- DocumentoAGISA Towards Automatic Generation of Infection Signaturescargado porMukan Kuzey
- DocumentoNew Thoughts in Ring3 NT Rootkitcargado porMukan Kuzey
- DocumentoAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codecargado porMukan Kuzey
- DocumentoA Self-reproducing Analoguecargado porMukan Kuzey
- DocumentoA Plague of Viruses Biological, Computer and Marketingcargado porMukan Kuzey
- DocumentoA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormscargado porMukan Kuzey
- DocumentoA Dozen Dangerous Myths About Computer Virusescargado porMukan Kuzey
- DocumentoA Cost Analysis of Typical Computer Viruses and Defensescargado porMukan Kuzey
- DocumentoA Computational Model of Computer Virus Propagationcargado porMukan Kuzey
- DocumentoA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededcargado porMukan Kuzey
- DocumentoA Classification of Viruses Through Recursion Theoremscargado porMukan Kuzey
- DocumentoA Bypass of Cohen's Impossibility Resultcargado porMukan Kuzey
- DocumentoAn Architecture for Generating Semantic-Aware Signaturescargado porMukan Kuzey
- DocumentoAn Email Worm Vaccine Architecturecargado porMukan Kuzey
- DocumentoAn Epidemic Model of Mobile Phone Viruscargado porMukan Kuzey
- DocumentoAn Epidemiological Model of Virus Spread and Cleanupcargado porMukan Kuzey
- DocumentoAn Evaluation of Two Host Based Intrusion Prevention Systemscargado porMukan Kuzey
- DocumentoAn Internet-Worm Early Warning Systemcargado porMukan Kuzey
- DocumentoAn OS Independent Heuristics-based Worm-containment Systemcargado porMukan Kuzey
- DocumentoAn Overview of Unix Rootkitscargado porMukan Kuzey
- DocumentoAn Undetectable Computer Viruscargado porMukan Kuzey
- DocumentoAnalysis and Detection of Computer Viruses and Wormscargado porMukan Kuzey
- DocumentoAnalysis of a Scanning Model of Worm Propagationcargado porMukan Kuzey
- DocumentoAnalysis of Rxbotcargado porMukan Kuzey
- DocumentoAnalysis of Virus Algorithmscargado porMukan Kuzey
- DocumentoAnalysis of Web Application Worms and Virusescargado porMukan Kuzey
- DocumentoAnalyzing Worms and Network Traffic Using Compressioncargado porMukan Kuzey
- DocumentoAnatomy of a Semantic Viruscargado porMukan Kuzey
- DocumentoArtificial Immunity Using Constraint-based Detectorscargado porMukan Kuzey
- DocumentoARTISTA a Network for ARTifical Immune SysTemscargado porMukan Kuzey
- DocumentoASM-based Modelling of Self-Replicating Programscargado porMukan Kuzey
- DocumentoAutomatically Generated Win32 Heuristic Virus Detectioncargado porMukan Kuzey
- DocumentoSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logiccargado porMukan Kuzey
- DocumentoStatic Analysis of Binary Code to Isolate Malicious Behaviorscargado porMukan Kuzey
- DocumentoMechanics of Self-reproductioncargado porMukan Kuzey
- DocumentoMathematical Virusescargado porMukan Kuzey
- DocumentoManaging Computer Viruses in a Groupware Environmentcargado porMukan Kuzey
- DocumentoMalware Pattern Scanning Schemes Secure Against Black-box Analysiscargado porMukan Kuzey
- DocumentoStriking Similaritiescargado porMukan Kuzey
- DocumentoStoned Bootkitcargado porMukan Kuzey
- DocumentoMetaAware Identifying Metamorphic Malwarecargado porMukan Kuzey
- DocumentoPowerful Virus Hits Computerscargado porMukan Kuzey
- DocumentoMobile Code Threats, Fact or Fictioncargado porMukan Kuzey
- DocumentoMetaAware Identifying Metamorphic Malwarecargado porMukan Kuzey
- DocumentoMalware Normalizationcargado porMukan Kuzey
- DocumentoMeasuring and Modeling Computer Virus Prevalencecargado porMukan Kuzey
- DocumentoMalware, Viruses and Log Visualisationcargado porMukan Kuzey
- DocumentoMalware Research at SMUcargado porMukan Kuzey
- DocumentoSlamdunkcargado porMukan Kuzey