Search alternatives:
computer worlds » computer works, computer worms, computer word
computer world » computer word, computer works, computer worms
computer worm » computer worms, computer word, computer work

1
by Smith, Roderick W.
Published 2005
O'Reilly
Subjects: ...Operating systems (Computers) / http://id.loc.gov/authorities/subjects/sh85094982...

2
Published 2022
Springer Nature Singapore
Table of Contents: ... of Scalable Multi-Agent Systems using Parallel Theatre -- Dynamics of Epidemic Computer Subnetwork Models...

3
by Salomon, David
Published 2010
Springer London
Table of Contents: ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...

4
by Slade, Robert
Published 1996
Springer New York
Table of Contents: ... and Data Protection -- A Short Course on Computer Viruses -- Computers under Attack: Intruders, Worms...

5
Published 2017
Springer International Publishing
Table of Contents: ... of Strategy Games on Physarum Machines -- Computing a Worm: Reverse-Engineering Planarian Regeneration...

6
Published 2018
Springer International Publishing
Table of Contents: ... for Local Blur-Scale Computation and Edge Detection -- Semantic Segmentation by Integrating Classifiers...

7
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ..., and worms, oh my! -- Attack on the data-eating zombies -- Don't get too attached -- Friends don't let...

8 Table of Contents: ... Gateway -- Mail Encryption -- Instant Messaging -- Chapter 17 Review -- Chapter 18 Cloud Computing...

9
Published 2006
Springer US
Table of Contents: ... Networks -- Agent-Based Self-Management of MPLS DiffServ-TE domain -- NSME: A Framework for Network Worm...

10
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Reconfigurable Gate Array VLSI -- PISC: Polymorphic Instruction Set Computers -- Networks and Communication...

11
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ...5.Fault Tolerance against Crash Failures in Cloud Computing -- 6.Fault Tolerance against Byzantine...

12
by López-Estrada, Francisco Ronay
Published 2021
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...worm robot...

13
Published 2009
Springer Netherlands
Table of Contents: ... Computational Model of Biology -- Patient Monitoring: Wearable Device for Patient Monitoring -- Face Recognition...

14
by Grossman, Jeremiah
Published 2007
Syngress
Table of Contents: .... Exploit Frameworks; Chapter 8. XSS Worms; Chapter 9. Preventing XSS Attacks; Appendix A The Owned List...

15
by Wade, Todd
Published 2022
BCS, The Chartered Institute for IT
Subjects: ...Computer viruses, Trojans and worms / thema...

16
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...Keynote Presentation -- Multiscale Modeling and Simulation of Worm Effects on the Internet Routing...

17
Published 2023
Springer Nature Switzerland
Table of Contents: ... of a delayed SVEIS worm propagation model with nonlinear incidence rate -- Fractional Order Computing...

18
Published 2014
Springer India
Table of Contents: ...-insulated Signcryption -- Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine...

19
by Miller, Preston, Bryce, Chapin
Published 2019
Packt Publishing
Subjects: ...Computer viruses, Trojans & worms / bicssc...

20
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Services in Digital 3D Worlds -- Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from...