To see the other types of publications on this topic, follow the link: Computer viruses.

Journal articles on the topic 'Computer viruses'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer viruses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Melhum, Amera I., and Susan A. Mahmood. "Parasitic Computer Viruses." Journal of Zankoy Sulaimani - Part A 4, no. 1 (September 5, 2000): 45–50. http://dx.doi.org/10.17656/jzs.10064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gagescu, Raluca. "Computer viruses." Nature Reviews Molecular Cell Biology 2, no. 5 (May 2001): 324. http://dx.doi.org/10.1038/35073057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weems, Robyn P. "Computer Viruses." Library & Archival Security 14, no. 2 (August 18, 1998): 51–59. http://dx.doi.org/10.1300/j114v14n02_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Subramanya, S. R., and N. Lakshminarasimhan. "Computer viruses." IEEE Potentials 20, no. 4 (2001): 16–19. http://dx.doi.org/10.1109/45.969588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fountain, V. A. E. "Computer viruses." IEE Review 34, no. 10 (1988): 399. http://dx.doi.org/10.1049/ir:19880159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Morgan Lloyd, Mark. "Computer viruses." IEE Review 35, no. 9 (1989): 338. http://dx.doi.org/10.1049/ir:19890149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Siegel, Michael A. "Computer Viruses." Journal of the American Dental Association 123, no. 11 (November 1992): 10–12. http://dx.doi.org/10.14219/jada.archive.1992.0303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abelson, Martin N. "Computer viruses." American Journal of Orthodontics and Dentofacial Orthopedics 104, no. 1 (July 1993): 96–97. http://dx.doi.org/10.1016/s0889-5406(08)80123-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cohen, Fred. "Computer viruses." Computers & Security 6, no. 1 (February 1987): 22–35. http://dx.doi.org/10.1016/0167-4048(87)90122-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hennessy, Chris. "Computer viruses." Computer Law & Security Review 5, no. 5 (January 1990): 40. http://dx.doi.org/10.1016/0267-3649(90)90050-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Grover, Derrick. "Computer viruses." Computer Law & Security Review 8, no. 1 (January 1992): 30–31. http://dx.doi.org/10.1016/0267-3649(92)90122-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Moeller, Robert R. "Computer Viruses." Information Systems Security 1, no. 1 (January 1992): 27–30. http://dx.doi.org/10.1080/19393559208551314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Croall, J. "Computer viruses." BMJ 297, no. 6646 (August 13, 1988): 488. http://dx.doi.org/10.1136/bmj.297.6646.488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Harkin, P. J. "Computer viruses." BMJ 297, no. 6649 (September 10, 1988): 688. http://dx.doi.org/10.1136/bmj.297.6649.688-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Croall, J., and I. C. McKay. "Computer viruses." BMJ 297, no. 6654 (October 15, 1988): 981–82. http://dx.doi.org/10.1136/bmj.297.6654.981-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Nanjundiah, V. "Computer viruses." BMJ 297, no. 6659 (November 19, 1988): 1332. http://dx.doi.org/10.1136/bmj.297.6659.1332-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

B.T.D. "Computer viruses." Learned Publishing 2, no. 3 (January 1, 1989): 113–18. http://dx.doi.org/10.1002/leap/20044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

O'Connor, Vincent. "Preventing Computer Viruses." AAV Today 2, no. 4 (1988): 201. http://dx.doi.org/10.2307/30171155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kephart, Jeffrey O., Gregory B. Sorkin, David M. Chess, and Steve R. White. "Fighting Computer Viruses." Scientific American 277, no. 5 (November 1997): 88–93. http://dx.doi.org/10.1038/scientificamerican1197-88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

FitzGerald, Jerry. "Detecting Computer Viruses." EDPACS 16, no. 9 (March 1989): 1–6. http://dx.doi.org/10.1080/07366988909450532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Meyer, Helen. "Combating computer viruses." Computers & Security 18, no. 3 (January 1999): 235–36. http://dx.doi.org/10.1016/s0167-4048(99)90946-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

McClure, Ben. "Fighting computer viruses." Computers & Security 16, no. 8 (January 1997): 676–77. http://dx.doi.org/10.1016/s0167-4048(97)87589-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Highland, Esther H. "Computer viruses spread." Computers & Security 7, no. 3 (June 1988): 325. http://dx.doi.org/10.1016/0167-4048(88)90076-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

