Are handheld viruses a significant threat?
Communications of the ACM
Companion Viruses and the Macintosh: Threats and Countermeasures
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Resilient infrastructure for network security
Complexity - Special issue: Resilient and adaptive defense of computing networks
IEEE Security and Privacy
Encyclopedia of Computer Science
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection
Journal of Computer Security
Code Normalization for Self-Mutating Malware
IEEE Security and Privacy
ACM SIGCAS Computers and Society
Distributed strategic interleaving with load balancing
Future Generation Computer Systems
Detecting self-mutating malware using control-flow graph matching
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Research: Model for network behaviour under viral attack
Computer Communications
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.02 |