- DocumentoAGISA Towards Automatic Generation of Infection Signaturesenviado porMukan Kuzey
- DocumentoNew Thoughts in Ring3 NT Rootkitenviado porMukan Kuzey
- DocumentoAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codeenviado porMukan Kuzey
- DocumentoA Self-reproducing Analogueenviado porMukan Kuzey
- DocumentoA Plague of Viruses Biological, Computer and Marketingenviado porMukan Kuzey
- DocumentoA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormsenviado porMukan Kuzey
- DocumentoA Dozen Dangerous Myths About Computer Virusesenviado porMukan Kuzey
- DocumentoA Cost Analysis of Typical Computer Viruses and Defensesenviado porMukan Kuzey
- DocumentoA Computational Model of Computer Virus Propagationenviado porMukan Kuzey
- DocumentoA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededenviado porMukan Kuzey
- DocumentoA Classification of Viruses Through Recursion Theoremsenviado porMukan Kuzey
- DocumentoA Bypass of Cohen's Impossibility Resultenviado porMukan Kuzey
- DocumentoAn Architecture for Generating Semantic-Aware Signaturesenviado porMukan Kuzey
- DocumentoAn Email Worm Vaccine Architectureenviado porMukan Kuzey
- DocumentoAn Epidemic Model of Mobile Phone Virusenviado porMukan Kuzey
- DocumentoAn Epidemiological Model of Virus Spread and Cleanupenviado porMukan Kuzey
- DocumentoAn Evaluation of Two Host Based Intrusion Prevention Systemsenviado porMukan Kuzey
- DocumentoAn Internet-Worm Early Warning Systemenviado porMukan Kuzey
- DocumentoAn OS Independent Heuristics-based Worm-containment Systemenviado porMukan Kuzey
- DocumentoAn Overview of Unix Rootkitsenviado porMukan Kuzey
- DocumentoAn Undetectable Computer Virusenviado porMukan Kuzey
- DocumentoAnalysis and Detection of Computer Viruses and Wormsenviado porMukan Kuzey
- DocumentoAnalysis of a Scanning Model of Worm Propagationenviado porMukan Kuzey
- DocumentoAnalysis of Rxbotenviado porMukan Kuzey
- DocumentoAnalysis of Virus Algorithmsenviado porMukan Kuzey
- DocumentoAnalysis of Web Application Worms and Virusesenviado porMukan Kuzey
- DocumentoAnalyzing Worms and Network Traffic Using Compressionenviado porMukan Kuzey
- DocumentoAnatomy of a Semantic Virusenviado porMukan Kuzey
- DocumentoArtificial Immunity Using Constraint-based Detectorsenviado porMukan Kuzey
- DocumentoARTISTA a Network for ARTifical Immune SysTemsenviado porMukan Kuzey
- DocumentoASM-based Modelling of Self-Replicating Programsenviado porMukan Kuzey
- DocumentoAutomatically Generated Win32 Heuristic Virus Detectionenviado porMukan Kuzey
- DocumentoSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logicenviado porMukan Kuzey
- DocumentoStatic Analysis of Binary Code to Isolate Malicious Behaviorsenviado porMukan Kuzey
- DocumentoMechanics of Self-reproductionenviado porMukan Kuzey
- DocumentoMathematical Virusesenviado porMukan Kuzey
- DocumentoManaging Computer Viruses in a Groupware Environmentenviado porMukan Kuzey
- DocumentoMalware Pattern Scanning Schemes Secure Against Black-box Analysisenviado porMukan Kuzey
- DocumentoStriking Similaritiesenviado porMukan Kuzey
- DocumentoStoned Bootkitenviado porMukan Kuzey
- DocumentoMetaAware Identifying Metamorphic Malwareenviado porMukan Kuzey
- DocumentoPowerful Virus Hits Computersenviado porMukan Kuzey
- DocumentoMobile Code Threats, Fact or Fictionenviado porMukan Kuzey
- DocumentoMetaAware Identifying Metamorphic Malwareenviado porMukan Kuzey
- DocumentoMalware Normalizationenviado porMukan Kuzey
- DocumentoMeasuring and Modeling Computer Virus Prevalenceenviado porMukan Kuzey
- DocumentoMalware, Viruses and Log Visualisationenviado porMukan Kuzey
- DocumentoMalware Research at SMUenviado porMukan Kuzey
- DocumentoSlamdunkenviado porMukan Kuzey