Academic literature on the topic 'COMPUTERS / Security / Viruses'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COMPUTERS / Security / Viruses.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "COMPUTERS / Security / Viruses"

1

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
APA, Harvard, Vancouver, ISO, and other styles
2

AL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.

Full text
Abstract:
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence. mest Viruses were designed to attack microcomputers, sincce microcomputers are widely used nowadays, and have simple operating systems which result in lack of quality of their security systern. Connecting computers with networks and using copies of programs from unreliable sources such as bullet in board systems will increase the :of viral contact and the spread of viruses. Data Encryption disguises data flowing through a network so that it is unintelligible to any one monitor the data, Encryption techniques can also be used to detect file modification which may caused either by unithorized users or by viruses. This paper concern in viruses atracking users on system files (.exe and com) in microcomputer sytems, where viruses Types, how they work, and anti-virus streiagies are going o scussed. Finally, a dccction stralegy depending on Encryption techniques built the operating sysiems Suggested to improve PCs Security and preventing unauthorized users from inserting into programas commands that will cause system corruption.
APA, Harvard, Vancouver, ISO, and other styles
3

Asaad, Renas Rajab. "Implementation of a Virus with Treatment and Protection Methods." ICONTECH INTERNATIONAL JOURNAL 4, no. 2 (September 16, 2020): 28–34. http://dx.doi.org/10.46291/icontechvol4iss2pp28-34.

Full text
Abstract:
Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or destroying. A strong virus must have automatic multiplication, automatic transmission between devices, copying itself in important locations on the computer and performing unauthorized actions and instructions in the computer. So in this research paper it will also shows how to get rid of such viruses and ways to prevent them or providing a good security for the users.
APA, Harvard, Vancouver, ISO, and other styles
4

DARAJAT, PANGESTUTI PRIMA, and TYAS HUSADANINGSIH. "KONTROL OPTIMAL PADA MODEL PENYEBARAN VIRUS KOMPUTER DENGAN KLASIFIKASI PENGAMANAN." E-Jurnal Matematika 8, no. 4 (November 29, 2019): 253. http://dx.doi.org/10.24843/mtk.2019.v08.i04.p261.

Full text
Abstract:
In this paper, a model of the spread of computer viruses with security classification and nonlinear infection rates is formulated. From the short analysis, is found that the model does not have a virus-free equilibrium point. This show that the virus will always exist in the system and increasingly that can not be avoided. Therefore, control strategy by installing antivirus on subpopulation susceptible low-security level and infective subpopulation aims to minimize the number of infective computers, and minimize the cost related to these strategies. Hence, an important tool, in this case is, optimal control theory. The system solved numerically by using Forward-Backward Sweep method in combination with the fourth-order Runge-Kutta method. Based on the simulation results, the combination of the two controls is effective in suppressing the spread of computer viruses. However, controlling by installing an antivirus on an infected computer has a great influence in suppressing the spread of the computer virus.
APA, Harvard, Vancouver, ISO, and other styles
5

Tang, Tian, Mu-Chuan Zhou, Yi Quan, Jun-Liang Guo, V. S. Balaji, V. Gomathi, and V. Elamaran. "Penetration Testing and Security Assessment of Healthcare Records on Hospital Websites." Journal of Medical Imaging and Health Informatics 10, no. 9 (August 1, 2020): 2242–46. http://dx.doi.org/10.1166/jmihi.2020.3138.

Full text
Abstract:
At present, computer security is the flourishing field in the IT industry. Nowadays, the usage of computers and the Internet grows drastically, and hence, computers become vehicles for the attackers to spread viruses and worms, to distribute spam and spyware, and to perform denial-of-service attacks, etc. The IT engineers (even users) should know about network security threats, and at the same time, to some extent, they should know techniques to overcome the issues. The reliability and privacy of healthcare records of the patients are the most critical issue in the healthcare business industry sector. The security safeguards, such as physical, technical, and administrative safeguards, are crucial in protecting the information in all aspects. This article deals with the forty popular hospital portals in India related to the professional and network security related issues such as operating system guesses, number of open/closed/filtered ports, the name of the Web server, etc. The Nmap (network mapper) tool is used to analyze the results belong to the security perspective.
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Zhao. "Study on Strategies of Campus Network Security." Applied Mechanics and Materials 303-306 (February 2013): 1956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.1956.

