- DokumenAGISA Towards Automatic Generation of Infection Signaturesdiunggah olehMukan Kuzey
- DokumenNew Thoughts in Ring3 NT Rootkitdiunggah olehMukan Kuzey
- DokumenAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codediunggah olehMukan Kuzey
- DokumenA Self-reproducing Analoguediunggah olehMukan Kuzey
- DokumenA Plague of Viruses Biological, Computer and Marketingdiunggah olehMukan Kuzey
- DokumenA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormsdiunggah olehMukan Kuzey
- DokumenA Dozen Dangerous Myths About Computer Virusesdiunggah olehMukan Kuzey
- DokumenA Cost Analysis of Typical Computer Viruses and Defensesdiunggah olehMukan Kuzey
- DokumenA Computational Model of Computer Virus Propagationdiunggah olehMukan Kuzey
- DokumenA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededdiunggah olehMukan Kuzey
- DokumenA Classification of Viruses Through Recursion Theoremsdiunggah olehMukan Kuzey
- DokumenA Bypass of Cohen's Impossibility Resultdiunggah olehMukan Kuzey
- DokumenAn Architecture for Generating Semantic-Aware Signaturesdiunggah olehMukan Kuzey
- DokumenAn Email Worm Vaccine Architecturediunggah olehMukan Kuzey
- DokumenAn Epidemic Model of Mobile Phone Virusdiunggah olehMukan Kuzey
- DokumenAn Epidemiological Model of Virus Spread and Cleanupdiunggah olehMukan Kuzey
- DokumenAn Evaluation of Two Host Based Intrusion Prevention Systemsdiunggah olehMukan Kuzey
- DokumenAn Internet-Worm Early Warning Systemdiunggah olehMukan Kuzey
- DokumenAn OS Independent Heuristics-based Worm-containment Systemdiunggah olehMukan Kuzey
- DokumenAn Overview of Unix Rootkitsdiunggah olehMukan Kuzey
- DokumenAn Undetectable Computer Virusdiunggah olehMukan Kuzey
- DokumenAnalysis and Detection of Computer Viruses and Wormsdiunggah olehMukan Kuzey
- DokumenAnalysis of a Scanning Model of Worm Propagationdiunggah olehMukan Kuzey
- DokumenAnalysis of Rxbotdiunggah olehMukan Kuzey
- DokumenAnalysis of Virus Algorithmsdiunggah olehMukan Kuzey
- DokumenAnalysis of Web Application Worms and Virusesdiunggah olehMukan Kuzey
- DokumenAnalyzing Worms and Network Traffic Using Compressiondiunggah olehMukan Kuzey
- DokumenAnatomy of a Semantic Virusdiunggah olehMukan Kuzey
- DokumenArtificial Immunity Using Constraint-based Detectorsdiunggah olehMukan Kuzey
- DokumenARTISTA a Network for ARTifical Immune SysTemsdiunggah olehMukan Kuzey
- DokumenASM-based Modelling of Self-Replicating Programsdiunggah olehMukan Kuzey
- DokumenAutomatically Generated Win32 Heuristic Virus Detectiondiunggah olehMukan Kuzey
- DokumenSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logicdiunggah olehMukan Kuzey
- DokumenStatic Analysis of Binary Code to Isolate Malicious Behaviorsdiunggah olehMukan Kuzey
- DokumenMechanics of Self-reproductiondiunggah olehMukan Kuzey
- DokumenMathematical Virusesdiunggah olehMukan Kuzey
- DokumenManaging Computer Viruses in a Groupware Environmentdiunggah olehMukan Kuzey
- DokumenMalware Pattern Scanning Schemes Secure Against Black-box Analysisdiunggah olehMukan Kuzey
- DokumenStriking Similaritiesdiunggah olehMukan Kuzey
- DokumenStoned Bootkitdiunggah olehMukan Kuzey
- DokumenMetaAware Identifying Metamorphic Malwarediunggah olehMukan Kuzey
- DokumenPowerful Virus Hits Computersdiunggah olehMukan Kuzey
- DokumenMobile Code Threats, Fact or Fictiondiunggah olehMukan Kuzey
- DokumenMetaAware Identifying Metamorphic Malwarediunggah olehMukan Kuzey
- DokumenMalware Normalizationdiunggah olehMukan Kuzey
- DokumenMeasuring and Modeling Computer Virus Prevalencediunggah olehMukan Kuzey
- DokumenMalware, Viruses and Log Visualisationdiunggah olehMukan Kuzey
- DokumenMalware Research at SMUdiunggah olehMukan Kuzey
- DokumenSlamdunkdiunggah olehMukan Kuzey