|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 637 occurrences of 418 keywords
|
|
|
Results
Found 928 publication records. Showing 928 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
104 | Lansheng Han, Hui Liu, Baffour Kojo Asiedu |
Analytic Model for Network Viruses. |
ICNC (3) |
2005 |
DBLP DOI BibTeX RDF |
|
97 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria |
Characterization of virus replication. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
88 | Yu Zhang 0003, Tao Li, Renchao Qin |
Computer Virus Evolution Model Inspired by Biological DNA. |
ICIC (2) |
2008 |
DBLP DOI BibTeX RDF |
computer virus evolution, biological DNA, artificial life |
85 | Jean-Marie Borello, Ludovic Mé |
Code obfuscation techniques for metamorphic viruses. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Erol Gelenbe |
Keeping Viruses Under Control. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
Conflicts between Agents, Network Security, Computer Viruses |
78 | Xiaohua Hu 0001, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm |
Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Zhi-hong Zuo, Qingxin Zhu, Ming-Tian Zhou |
On the time complexity of computer viruses. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
75 | Leonard M. Adleman |
An Abstract Theory of Computer Viruses. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
68 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001 |
Characterizing and Detecting Virus Replication. |
ICONS |
2008 |
DBLP DOI BibTeX RDF |
behavior based self reference, replication security, virus detection |
68 | Susanna L. Lamers, Marco Salemi, Michael S. McGrath, Gary B. Fogel |
Prediction of R5, X4, and R5X4 HIV-1 Coreceptor Usage with Evolved Neural Networks. |
IEEE ACM Trans. Comput. Biol. Bioinform. |
2008 |
DBLP DOI BibTeX RDF |
phenotype prediction, tropism, dual-tropic viruses, evolutionary computation, artificial neural networks, Computational intelligence, HIV, AIDS |
67 | Chenxi Wang, John C. Knight, Matthew C. Elder |
On Computer Viral Infection and the Effect of Immunization. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
anti-virus systems, virus protection schemes, computer networks, simulation study, telecommunication security, computer network security, computer viruses, computer viruses, immunization |
66 | Jose Andre Morales |
Threat of renovated .NET viruses to mobile devices. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Matt Webster, Grant Malcolm |
Detection of metamorphic computer viruses using algebraic specification. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Cholmin Kim, Soung-uck Lee, Manpyo Hong |
Macroscopic Treatment to Polymorphic E-mail Based Viruses. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Akira Mori |
Detecting Unknown Computer Viruses - A New Approach. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
|
65 | Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion |
A Classification of Viruses Through Recursion Theorems. |
CiE |
2007 |
DBLP DOI BibTeX RDF |
iteration theorem, polymorphism, propagation, Computer viruses, recursion theorem |
65 | InSeon Yoo |
Visualizing windows executable viruses using self-organizing maps. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
windows executable viruses, visualization, self-organizing maps |
64 | Yibin Zheng, Peter C. Doerschuk |
Reconstruction of viruses from solution X-ray scattering data. |
ICIP |
1995 |
DBLP DOI BibTeX RDF |
X-ray scattering, biological techniques, viruses reconstruction, solution X-ray scattering data, 3-dimensional structure, icosahedrally-symmetric viruses, Gerchberg-Saxton algorithm generalization, unknown n-vector, norm squared, virus particles dynamics, cowpea mosaic virus, iterative methods, iterative algorithm, molecular configurations, molecular biophysics, model-based method |
58 | Pavel V. Zbitskiy |
Code mutation techniques by means of formal grammars and automatons. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Philippe Beaucamps |
Extended recursion-based formalization of virus mutation. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
58 | InSeon Yoo, Ulrich Ultes-Nitsche |
Non-signature based virus detection. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Lucian Ilie, Liviu Tinta, Cristian Popescu, Kathleen A. Hill |
Viral Genome Compression. |
DNA |
2006 |
DBLP DOI BibTeX RDF |
viral genomes, genome compression, overlapping genes, shortest common superstring problem, lower bounds, exact algorithms, viruses, approximate solutions |
56 | Qiusun Ye |
A Practical VCR Technique of Preventing Computer Viruses' Creeping in Networks. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Erol Gelenbe |
Keeping Viruses Under Control. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
55 | John Aycock, Ken Barker 0001 |
Viruses 101. |
SIGCSE |
2005 |