Full text
Abstract:
Higher education institutions have a moral as well as legal responsibility to protect the sensitive data maintained on campus computers. Higher education institutions are beginning to look at areas to improve the protection of their information technology structure due to the increase of viruses, spam, hackers, and identity theft. The main goal of this paper is to study network security in university. The result shows the genuine exposure, the risk of being effectively compromised is real. Consequently, this network trap should be closely monitored and data control mechanisms, such as a reverse firewall, should be configured to prevent an attacker from using the network trap to damage other production resources.
APA, Harvard, Vancouver, ISO, and other styles
7

Widarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (March 2, 2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.

Full text
Abstract:
The use of information technology devices such as computers or laptops is currently increasing. The increased use is due to the fact that these devices are very supportive of our daily work activities. With the increasing use of these computers, data security on a computer or laptop device must be completely safe from virus attacks. To ward off viral attacks m aka requires the application of anti-virus to inhibit and prevent a variety of viruses that enter into the computer system so that the computer user's activity was not bothered by the many viruses are easily spread. Because there are too many antiviruses on the market, it is necessary to choose a good antivirus. One of the ways to choose antivirus is the existence of a decision support system . In this study, the Simple Additive Weighting (SAW) method was applied for the anti-virus application selection system. This data assessment analysis aims to produce the best anti - virus application options that computer users can use to secure their computer data. The criteria and weights used are K1 = application rating (5%) , K2 = completeness of features (30%) , K3 = price / official license (5%) , K4 = malware detection (45%) and K5 = blocking URL (15%). Of the 25 alternatives used, the results of the study, namely alternative A1 = Kaspersky anti-virus get the highest ranking result.
APA, Harvard, Vancouver, ISO, and other styles
8

Scott, Ralph L. "Wired to the World: Anti-virus Software." North Carolina Libraries 62, no. 1 (January 20, 2009): 63. http://dx.doi.org/10.3776/ncl.v62i1.157.

Full text
Abstract:
This column is the third installment of a fourpart series on computer security. The recent “Mydoom” virus attack was an example of afast-spreading Internet virus that clogs incoming mail boxes. Many of you have already received a ton of emails from people you have never heard of, or messages from “PAYROLL,” “Message returned,” or “TRAFFIC OFFICE.” These were distributed to you because someone did not keep his/her computer anti-virus software up-to-date and/or opened an e-mail attachment that contained the virus. Outside of the admonition not to open e-mail attachments from people you don’t know, what can you do to prevent the spread of viruses to other computers?
APA, Harvard, Vancouver, ISO, and other styles
9

Shang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (September 1, 2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.

Full text
Abstract:
Abstract.In this paper, we study the spread of virus/worm in computer networks with a view to addressing cyber security problems. Epidemic models have been applied extensively to model the propagation of computer viruses, which characterize the fact that infected machines may spread malware to other hosts connected to the network. In our framework, the dynamics of hosts evolves according to a modified inhomogeneous Susceptible-Infectious-Susceptible (SIS) epidemic model with time-varying transmission rate and recovery rate. The infection of computers is subject to direct attack as well as propagation among hosts. Based on optimal control theory, optimal attack strategies are provided by minimizing the cost (equivalently maximizing the profit) of the attacker. We present a threshold function of the fraction of infectious hosts, which captures the dynamically evolving strategies of the attacker and reflects the persistence of virus spreading. Moreover, our results indicate that if the infectivity of a computer worm is low and the computers are installed with antivirus software with high reliability, the intensity of attacks incurred will likely be low. This agrees with our intuition.
APA, Harvard, Vancouver, ISO, and other styles
10

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "COMPUTERS / Security / Viruses"

1

Irwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.

