Journal articles on the topic 'Computer viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Melhum, Amera I., and Susan A. Mahmood. "Parasitic Computer Viruses." Journal of Zankoy Sulaimani - Part A 4, no. 1 (September 5, 2000): 45–50. http://dx.doi.org/10.17656/jzs.10064.
Full textGagescu, Raluca. "Computer viruses." Nature Reviews Molecular Cell Biology 2, no. 5 (May 2001): 324. http://dx.doi.org/10.1038/35073057.
Full textWeems, Robyn P. "Computer Viruses." Library & Archival Security 14, no. 2 (August 18, 1998): 51–59. http://dx.doi.org/10.1300/j114v14n02_07.
Full textSubramanya, S. R., and N. Lakshminarasimhan. "Computer viruses." IEEE Potentials 20, no. 4 (2001): 16–19. http://dx.doi.org/10.1109/45.969588.
Full textFountain, V. A. E. "Computer viruses." IEE Review 34, no. 10 (1988): 399. http://dx.doi.org/10.1049/ir:19880159.
Full textMorgan Lloyd, Mark. "Computer viruses." IEE Review 35, no. 9 (1989): 338. http://dx.doi.org/10.1049/ir:19890149.
Full textSiegel, Michael A. "Computer Viruses." Journal of the American Dental Association 123, no. 11 (November 1992): 10–12. http://dx.doi.org/10.14219/jada.archive.1992.0303.
Full textAbelson, Martin N. "Computer viruses." American Journal of Orthodontics and Dentofacial Orthopedics 104, no. 1 (July 1993): 96–97. http://dx.doi.org/10.1016/s0889-5406(08)80123-0.
Full textCohen, Fred. "Computer viruses." Computers & Security 6, no. 1 (February 1987): 22–35. http://dx.doi.org/10.1016/0167-4048(87)90122-2.
Full textHennessy, Chris. "Computer viruses." Computer Law & Security Review 5, no. 5 (January 1990): 40. http://dx.doi.org/10.1016/0267-3649(90)90050-l.
Full textGrover, Derrick. "Computer viruses." Computer Law & Security Review 8, no. 1 (January 1992): 30–31. http://dx.doi.org/10.1016/0267-3649(92)90122-p.
Full textMoeller, Robert R. "Computer Viruses." Information Systems Security 1, no. 1 (January 1992): 27–30. http://dx.doi.org/10.1080/19393559208551314.
Full textCroall, J. "Computer viruses." BMJ 297, no. 6646 (August 13, 1988): 488. http://dx.doi.org/10.1136/bmj.297.6646.488.
Full textHarkin, P. J. "Computer viruses." BMJ 297, no. 6649 (September 10, 1988): 688. http://dx.doi.org/10.1136/bmj.297.6649.688-d.
Full textCroall, J., and I. C. McKay. "Computer viruses." BMJ 297, no. 6654 (October 15, 1988): 981–82. http://dx.doi.org/10.1136/bmj.297.6654.981-d.
Full textNanjundiah, V. "Computer viruses." BMJ 297, no. 6659 (November 19, 1988): 1332. http://dx.doi.org/10.1136/bmj.297.6659.1332-a.
Full textB.T.D. "Computer viruses." Learned Publishing 2, no. 3 (January 1, 1989): 113–18. http://dx.doi.org/10.1002/leap/20044.
Full textO'Connor, Vincent. "Preventing Computer Viruses." AAV Today 2, no. 4 (1988): 201. http://dx.doi.org/10.2307/30171155.
Full textKephart, Jeffrey O., Gregory B. Sorkin, David M. Chess, and Steve R. White. "Fighting Computer Viruses." Scientific American 277, no. 5 (November 1997): 88–93. http://dx.doi.org/10.1038/scientificamerican1197-88.
Full textFitzGerald, Jerry. "Detecting Computer Viruses." EDPACS 16, no. 9 (March 1989): 1–6. http://dx.doi.org/10.1080/07366988909450532.
Full textMeyer, Helen. "Combating computer viruses." Computers & Security 18, no. 3 (January 1999): 235–36. http://dx.doi.org/10.1016/s0167-4048(99)90946-x.
Full textMcClure, Ben. "Fighting computer viruses." Computers & Security 16, no. 8 (January 1997): 676–77. http://dx.doi.org/10.1016/s0167-4048(97)87589-x.
Full textHighland, Esther H. "Computer viruses spread." Computers & Security 7, no. 3 (June 1988): 325. http://dx.doi.org/10.1016/0167-4048(88)90076-4.
Full textDe Rivaz, John. "Computer viruses—a solution." IEE Review 35, no. 6 (1989): 219. http://dx.doi.org/10.1049/ir:19890096.
Full textZajac, Bernard P. "Computer viruses — Legal options." Network Security 1995, no. 2 (February 1995): 9–10. http://dx.doi.org/10.1016/s1353-4858(00)80042-2.
Full textCipra, B. "Eternal Plague: Computer Viruses." Science 249, no. 4975 (September 21, 1990): 1381. http://dx.doi.org/10.1126/science.249.4975.1381.
Full textGuinier, D. "Biological versus computer viruses." ACM SIGSAC Review 7, no. 2 (July 1989): 1–15. http://dx.doi.org/10.1145/70948.70949.