DBLP DOI BibTeX RDF |
anti-virus software, university course, malware, computer viruses |
55 | Nancy P. Kutner |
Viruses, updates, and security: making the campus aware. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
anti-virus software, security, documentation, spam, firewalls, worms, E-mail, viruses |
49 | Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq |
Evolvable malware. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
genetic algorithm, computer virus, artificial evolution |
49 | Yu Zhang 0003, Tao Li, Renchao Qin |
A Dynamic Immunity-Based Model for Computer Virus Detection. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
vaccine gene library, computer immune system, artificial immune system, computer virus |
49 | Deepak Venugopal, Guoning Hu, Nicoleta Roman |
Intelligent virus detection on mobile devices. |
PST |
2006 |
DBLP DOI BibTeX RDF |
common functionality, security, mobile, virus detection, DLL |
49 | Ram Dantu, João W. Cangussu |
An Architecture for Network Security Using Feedback Control. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Pamela A. Thuman-Commike, Wah Chiu |
Three-Dimensional Reconstruction of Noisy Electron Microscopy Virus Particle Images. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
biological techniques, noisy electron microscopy virus particle images, macromolecular complexes, icosahedral viruses, noisy projection images, low contrast images, automated reconstruction, high resolution 3D reconstruction, symmetry, computed tomography |
46 | Jaromír Hubálek, Vojtech Adam, René Kizek |
New Approach in Rapid Viruses Detection and Its Implementation on a Chip. |
eTELEMED |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Abhishek Karnik, Suchandra Goswami, Ratan K. Guha |
Detecting Obfuscated Viruses Using Cosine Similarity Analysis. |
Asia International Conference on Modelling and Simulation |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Dimitrios Frosyniotis, Yannis Anthopoulos, Spiros Kintzios, Antonis Perdikaris, Constantine P. Yialouris |
A Multisensor Fusion System for the Detection of Plant Viruses by Combining Artificial Neural Networks. |
ICANN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Xiaohua Hu 0001, Illhoi Yoo, Peter Rumm, Michael E. Atwood |
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Paul-Michael Agapow |
Computational Brittleness and the Evolution of Computer Viruses. |
PPSN |
1996 |
DBLP DOI BibTeX RDF |
|
39 | Min Feng 0001, Rajiv Gupta 0001 |
Detecting virus mutations via dynamic matching. |
ICSM |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens |
Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jerry Cheng, Starsky H. Y. Wong, Hao Yang 0004, Songwu Lu |
SmartSiren: virus detection and alert for smartphones. |
MobiSys |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, smartphone, alert, virus detection |
39 | Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion |
Toward an Abstract Computer Virology. |
ICTAC |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Mark Daley, Ian McQuillan |
Viral Gene Compression: Complexity and Verification. |
CIAA |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Artificial Immune System against Viral Attack. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Biologically Inspired Computer Virus Detection System. |
BioADIT |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Kevin Deeb, Steven Lewis |
A Biological Approach to the Development of Computer Autoimmune Systems. |
ISMIS |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Hitoshi Kanoh, Tomohiro Nakamura |
Knowledge based genetic algorithm for dynamic route selection. |
KES |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Takeshi Okamoto, Yoshiteru Ishida |
A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. |
ISADS |
1999 |
DBLP DOI BibTeX RDF |
|
39 | Yuji Watanabe, Hideki Imai |
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
38 | Mark W. Bailey, Clark L. Coleman, Jack W. Davidson |
Defense against the dark arts. |
SIGCSE |
2008 |
DBLP DOI BibTeX RDF |
anti-virus software, compilers, computer science education, computer viruses |
38 | Mayuresh Ektare, Yanxia Yang |
The Balancing Act Between Computer Security and Convenience. |
HCI (1) |
2007 |
DBLP DOI BibTeX RDF |
convenience, user experience, Computer security, user behavior, Spyware, Viruses |
36 | Sriram Subramaniam |
Determination of Protein Structures in Situ: Electron Tomography of Intact Viruses and Cells. |
ISBI |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Li-Chiou Chen, Kathleen M. Carley |
The impact of countermeasure propagation on the prevalence of computer viruses. |
IEEE Trans. Syst. Man Cybern. Part B |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Ruiqi Hu, Aloysius K. Mok |
Detecting Unknown Massive Mailing Viruses Using Proactive Methods. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
