertations / Theses on the topic 'Computer viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Luke, James Steven. "Detecting previously unseen computer viruses." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274015.
Full textSzeto, Wai-chi. "Computer virus prevention and control in Hong Kong /." [Hong Kong] : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302371.
Full textPosluszny, Frank S. "Overcoming limitations in computer worm models." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-01315-115046.
Full textWeideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.
Full textSchultz, John S. "Offline forensic analysis of Microsoft Windows XP physical memory." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FSchultz.pdf.
Full textLi, Xin. "Computer viruses: The threat today and the expected future." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1998.
Full textPosluszny, III Frank S. "Overcoming Limitations in Computer Worm Models." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/151.
Full textWebster, Matthew Paul. "Formal models of reproduction : from computer viruses to artificial life." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501590.
Full text林衛華 and Wai-wa Lam. "Multi-agent based human immune system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31221117.
Full textLam, Wai-wa. "Multi-agent based human immune system /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2093337X.
Full textSzeto, Wai-chi, and 司徒偉慈. "Computer virus prevention and control in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1992. http://hub.hku.hk/bib/B31265479.
Full textLin, Meng-jang. "The impact of population mixing rules on epidemic communication /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textSaw, Tee Huu. "Evaluation of a multi-agent system for simulation and analysis of distributed denial-of-service attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FSaw.pdf.
Full textPande, Rishikesh A. "Using Plant Epidemiological Methods to Track Computer Network Worms." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/9943.
Full textYelimeli, Guruprasad Arun. "Computer Virus Spread Containment Using Feedback Control." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4675/.
Full textTwardus, Jesse. "The use of heuristics in identifying self-propagating malicious mobile code." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4195.
Full textDai, Jianyong. "Detecting malicious software by dynamic execution." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002798.
Full textWhite, Dominic Stjohn Dolin. "Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006510.
Full textKhayam, Syed Ali. "Wireless channel modeling and malware detection using statistical and information-theoretic tools." Diss., Connect to online resource - MSU authorized users, 2006.
Find full textVolynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.
Find full textLobo, Desmond. "Rapid identification of rootkit infections using data mining." Thesis, University of Ballarat, 2010. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44308.
Full textAl, Amro Sulaiman. "Behaviour-based virus analysis and detection." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9488.
Full textSchoeman, Adam. "Amber : a aero-interaction honeypot with distributed intelligence." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017938.
Full textIrwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Full textBoardman, Anelda Philine. "Assessment of genome visualization tools relevant to HIV genome research: development of a genome browser prototype." Thesis, University of the Western Cape, 2004. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_3632_1185446929.
Full textAtkison, Travis Levestis. "Using random projections for dimensionality reduction in identifying rogue applications." Diss., Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-133701.
Full textProcházka, Ivo. "Analýza ransomwaru GlobeImposter." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400883.
Full textSharif, Monirul Islam. "Robust and efficient malware analysis and host-based monitoring." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/37220.
Full textLibuschewski, Pascal [Verfasser], Peter [Akademischer Betreuer] Marwedel, and Heinrich [Gutachter] Müller. "Exploration of cyber-physical systems for GPGPU computer vision-based detection of biological viruses / Pascal Libuschewski ; Gutachter: Heinrich Müller ; Betreuer: Peter Marwedel." Dortmund : Universitätsbibliothek Dortmund, 2017. http://d-nb.info/1129956806/34.
Full textLibuschewski, Pascal [Verfasser], Peter Akademischer Betreuer] Marwedel, and Heinrich [Gutachter] [Müller. "Exploration of cyber-physical systems for GPGPU computer vision-based detection of biological viruses / Pascal Libuschewski ; Gutachter: Heinrich Müller ; Betreuer: Peter Marwedel." Dortmund : Universitätsbibliothek Dortmund, 2017. http://nbn-resolving.de/urn:nbn:de:101:1-20170414167.
Full textBlaauw, Pieter. "Search engine poisoning and its prevalence in modern search engines." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002037.
Full textCowie, Bradley. "An exploratory study of techniques in passive network telescope data analysis." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002038.
Full textRebiha, Rachid 1977. "Métodos formais algébricos para geração de invariantes." [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275741.
Full textAl-Salloum, Ziyad. "Topology-aware vulnerability mitigation worms." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/eec735f4-4649-4b31-285f-604bdaa4799c/10/.
Full textSrivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.
Full textMathuriya, Amrita. "Prediction of secondary structures for large RNA molecules." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28195.
Full textAbdelhafez, Mohamed. "Modeling and Simulations of Worms and Mitigation Techniques." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19840.
Full textCastro, Diogo [UNIFESP]. "Simulação computacional e análise de um modelo fenotípico de evolução viral." Universidade Federal de São Paulo (UNIFESP), 2011. http://repositorio.unifesp.br/handle/11600/10085.
Full textArding, Petter, and Hugo Hedelin. "Computer virus : design and detection." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108484.
Full textSun, Jian. "Computer-aided drug design for influenza A virus." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B44205156.
Full textSun, Jian, and 孙健. "Computer-aided drug design for influenza A virus." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B44205156.
Full textSalters, Michael Jerome. "Computer virus security in the Department of the Navy." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23842.
Full textHenchiri, Olivier. "A feature selection and evaluation scheme for computer virus detection." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27250.
Full textPaura, Markas. "Sąvokos kompiuterių virusas semantinis laukas." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20141230_153317-55602.
Full textPaura, Markas. "Le champ sémantique du concept virus informatique." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20141230_153304-85220.
Full textSemyonov, S. G., Svitlana Gavrylenko, and Viktor Chelak. "Processing information on the state of a computer system using probabilistic automata." Thesis, Institute of Electrical and Electronics Engineers, 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40752.
Full textMartins, Duarte Lima. "Purification of complex biopharmaceuticals with new processes, advanced analytics and computer-aided process design tools." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/11105.
Full textRüfenacht, Jürg. "Epidemiology of infection with bovine viral diarrhea virus in Switzerland : a study designed by computer modeling /." [S.l.] : [s.n.], 1999. http://www.stub.unibe.ch/html/haupt/datenbanken/diss/bestell.html.
Full textMuppalla, RoopTeja. "A Twitter-based Study for Understanding Public Reaction on Zika Virus." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright151994467953523.
Full textVon, Kirchbach Johann Carlo. "In silico analysis of RNA signals and evolutionary constraints in influenza A virus." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609825.
Full text