Search alternatives:
computer worms » computer works, computer terms, computers work

1
Published 2014
Springer International Publishing
Table of Contents: ... Surfaces.-Computation Method of Processing Time based on BP Neural Network and Genetic Algorithm...

2
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Hash Location Service -- Accelerating the Propagation of Active Worms by Employing Multiple Target...

3
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network LifeCycle -- A...

4
by Marchette, David J.
Published 2001
Springer New York
Table of Contents: ... Monitoring -- 6 Computer Viruses and Worms -- 7 Trojan Programs and Covert Channels -- Appendix A WellKnown...

5
Published 2022
Springer International Publishing
Table of Contents: ... -- Construction of a technological component to support ISMS for the detection of obfuscation in computer worm...

6
by Salomon, David
Published 2006
Springer London
Table of Contents: ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...

7
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... for High Throughput Grid Computing -- High Performance Task Scheduling Algorithm for Heterogeneous...

8
by Salomon, David
Published 2010
Springer London
Table of Contents: ...Physical Security -- Viruses -- Worms -- Trojan Horses -- Examples of Malware -- Prevention...

9
Published 2018
Springer International Publishing
Table of Contents: ...Web system for visualization of weather data of the hydrometeorological network ofTungurahua...

10
by Aycock, John
Published 2006
Springer US
Table of Contents: ...-Virus Techniques -- Weaknesses Exploited -- Worms -- Deworming -- “Applications” -- People...

11
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced...

12
Published 2009
Springer US
Table of Contents: ... -- DecisionRules: A Metamodel to Organize Information -- A Computerized Solution for the Financial Diagnose...

13
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... in the WCDMA LCR-TDD System -- Active Worm Propagation in Hierarchical Peer-to-Peer Network Management Systems...

14
Published 2009
Springer Netherlands
Table of Contents: ... Computational Model of Biology -- Patient Monitoring: Wearable Device for Patient Monitoring -- Face Recognition...

15
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... (IPW) -- Workshop on Human Computer Interface for Semantic Web and Web Applications (HCI-SWWA...

16 Table of Contents: ... -- Attacking Computer Systems and Networks -- Advanced Persistent Threat -- Password Attacks -- Chapter 15...

17
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... Minimal Domination Protocol in an Arbitrary Network Graph -- Decomposable Algorithms for Computing Minimum...

18
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Plenary Talk I -- The Distributed Sensor Networks – An Emerging Technology -- Distributed Computing...

19
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Analogy or Loose Metaphor? -- Epidemic Spreading of Computer Worms in Fixed Wireless Networks -- Wireless...

20
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Reconfigurable Gate Array VLSI -- PISC: Polymorphic Instruction Set Computers -- Networks and Communication...