Full text
Abstract:
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes are explored in detail and highlighted. A discussion relating to bogon traffic observed is also presented. Two novel visualisation tools are presented, which were developed to aid in the analysis of large network telescope datasets. The first is a three-dimensional visualisation tool which allows for live, near-realtime analysis, and the second is a two-dimensional fractal based plotting scheme which allows for plots of the entire IPv4 address space to be produced, and manipulated. Using the techniques and tools developed for the analysis of this dataset, a detailed analysis of traffic recorded as destined for port 445/tcp is presented. This includes the evaluation of traffic surrounding the outbreak of the Conficker worm in November 2008. A number of metrics relating to the description and quantification of network telescope configuration and the resultant traffic captures are described, the use of which it is hoped will facilitate greater and easier collaboration among researchers utilising this network security technology. The research concludes with suggestions relating to other applications of the data and intelligence that can be extracted from network telescopes, and their use as part of an organisation’s integrated network security systems
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Meng-jang. "The impact of population mixing rules on epidemic communication /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

White, Dominic Stjohn Dolin. "Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006510.

Full text
Abstract:
This document aims to provide a complete discussion on vulnerability and patch management. The first chapters look at the trends relating to vulnerabilities, exploits, attacks and patches. These trends describe the drivers of patch and vulnerability management and situate the discussion in the current security climate. The following chapters then aim to present both policy and technical solutions to the problem. The policies described lay out a comprehensive set of steps that can be followed by any organisation to implement their own patch management policy, including practical advice on integration with other policies, managing risk, identifying vulnerability, strategies for reducing downtime and generating metrics to measure progress. Having covered the steps that can be taken by users, a strategy describing how best a vendor should implement a related patch release policy is provided. An argument is made that current monthly patch release schedules are inadequate to allow users to most effectively and timeously mitigate vulnerabilities. The final chapters discuss the technical aspect of automating parts of the policies described. In particular the concept of 'defense in depth' is used to discuss additional strategies for 'buying time' during the patch process. The document then goes on to conclude that in the face of increasing malicious activity and more complex patching, solid frameworks such as those provided in this document are required to ensure an organisation can fully manage the patching process. However, more research is required to fully understand vulnerabilities and exploits. In particular more attention must be paid to threats, as little work as been done to fully understand threat-agent capabilities and activities from a day to day basis.
TeX output 2007.02.08:2212
Adobe Acrobat 9.51 Paper Capture Plug-in
APA, Harvard, Vancouver, ISO, and other styles
4

Salters, Michael Jerome. "Computer virus security in the Department of the Navy." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schoeman, Adam. "Amber : a aero-interaction honeypot with distributed intelligence." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017938.

Full text
Abstract:
For the greater part, security controls are based on the principle of Decision through Detection (DtD). The exception to this is a honeypot, which analyses interactions between a third party and itself, while occupying a piece of unused information space. As honeypots are not located on productive information resources, any interaction with it can be assumed to be non-productive. This allows the honeypot to make decisions based simply on the presence of data, rather than on the behaviour of the data. But due to limited resources in human capital, honeypots’ uptake in the South African market has been underwhelming. Amber attempts to change this by offering a zero-interaction security system, which will use the honeypot approach of decision through Presence (DtP) to generate a blacklist of third parties, which can be passed on to a network enforcer. Empirical testing has proved the usefulness of this alternative and low cost approach in defending networks. The functionality of the system was also extended by installing nodes in different geographical locations, and streaming their detections into the central Amber hive.
APA, Harvard, Vancouver, ISO, and other styles
6

Yelimeli, Guruprasad Arun. "Computer Virus Spread Containment Using Feedback Control." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4675/.