De Rivaz, John. "Computer viruses—a solution." IEE Review 35, no. 6 (1989): 219. http://dx.doi.org/10.1049/ir:19890096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zajac, Bernard P. "Computer viruses — Legal options." Network Security 1995, no. 2 (February 1995): 9–10. http://dx.doi.org/10.1016/s1353-4858(00)80042-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Cipra, B. "Eternal Plague: Computer Viruses." Science 249, no. 4975 (September 21, 1990): 1381. http://dx.doi.org/10.1126/science.249.4975.1381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Guinier, D. "Biological versus computer viruses." ACM SIGSAC Review 7, no. 2 (July 1989): 1–15. http://dx.doi.org/10.1145/70948.70949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Johnson, Bankole A., and Lynda T. Wells. "2. Viruses – prevention, detection, and removal." Psychiatric Bulletin 16, no. 12 (December 1992): 771–73. http://dx.doi.org/10.1192/pb.16.12.771.

Full text
Abstract:
Most medical researchers rely on computers to store their data, often many years of work. It is, however, surprising that many give little thought to protecting their machine from malicious damage caused by computer viruses. This article examines how to prevent, detect, and remove computer viruses.
APA, Harvard, Vancouver, ISO, and other styles
29

Highland, Harold Joseph. "A history of computer viruses: Three special viruses." Computers & Security 16, no. 5 (January 1997): 430–38. http://dx.doi.org/10.1016/s0167-4048(97)82247-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Yang, Xiaofan, Bei Liu, and Chenquan Gan. "Global Stability of an Epidemic Model of Computer Virus." Abstract and Applied Analysis 2014 (2014): 1–5. http://dx.doi.org/10.1155/2014/456320.

Full text
Abstract:
With the rapid popularization of the Internet, computers can enter or leave the Internet increasingly frequently. In fact, no antivirus software can detect and remove all sorts of computer viruses. This implies that viruses would persist on the Internet. To better understand the spread of computer viruses in these situations, a new propagation model is established and analyzed. The unique equilibrium of the model is globally asymptotically stable, in accordance with the reality. A parameter analysis of the equilibrium is also conducted.
APA, Harvard, Vancouver, ISO, and other styles
31

Manalu, Susi Yanti, and Jamaluddin Jamaluddin. "ANALISIS KEAMANAN ANTI VIRUS BERBASIS WEB." Majalah Ilmiah METHODA 12, no. 2 (August 31, 2022): 143–46. http://dx.doi.org/10.46880/methoda.vol12no2.pp143-146.

Full text
Abstract:
Along with the rapid development of the use of computers as one of the human tools in various fields of work in life, viruses are certainly one of the threats and obstacles and slow down the work process of the computer system. Anti-virus is a computer program that is a type of software used to prevent, detect, secure, and remove computer viruses from computer systems. Anti-virus is often referred to as virus protection software as well as virus protection software. infected with the virus or not. Viruses usually attack computers that are not protected by anti-virus, but not all antiviruses can clean viruses. Symptoms that occur when the computer has been exposed to a virus are the computer becomes slow when used, computer data cannot be opened or is often lost, the computer restarts by itself and many shortcut programs on the computer. if we are confused about choosing an antivirus then look for an antivirus that is already widely used and has a big name, because they will do patching and updating the database more often than the antivirus itself.
APA, Harvard, Vancouver, ISO, and other styles
32

Yeh, Wei-Chang, Edward Lin, and Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus." Complexity 2021 (July 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.

Full text
Abstract:
With the rapid development of network technology, computer viruses have developed at a fast pace. The threat of computer viruses persists because of the constant demand for computers and networks. When a computer virus infects a facility, the virus seeks to invade other facilities in the network by exploiting the convenience of the network protocol and the high connectivity of the network. Hence, there is an increasing need for accurate calculation of the probability of computer-virus-infected areas for developing corresponding strategies, for example, based on the possible virus-infected areas, to interrupt the relevant connections between the uninfected and infected computers in time. The spread of the computer virus forms a scale-free network whose node degree follows the power rule. A novel algorithm based on the binary-addition tree algorithm (BAT) is proposed to effectively predict the spread of computer viruses. The proposed BAT utilizes the probability derived from PageRank from the scale-free network together with the consideration of state vectors with both the temporal and learning effects. The performance of the proposed algorithm was verified via numerous experiments.
APA, Harvard, Vancouver, ISO, and other styles
33

Farman, Muhammad, Ali Akgül, Hussein Shanak, Jihad Asad, and Aqeel Ahmad. "Computer Virus Fractional Order Model with Effects of Internal and External Storage Media." European Journal of Pure and Applied Mathematics 15, no. 3 (July 31, 2022): 897–915. http://dx.doi.org/10.29020/nybg.ejpam.v15i3.4378.