malicious executable detection, intrusion detection, virus detection |
36 | Ajay Gupta 0002, Daniel C. DuVarney |
Using Predators to Combat Worms and Viruses: A Simulation-Based Study. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Kihun Chong, Ha Yoon Song, Sam H. Noh |
Traffic Characterization of the Web Server Attacks of Worm Viruses. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Jeffrey Horton, Jennifer Seberry |
Companion Viruses and the Macintosh: Threats and Countermeasures. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Lein Harn, Hung-Yu Lin, Shoubao Yang |
A Software Authentication System for the Prevention of Computer Viruses. |
ACM Conference on Computer Science |
1992 |
DBLP DOI BibTeX RDF |
|
36 | Steve R. White |
Covert Distributed Processing with Computer Viruses. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
36 | Paul Schmehl |
Barbarians at the gateway, defeating viruses in EDU. |
SIGUCCS |
2001 |
DBLP DOI BibTeX RDF |
malicious programs, security, strategies, blocking, viruses, anti-virus, defenses |
34 | Rafael Ball |
Viruses in all Dimensions - How an Information Code Controls Viruses, Software and Microorganisms |
|
2023 |
DOI RDF |
|
34 | Sifan Ye, Congyu Lu, Ye Qiu, Heping Zheng, Xingyi Ge, Aiping Wu, Zanxian Xia, Taijiao Jiang, Haizhen Zhu, Yousong Peng |
An atlas of human viruses provides new insights into diversity and tissue tropism of human viruses. |
Bioinform. |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Tavis K. Anderson, William W. Laegreid, Francesco Cerutti, Fernando A. Osorio, Eric A. Nelson, Jane Christopher-Hennings, Tony L. Goldberg |
Ranking viruses: measures of positional importance within networks define core viruses for rational polyvalent vaccine development. |
Bioinform. |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Dianhui Zhu, George E. Fox, Sugoto Chakravarty |
RECOVIR: An application package to automatically identify some single stranded RNA viruses using capsid protein residues that uniquely distinguish among these viruses. |
BMC Bioinform. |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Harold Joseph Highland |
A history of computer viruses: Three special viruses. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
29 | Vladimir A. Golovko, Sergei V. Bezobrazov, Pavel Kachurka, Leanid U. Vaitsekhovich |
Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. |
Advances in Machine Learning II |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Tao Gong, Zixing Cai |
Tri-tier Immune System in Anti-virus and Software Fault Diagnosis of Mobile Immune Robot Based on Normal Model. |
J. Intell. Robotic Syst. |
2008 |
DBLP DOI BibTeX RDF |
Normal model, Immune robot, Fault diagnosis, Artificial immune system, Anti-virus |
29 | Matt Webster, Grant Malcolm |
Formal affordance-based models of computer virus reproduction. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Paul Dan Cristea, Rodica Tuduce, Jan Cornelis 0001 |
Inserts in prokaryotegenomes. |
BIBE |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Sheng-Lung Peng, Yu-Wei Tsay, Tai-Chun Wang, Chuan Yi Tang |
Probe Selection with Fault Tolerance. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Abhijit Bose, Xin Hu 0001, Kang G. Shin, Taejoon Park |
Behavioral detection of malware on mobile handsets. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
mobile handsets, security, machine learning, worm detection |
29 | Ram Dantu, João W. Cangussu, Sudeep Patwardhan |
Fast Worm Containment Using Feedback Control. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology |
29 | Yuji Sato, Yuta Yasuda, Ryuji Goto |
Analysis of noisy time-series signals with GA involving viral infection with tropism. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
time-series problem, tropism, virus evolution, virus infection, genetic algorithms, inverse problem, noisy optimization |
29 | Barbara Strug, Andrzej Bielecki, Marzena Bielecka |
Evolutionary Viral-type Algorithm for the Inverse Problem for Iterated Function Systems. |
PPAM |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria |
Testing and evaluating virus detectors for handheld devices. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Feng-Mao Lin, Hsien-Da Huang, Y.-C. Chang, Ann-Ping Tsou, P.-L. Chan, L.-C. Wu, Meng-Feng Tsai, Jorng-Tzong Horng |
Database to Dynamically Aid Probe Design for Virus Identification. |
IEEE Trans. Inf. Technol. Biomed. |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Changwoo Nam, Seong-Jin Ahn 0001, Jin-Wook Chung |
Learning-Based Algorithm for Detecting Abnormal Traffic. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Il-Seop Song, Youngseok Lee 0002, Taeck-Geun Kwon |
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
content inspection, network security, pattern matching, Deep packet inspection, TCAM |
