ISW '99 Proceedings of the Second International Workshop on Information Security
Cautious virus detection in the extreme
Proceedings of the 2007 workshop on Programming languages and analysis for security
A semantics-based approach to malware detection
ACM Transactions on Programming Languages and Systems (TOPLAS)
A Classification of Viruses Through Recursion Theorems
CiE '07 Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World
Computer viruses as artificial life
Artificial Life
Can we certify systems for freedom from malware
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Cryptovirology: extortion-based security threats and countermeasures
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Evolvable viral agent modeling and exploration
ICONIP'06 Proceedings of the 13th international conference on Neural information processing - Volume Part III
A new N-gram feature extraction-selection method for malicious code
ICANNGA'11 Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II
Hunting distributed malware with the κ-calculus
FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
A secure smartphone applications roll-out scheme
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Modeling viral agents and their dynamics with persistent turing machines and cellular automata
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Malware: from modelling to practical detection
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Toward an abstract computer virology
ICTAC'05 Proceedings of the Second international conference on Theoretical Aspects of Computing
Hi-index | 0.00 |