Full textJohnson, Bankole A., and Lynda T. Wells. "2. Viruses – prevention, detection, and removal." Psychiatric Bulletin 16, no. 12 (December 1992): 771–73. http://dx.doi.org/10.1192/pb.16.12.771.
Full textHighland, Harold Joseph. "A history of computer viruses: Three special viruses." Computers & Security 16, no. 5 (January 1997): 430–38. http://dx.doi.org/10.1016/s0167-4048(97)82247-x.
Full textYang, Xiaofan, Bei Liu, and Chenquan Gan. "Global Stability of an Epidemic Model of Computer Virus." Abstract and Applied Analysis 2014 (2014): 1–5. http://dx.doi.org/10.1155/2014/456320.
Full textManalu, Susi Yanti, and Jamaluddin Jamaluddin. "ANALISIS KEAMANAN ANTI VIRUS BERBASIS WEB." Majalah Ilmiah METHODA 12, no. 2 (August 31, 2022): 143–46. http://dx.doi.org/10.46880/methoda.vol12no2.pp143-146.
Full textYeh, Wei-Chang, Edward Lin, and Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus." Complexity 2021 (July 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.
Full textFarman, Muhammad, Ali Akgül, Hussein Shanak, Jihad Asad, and Aqeel Ahmad. "Computer Virus Fractional Order Model with Effects of Internal and External Storage Media." European Journal of Pure and Applied Mathematics 15, no. 3 (July 31, 2022): 897–915. http://dx.doi.org/10.29020/nybg.ejpam.v15i3.4378.
Full textSpafford, Eugene H. "Computer Viruses as Artificial Life." Artificial Life 1, no. 3 (April 1994): 249–65. http://dx.doi.org/10.1162/artl.1994.1.3.249.
Full textHighland, Harold Joseph. "Computer Viruses Can Be Deadly!" EDPACS 15, no. 12 (June 1988): 1–6. http://dx.doi.org/10.1080/07366988809450491.
Full textDawes, Peter D., and Peter D. Dawes. "The evolution of computer viruses." Medical Journal of Australia 157, no. 3 (August 1992): 196–97. http://dx.doi.org/10.5694/j.1326-5377.1992.tb137088.x.
Full textDawes, Peter D. "The evolution of computer viruses." Medical Journal of Australia 157, no. 4 (August 1992): 273–74. http://dx.doi.org/10.5694/j.1326-5377.1992.tb137138.x.
Full textCoulthard, A., and T. A. Vuori. "Computer viruses: a quantitative analysis." Logistics Information Management 15, no. 5/6 (December 2002): 400–409. http://dx.doi.org/10.1108/09576050210447091.
Full textSchöneburg, E. "Neural networks hunt computer viruses." Neurocomputing 2, no. 5-6 (July 1991): 243–48. http://dx.doi.org/10.1016/0925-2312(91)90027-9.
Full textMeyer, Helen. "Computer doctor busy fighting ‘viruses’." Computers & Security 16, no. 6 (January 1997): 511. http://dx.doi.org/10.1016/s0167-4048(97)84657-3.
Full textMeyer, Helen. "Computer viruses: myth vs reality." Computers & Security 15, no. 7 (January 1996): 585. http://dx.doi.org/10.1016/s0167-4048(97)88114-x.
Full textFord, R. "The wrong stuff? [computer viruses]." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 86–89. http://dx.doi.org/10.1109/msp.2004.27.
Full textHighland, HaroldJoseph. "Computer viruses and sudden death!" Computers & Security 6, no. 1 (February 1987): 8–10. http://dx.doi.org/10.1016/0167-4048(87)90113-1.
Full textWiseman, Simon. "Preventing viruses in computer systems." Computers & Security 8, no. 5 (August 1989): 427–32. http://dx.doi.org/10.1016/0167-4048(89)90024-2.
Full textZajac, Bernard P. "Legal options to computer viruses." Computers & Security 8, no. 1 (February 1989): 25–27. http://dx.doi.org/10.1016/0167-4048(89)90034-5.
Full textCohen, Fred. "Computational aspects of computer viruses." Computers & Security 8, no. 4 (June 1989): 297–98. http://dx.doi.org/10.1016/0167-4048(89)90089-8.
Full textKensey, Michael F. "Computer viruses — Towards better solutions." Computers & Security 12, no. 6 (October 1993): 536–41. http://dx.doi.org/10.1016/0167-4048(93)90048-a.
Full textMishra, Bimal Kumar, and Dinesh Saini. "Mathematical models on computer viruses." Applied Mathematics and Computation 187, no. 2 (April 2007): 929–36. http://dx.doi.org/10.1016/j.amc.2006.09.062.
Full textPiqueira, Jose R. C., Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, and Vanessa O. Araujo. "Dynamic models for computer viruses." Computers & Security 27, no. 7-8 (December 2008): 355–59. http://dx.doi.org/10.1016/j.cose.2008.07.006.
Full textWilding, Edward. "Computer viruses — a management overview." Computer Law & Security Review 8, no. 2 (March 1992): 66–69. http://dx.doi.org/10.1016/0267-3649(92)90090-v.
Full text