29 | Dan Xu, Xiang Li 0010, Xiao Fan Wang 0001 |
Mechanisms for spreading of computer virus on the Internet: an overview. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jintao Xiong |
ACT: attachment chain tracing scheme for email virus detection and control. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
contact tracing, transmission chain, worm defense |
29 | Ram Dantu, João W. Cangussu, Arun Yelimeli |
Dynamic Control of Worm Propagation. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Matthew M. Williamson |
Design, Implementation and Test of an Email Virus Throttle. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Dimitrios N. Serpanos, Richard J. Lipton |
Defense Against Man-in-the-Middle Attack in Client-Server Systems. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Jieh-Sheng Lee, Jieh Hsiang, Po-Hao Tsang |
A Generic Virus Detection Agent on the Internet. |
HICSS (4) |
1997 |
DBLP DOI BibTeX RDF |
|
29 | Mark Menor, Kyungim Baek, Mahdi Belcaid, Yannick Gingras, Guylaine Poisson |
Virus DNA-fragment classification using taxonomic hidden Markov model profiles. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
machine learning, annotation, viruses, metagenomics |
29 | Joshua Hartranft, Veronica Longenecker |
SafetyNET -- designing and implementing a technology support program for students. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
Cisco clean access, security, help desk, spyware, viruses, support tools, call tracking, student support |
29 | Abhijit Bose, Kang G. Shin |
Proactive security for mobile messaging networks. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
SMS/MMS, mobile viruses, worms, containment, Instant Messaging (IM), proactive security |
29 | Neal Leavitt |
Mobile Phones: The Next Frontier for Hackers? |
Computer |
2005 |
DBLP DOI BibTeX RDF |
malware, cell phones, wireless security, viruses |
29 | Richard Ford |
Malcode Mysteries Revealed. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
self-replicating code, SQL.Slammer worm, worms, viruses |
29 | Carolyn P. Meinel |
Cybercrime Treaty Could Chill Research. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses |
29 | George M. Mohay, J. Zellers |
Kernel and Shell-Based Applications Integrity Assurance. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues |
29 | Peter D. Lauren, N. Nandhakumar |
Recovering the viewing parameters of random, translated and noisy projections of asymmetric objects. |
CVPR |
1996 |
DBLP DOI BibTeX RDF |
noisy projections, translated projections, randomly acquired projections, asymmetric objects, common lines algorithm, three-dimensional Fourier space, translational displacement, in vivo images, underwater scenes, radioastronomy, geoseismic analysis, portable radiography, industrial inspection, image reconstruction, Fourier transforms, Fourier transforms, intersection, cells, random projections, viruses, three-dimensional reconstruction, molecules |
27 | Kazuya Sata, Kouichi Hirata, Kimihito Ito, Tetsuji Kuboyama |
Discovering Networks for Global Propagation of Influenza A (H3N2) Viruses by Clustering. |
KES (2) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Junghoon Lee, Peter C. Doerschuk, John E. Johnson |
Exact Reduced-Complexity Maximum Likelihood Reconstruction of Multiple 3-D Objects From Unlabeled Unoriented 2-D Projections and Electron Microscopy of Viruses. |
IEEE Trans. Image Process. |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Geoffrey Canright, Kenth Engø-Monsen |
A 'Pumping' Model for the Spreading of Computer Viruses. (PDF / PS) |
AIMS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Boyun Zhang, Jianping Yin, Jingbo Hao |
Intelligent Detection Computer Viruses Based on Multiple Classifiers. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Robert L. Glass |
Viruses Are Beginning to Get to Me! |
IEEE Softw. |
2005 |
DBLP DOI BibTeX RDF |
software virus, spam |
27 | Zeyun Yu, Chandrajit L. Bajaj |
Automatic Ultrastructure Segmentation of Reconstructed CryoEM Maps of Icosahedral Viruses. |
IEEE Trans. Image Process. |
2005 |
DBLP DOI BibTeX RDF |
|
27 | James Aspnes, Kevin L. Chang, Aleksandr Yampolskiy |
Inoculation strategies for victims of viruses and the sum-of-squares partition problem. |
SODA |
2005 |
DBLP BibTeX RDF |
|
27 | Noam Berger, Christian Borgs, Jennifer T. Chayes, Amin Saberi |
On the spread of viruses on the internet. |
SODA |
2005 |
DBLP BibTeX RDF |
|
27 | Willy Valdivia Granda, Chistine D. Keating, Maricel G. Kann, Roderic Beresford, Shana O. Kelley |
Detection of Encephalic and Hemorrhagic Viruses: Integration of Micro and Nano-fabrication with Computational Tools. |
ICMENS |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Alan H. Karp |
Enforce POLA on processes to control viruses. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 928 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|