Academic literature on the topic 'COMPUTERS / Security / Viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COMPUTERS / Security / Viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "COMPUTERS / Security / Viruses"
VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textAL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.
Full textAsaad, Renas Rajab. "Implementation of a Virus with Treatment and Protection Methods." ICONTECH INTERNATIONAL JOURNAL 4, no. 2 (September 16, 2020): 28–34. http://dx.doi.org/10.46291/icontechvol4iss2pp28-34.
Full textDARAJAT, PANGESTUTI PRIMA, and TYAS HUSADANINGSIH. "KONTROL OPTIMAL PADA MODEL PENYEBARAN VIRUS KOMPUTER DENGAN KLASIFIKASI PENGAMANAN." E-Jurnal Matematika 8, no. 4 (November 29, 2019): 253. http://dx.doi.org/10.24843/mtk.2019.v08.i04.p261.
Full textTang, Tian, Mu-Chuan Zhou, Yi Quan, Jun-Liang Guo, V. S. Balaji, V. Gomathi, and V. Elamaran. "Penetration Testing and Security Assessment of Healthcare Records on Hospital Websites." Journal of Medical Imaging and Health Informatics 10, no. 9 (August 1, 2020): 2242–46. http://dx.doi.org/10.1166/jmihi.2020.3138.
Full textXu, Zhao. "Study on Strategies of Campus Network Security." Applied Mechanics and Materials 303-306 (February 2013): 1956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.1956.
Full textWidarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (March 2, 2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.
Full textScott, Ralph L. "Wired to the World: Anti-virus Software." North Carolina Libraries 62, no. 1 (January 20, 2009): 63. http://dx.doi.org/10.3776/ncl.v62i1.157.
Full textShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (September 1, 2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textDissertations / Theses on the topic "COMPUTERS / Security / Viruses"
Irwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Full textLin, Meng-jang. "The impact of population mixing rules on epidemic communication /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textWhite, Dominic Stjohn Dolin. "Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006510.
Full textTeX output 2007.02.08:2212
Adobe Acrobat 9.51 Paper Capture Plug-in
Salters, Michael Jerome. "Computer virus security in the Department of the Navy." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23842.
Full textSchoeman, Adam. "Amber : a aero-interaction honeypot with distributed intelligence." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017938.
Full textYelimeli, Guruprasad Arun. "Computer Virus Spread Containment Using Feedback Control." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4675/.
Full textVolynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.
Find full textAtkison, Travis Levestis. "Using random projections for dimensionality reduction in identifying rogue applications." Diss., Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-133701.
Full textSharif, Monirul Islam. "Robust and efficient malware analysis and host-based monitoring." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/37220.
Full textSrivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.
Full textBooks on the topic "COMPUTERS / Security / Viruses"
Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textD, Zhikov︠t︡sev M., ed. "Gl︠i︡uki", sboi i oshibki kompʹ︠i︡utera: Reshaem problemy sami. 2nd ed. Sankt-Peterburg: "Nauka i Tekhnika", 2013.
Find full textF, Hempelmann Christian, Raskin Victor, and Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., eds. New Security Paradigms Workshop: Proceedings, September 23-26, 2002, Virginia Beach, VA. New York, N.Y: Association for Computing Machinery, 2002.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Technology Information Policy Intergovernmental Relations and the Census. Worm and virus defense: How can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003. Washington: U.S. G.P.O., 2004.
Find full textKennedy, David. Metasploit: The penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.
Find full textThe tangled Web: A guide to securing modern Web applications. San Francisco: No Starch Press, 2011.
Find full textMetasploit: A penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.
Find full textServices, University of Sheffield Academic Computing. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1995.
Find full textUniversity of Sheffield. Academic Computing Services. Data security and computer viruses. Sheffield: University of Sheffield, Academic Computing Services, 1996.
Find full textBook chapters on the topic "COMPUTERS / Security / Viruses"
Salomon, David. "Viruses." In Elements of Computer Security, 37–97. London: Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_2.
Full textDesmedt, Yvo. "Trojan Horses, Computer Viruses, and Worms." In Encyclopedia of Cryptography and Security, 1319–20. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_331.
Full textZhang, Chunming. "Computer Viruses Propagation Model on Dynamic Switching Networks." In Science of Cyber Security, 81–95. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03026-1_6.
Full textHong, Sheng, and Yue Wang. "Attack and Repair Strategies for Computer Network About Viruses." In Machine Learning for Cyber Security, 500–510. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7_43.
Full textLi, Tao, Xiaojie Liu, and Hongbin Li. "An Immune-Based Model for Computer Virus Detection." In Cryptology and Network Security, 59–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599371_6.
Full textWang, Yongge. "Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses." In Information Security for Global Information Infrastructures, 161–70. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35515-3_17.
Full textKizza, Joseph Migga. "Virus and Content Filtering." In Guide to Computer Network Security, 325–43. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_15.
Full textKizza, Joseph Migga. "Virus and Content Filtering." In Guide to Computer Network Security, 331–50. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_15.
Full textKizza, Joseph Migga. "Virus and Content Filtering." In Guide to Computer Network Security, 323–41. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_15.
Full textJia, Xiaoqi, Xi Xiong, Jiwu Jing, and Peng Liu. "Using Purpose Capturing Signatures to Defeat Computer Virus Mutating." In Information Security, Practice and Experience, 153–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12827-1_12.
Full textConference papers on the topic "COMPUTERS / Security / Viruses"
Davis, R. "Exploring computer viruses." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113403.
Full textGladychev, Nikolai. "Computer Viruses: The Abstract Theory Revisited." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0008942704060414.
Full textCohen, F. "Current best practice against computer viruses." In 25th Annual 1991 IEEE International Carnahan Conference on Security Technology. IEEE, 1991. http://dx.doi.org/10.1109/ccst.1991.202223.
Full textPOZZO, M., and T. GRAY. "A model for the containment of computer viruses." In 2nd Aerospace Computer Security Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1986. http://dx.doi.org/10.2514/6.1986-2759.
Full textJennings, Earle. "Securing Data Centers, Handheld Computers, and Networked Sensors against Viruses and Rootkits." In 2017 IEEE International Conference on Rebooting Computing (ICRC). IEEE, 2017. http://dx.doi.org/10.1109/icrc.2017.8123687.
Full textGupta, A., and D. C. DuVarney. "Using predators to combat worms and viruses: a simulation-based study." In Proceedings. 20th Annual Computer Security Applications Conference. IEEE, 2004. http://dx.doi.org/10.1109/csac.2004.47.
Full textKephart, J. O., and S. R. White. "Measuring and modeling computer virus prevalence." In Proceedings of IEEE Symposium on Research in Security and Privacy. IEEE, 1993. http://dx.doi.org/10.1109/risp.1993.287647.
Full textZeng, Jie, and Tao Li. "A Novel Computer Virus Detection Method from Ideas of Immunology." In 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009. http://dx.doi.org/10.1109/mines.2009.278.
Full textLiu, Qiming, and Changsong Deng. "An Computer Virus Spreading Model with Delayed Quarantine in Internet." In ICCNS '16: 6th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3017971.3017972.
Full textGarnett, P. D. "Selective disassembly: a first step towards developing a virus filter." In Fourth Aerospace Computer Security Applications. IEEE, 1988. http://dx.doi.org/10.1109/acsac.1988.113408.
Full text