Full text
Abstract:
In this research, a security architecture based on the feedback control theory has been proposed. The first loop has been designed, developed and tested. The architecture proposes a feedback model with many controllers located at different stages of network. The controller at each stage gives feedback to the one at higher level and a decision about network security is taken. The first loop implemented in this thesis detects one important anomaly of virus attack, rate of outgoing connection. Though there are other anomalies of a virus attack, rate of outgoing connection is an important one to contain the spread. Based on the feedback model, this symptom is fed back and a state model using queuing theory is developed to delay the connections and slow down the rate of outgoing connections. Upon implementation of this model, whenever an infected machine tries to make connections at a speed not considered safe, the controller kicks in and sends those connections to a delay queue. Because of delaying connections, rate of outgoing connections decrease. Also because of delaying, many connections timeout and get dropped, reducing the spread. PID controller is implemented to decide the number of connections going to safe or suspected queue. Multiple controllers can be implemented to control the parameters like delay and timeout. Control theory analysis is performed on the system to test for stability, controllability, observability. Sensitivity analysis is done to find out the sensitivity of the controller to the delay parameter. The first loop implemented gives feedback to the architecture proposed about symptoms of an attack at the node level. A controller needs to be developed to receive information from different controllers and decision about quarantining needs to be made. This research gives the basic information needed for the controller about what is going on at individual nodes of the network. This information can also be used to increase sensitivity of other loops to increase the effectiveness of feedback architecture.
APA, Harvard, Vancouver, ISO, and other styles
7

Volynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Atkison, Travis Levestis. "Using random projections for dimensionality reduction in identifying rogue applications." Diss., Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-133701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sharif, Monirul Islam. "Robust and efficient malware analysis and host-based monitoring." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/37220.

Full text
Abstract:
Today, host-based malware detection approaches such as antivirus programs are severely lagging in terms of defense against malware. Two important aspects that the overall effectiveness of malware detection depend on are the success of extracting information from malware using malware analysis to generate signatures, and then the success of utilizing these signatures on target hosts with appropriate system monitoring techniques. Today's malware employ a vast array of anti-analysis and anti-monitoring techniques to deter analysis and to neutralize antivirus programs, reducing the overall success of malware detection. In this dissertation, we present a set of practical approaches of robust and efficient malware analysis and system monitoring that can help make malware detection on hosts become more effective. First, we present a framework called Eureka, which efficiently deobfuscates single-pass and multi-pass packed binaries and restores obfuscated API calls, providing a basis for extracting comprehensive information from the malware using further static analysis. Second, we present the formal framework of transparent malware analysis and Ether, a dynamic malware analysis environment based on this framework that provides transparent fine-(single instruction) and coarse-(system call) granularity tracing. Third, we introduce an input-based obfuscation technique that hides trigger-based behavior from any input-oblivious analyzer. Fourth, we present an approach that automatically reverse-engineers the emulator and extracts the syntax and semantics of the bytecode language, which helps constructing control-flow graphs of the bytecode program and enables further analysis on the malicious code. Finally, we present Secure In-VM Monitoring, an approach of efficiently monitoring a target host while being robust against unknown malware that may attempt to neutralize security tools.
APA, Harvard, Vancouver, ISO, and other styles
10

Srivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.

Full text
Abstract:
Worldwide computer systems continue to execute malicious software that degrades the systemsâ performance and consumes network capacity by generating high volumes of unwanted traffic. Network-based detectors can effectively identify machines participating in the ongoing attacks by monitoring the traffic to and from the systems. But, network detection alone is not enough; it does not improve the operation of the Internet or the health of other machines connected to the network. We must identify malicious code running on infected systems, participating in global attack networks. This dissertation describes a robust and secure approach that identifies malware present on infected systems based on its undesirable use of network. Our approach, using virtualization, attributes malicious traffic to host-level processes responsible for the traffic. The attribution identifies on-host processes, but malware instances often exhibit parasitic behaviors to subvert the execution of benign processes. We then augment the attribution software with a host-level monitor that detects parasitic behaviors occurring at the user- and kernel-level. User-level parasitic attack detection happens via the system-call interface because it is a non-bypassable interface for user-level processes. Due to the unavailability of one such interface inside the kernel for drivers, we create a new driver monitoring interface inside the kernel to detect parasitic attacks occurring through this interface. Our attribution software relies on a guest kernelâ s data to identify on-host processes. To allow secure attribution, we prevent illegal modifications of critical kernel data from kernel-level malware. Together, our contributions produce a unified research outcome --an improved malicious code identification system for user- and kernel-level malware.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "COMPUTERS / Security / Viruses"

1

Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

D, Zhikov︠t︡sev M., ed. "Gl︠i︡uki", sboi i oshibki kompʹ︠i︡utera: Reshaem problemy sami. 2nd ed. Sankt-Peterburg: "Nauka i Tekhnika", 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

F, Hempelmann Christian, Raskin Victor, and Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., eds. New Security Paradigms Workshop: Proceedings, September 23-26, 2002, Virginia Beach, VA. New York, N.Y: Association for Computing Machinery, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United, States Congress House Committee on Government Reform Subcommittee on Technology Information Policy Intergovernmental Relations and the Census. Worm and virus defense: How can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hei ke jun tuan. Beijing: Jun shi ke xue chu ban she, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kennedy, David. Metasploit: The penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The tangled Web: A guide to securing modern Web applications. San Francisco: No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Metasploit: A penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Services, University of Sheffield Academic Computing. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

University of Sheffield. Academic Computing Services. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "COMPUTERS / Security / Viruses"

1

Salomon, David. "Viruses." In Elements of Computer Security, 37–97. London: Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Desmedt, Yvo. "Trojan Horses, Computer Viruses, and Worms." In Encyclopedia of Cryptography and Security, 1319–20. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Chunming. "Computer Viruses Propagation Model on Dynamic Switching Networks." In Science of Cyber Security, 81–95. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03026-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Sheng, and Yue Wang. "Attack and Repair Strategies for Computer Network About Viruses." In Machine Learning for Cyber Security, 500–510. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Tao, Xiaojie Liu, and Hongbin Li. "An Immune-Based Model for Computer Virus Detection." In Cryptology and Network Security, 59–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599371_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yongge. "Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses." In Information Security for Global Information Infrastructures, 161–70. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35515-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. "Virus and Content Filtering." In Guide to Computer Network Security, 325–43. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Virus and Content Filtering." In Guide to Computer Network Security, 331–50. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kizza, Joseph Migga. "Virus and Content Filtering." In Guide to Computer Network Security, 323–41. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Xiaoqi, Xi Xiong, Jiwu Jing, and Peng Liu. "Using Purpose Capturing Signatures to Defeat Computer Virus Mutating." In Information Security, Practice and Experience, 153–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "COMPUTERS / Security / Viruses"

1

Davis, R. "Exploring computer viruses." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gladychev, Nikolai. "Computer Viruses: The Abstract Theory Revisited." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0008942704060414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cohen, F. "Current best practice against computer viruses." In 25th Annual 1991 IEEE International Carnahan Conference on Security Technology. IEEE, 1991. http://dx.doi.org/10.1109/ccst.1991.202223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

POZZO, M., and T. GRAY. "A model for the containment of computer viruses." In 2nd Aerospace Computer Security Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jennings, Earle. "Securing Data Centers, Handheld Computers, and Networked Sensors against Viruses and Rootkits." In 2017 IEEE International Conference on Rebooting Computing (ICRC). IEEE, 2017. http://dx.doi.org/10.1109/icrc.2017.8123687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, A., and D. C. DuVarney. "Using predators to combat worms and viruses: a simulation-based study." In Proceedings. 20th Annual Computer Security Applications Conference. IEEE, 2004. http://dx.doi.org/10.1109/csac.2004.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kephart, J. O., and S. R. White. "Measuring and modeling computer virus prevalence." In Proceedings of IEEE Symposium on Research in Security and Privacy. IEEE, 1993. http://dx.doi.org/10.1109/risp.1993.287647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zeng, Jie, and Tao Li. "A Novel Computer Virus Detection Method from Ideas of Immunology." In 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009. http://dx.doi.org/10.1109/mines.2009.278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Qiming, and Changsong Deng. "An Computer Virus Spreading Model with Delayed Quarantine in Internet." In ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garnett, P. D. "Selective disassembly: a first step towards developing a virus filter." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography