Search alternatives:
"computer worms" » "computer works", "computer terms", "computers work"

1
by Szor, Peter
Published 2005
Addison-Wesley
Table of Contents: ... -- Classification according to payload -- Strategies of computer worms -- Exploits, vulnerabilities, and buffer...

2
Published 2015
Springer International Publishing
Table of Contents: ...-like Dynamic System of Unbounded Expansion -- A Discrete Dynamic Model for Computer Worm Propagation...

4
Published 2005
Springer US
... systems that protect against computer worms, computer viruses, and other related concerns. ABOUT...

5
Published 2024
Springer Nature Singapore
Table of Contents: ... Of Computer Worms – A Study...

6
Published 2006
Springer London
Table of Contents: ... Authentication Mechanism for Self-Organizing Wireless Sensor Networks -- Modelling the Spread of Computer Worms...

7
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Analogy or Loose Metaphor? -- Epidemic Spreading of Computer Worms in Fixed Wireless Networks -- Wireless...

8
Published 2022
Springer International Publishing
Table of Contents: ... -- Construction of a technological component to support ISMS for the detection of obfuscation in computer worm...

9
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... of the Hexor Mobile Robot -- Improving the Detection of Unknown Computer Worms Activity Using Active Learning...

10
by Carr, Jeffrey
Published 2012
O'Reilly Media
...When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small...