Full text
Abstract:
In this work, we focus on the implementation of epidemic techniques on computer virus and study the dynamic transmission of several viruses to minimize the destruction of computers. We aim to make and analyze computer viruses through the Atangana-Baleanu sense and the Atangana-Taufik scheme, which is used for the fractional derivative model for the computer virusepidemic. It contained infected external computer effects and removable storage media on the computer viruses. For the validation of the model, we also discussed its positivity and boundedness. Fixed point theory and the iterative methods helped a lot to find out the existence and uniqueness of the model. In the case of numerical simulation, we used Atanagana-Taufik technique to illustratethe effects of varying the fractional order. The graphical results support our theoretical results from which, we analyze the infected external computer effects and removable storage media on the computer viruses.
APA, Harvard, Vancouver, ISO, and other styles
34

Spafford, Eugene H. "Computer Viruses as Artificial Life." Artificial Life 1, no. 3 (April 1994): 249–65. http://dx.doi.org/10.1162/artl.1994.1.3.249.

Full text
Abstract:
There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life—a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of “vandalware” as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially “alive” systems and experimentation.
APA, Harvard, Vancouver, ISO, and other styles
35

Highland, Harold Joseph. "Computer Viruses Can Be Deadly!" EDPACS 15, no. 12 (June 1988): 1–6. http://dx.doi.org/10.1080/07366988809450491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dawes, Peter D., and Peter D. Dawes. "The evolution of computer viruses." Medical Journal of Australia 157, no. 3 (August 1992): 196–97. http://dx.doi.org/10.5694/j.1326-5377.1992.tb137088.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Dawes, Peter D. "The evolution of computer viruses." Medical Journal of Australia 157, no. 4 (August 1992): 273–74. http://dx.doi.org/10.5694/j.1326-5377.1992.tb137138.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Coulthard, A., and T. A. Vuori. "Computer viruses: a quantitative analysis." Logistics Information Management 15, no. 5/6 (December 2002): 400–409. http://dx.doi.org/10.1108/09576050210447091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Schöneburg, E. "Neural networks hunt computer viruses." Neurocomputing 2, no. 5-6 (July 1991): 243–48. http://dx.doi.org/10.1016/0925-2312(91)90027-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Meyer, Helen. "Computer doctor busy fighting ‘viruses’." Computers & Security 16, no. 6 (January 1997): 511. http://dx.doi.org/10.1016/s0167-4048(97)84657-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Meyer, Helen. "Computer viruses: myth vs reality." Computers & Security 15, no. 7 (January 1996): 585. http://dx.doi.org/10.1016/s0167-4048(97)88114-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ford, R. "The wrong stuff? [computer viruses]." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 86–89. http://dx.doi.org/10.1109/msp.2004.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Highland, HaroldJoseph. "Computer viruses and sudden death!" Computers & Security 6, no. 1 (February 1987): 8–10. http://dx.doi.org/10.1016/0167-4048(87)90113-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wiseman, Simon. "Preventing viruses in computer systems." Computers & Security 8, no. 5 (August 1989): 427–32. http://dx.doi.org/10.1016/0167-4048(89)90024-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Zajac, Bernard P. "Legal options to computer viruses." Computers & Security 8, no. 1 (February 1989): 25–27. http://dx.doi.org/10.1016/0167-4048(89)90034-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Cohen, Fred. "Computational aspects of computer viruses." Computers & Security 8, no. 4 (June 1989): 297–98. http://dx.doi.org/10.1016/0167-4048(89)90089-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kensey, Michael F. "Computer viruses — Towards better solutions." Computers & Security 12, no. 6 (October 1993): 536–41. http://dx.doi.org/10.1016/0167-4048(93)90048-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Mishra, Bimal Kumar, and Dinesh Saini. "Mathematical models on computer viruses." Applied Mathematics and Computation 187, no. 2 (April 2007): 929–36. http://dx.doi.org/10.1016/j.amc.2006.09.062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Piqueira, Jose R. C., Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, and Vanessa O. Araujo. "Dynamic models for computer viruses." Computers & Security 27, no. 7-8 (December 2008): 355–59. http://dx.doi.org/10.1016/j.cose.2008.07.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Wilding, Edward. "Computer viruses — a management overview." Computer Law & Security Review 8, no. 2 (March 1992): 66–69. http://dx.doi.org/10.1016/0267-3649(92)90090-v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography