- ДокументAGISA Towards Automatic Generation of Infection Signaturesзагружено:Mukan Kuzey
- ДокументNew Thoughts in Ring3 NT Rootkitзагружено:Mukan Kuzey
- ДокументAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codeзагружено:Mukan Kuzey
- ДокументA Self-reproducing Analogueзагружено:Mukan Kuzey
- ДокументA Plague of Viruses Biological, Computer and Marketingзагружено:Mukan Kuzey
- ДокументA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormsзагружено:Mukan Kuzey
- ДокументA Dozen Dangerous Myths About Computer Virusesзагружено:Mukan Kuzey
- ДокументA Cost Analysis of Typical Computer Viruses and Defensesзагружено:Mukan Kuzey
- ДокументA Computational Model of Computer Virus Propagationзагружено:Mukan Kuzey
- ДокументA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededзагружено:Mukan Kuzey
- ДокументA Classification of Viruses Through Recursion Theoremsзагружено:Mukan Kuzey
- ДокументA Bypass of Cohen's Impossibility Resultзагружено:Mukan Kuzey
- ДокументAn Architecture for Generating Semantic-Aware Signaturesзагружено:Mukan Kuzey
- ДокументAn Email Worm Vaccine Architectureзагружено:Mukan Kuzey
- ДокументAn Epidemic Model of Mobile Phone Virusзагружено:Mukan Kuzey
- ДокументAn Epidemiological Model of Virus Spread and Cleanupзагружено:Mukan Kuzey
- ДокументAn Evaluation of Two Host Based Intrusion Prevention Systemsзагружено:Mukan Kuzey
- ДокументAn Internet-Worm Early Warning Systemзагружено:Mukan Kuzey
- ДокументAn OS Independent Heuristics-based Worm-containment Systemзагружено:Mukan Kuzey
- ДокументAn Overview of Unix Rootkitsзагружено:Mukan Kuzey
- ДокументAn Undetectable Computer Virusзагружено:Mukan Kuzey
- ДокументAnalysis and Detection of Computer Viruses and Wormsзагружено:Mukan Kuzey
- ДокументAnalysis of a Scanning Model of Worm Propagationзагружено:Mukan Kuzey
- ДокументAnalysis of Rxbotзагружено:Mukan Kuzey
- ДокументAnalysis of Virus Algorithmsзагружено:Mukan Kuzey
- ДокументAnalysis of Web Application Worms and Virusesзагружено:Mukan Kuzey
- ДокументAnalyzing Worms and Network Traffic Using Compressionзагружено:Mukan Kuzey
- ДокументAnatomy of a Semantic Virusзагружено:Mukan Kuzey
- ДокументArtificial Immunity Using Constraint-based Detectorsзагружено:Mukan Kuzey
- ДокументARTISTA a Network for ARTifical Immune SysTemsзагружено:Mukan Kuzey
- ДокументASM-based Modelling of Self-Replicating Programsзагружено:Mukan Kuzey
- ДокументAutomatically Generated Win32 Heuristic Virus Detectionзагружено:Mukan Kuzey
- ДокументSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logicзагружено:Mukan Kuzey
- ДокументStatic Analysis of Binary Code to Isolate Malicious Behaviorsзагружено:Mukan Kuzey
- ДокументMechanics of Self-reproductionзагружено:Mukan Kuzey
- ДокументMathematical Virusesзагружено:Mukan Kuzey
- ДокументManaging Computer Viruses in a Groupware Environmentзагружено:Mukan Kuzey
- ДокументMalware Pattern Scanning Schemes Secure Against Black-box Analysisзагружено:Mukan Kuzey
- ДокументStriking Similaritiesзагружено:Mukan Kuzey
- ДокументStoned Bootkitзагружено:Mukan Kuzey
- ДокументMetaAware Identifying Metamorphic Malwareзагружено:Mukan Kuzey
- ДокументPowerful Virus Hits Computersзагружено:Mukan Kuzey
- ДокументMobile Code Threats, Fact or Fictionзагружено:Mukan Kuzey
- ДокументMetaAware Identifying Metamorphic Malwareзагружено:Mukan Kuzey
- ДокументMalware Normalizationзагружено:Mukan Kuzey
- ДокументMeasuring and Modeling Computer Virus Prevalenceзагружено:Mukan Kuzey
- ДокументMalware, Viruses and Log Visualisationзагружено:Mukan Kuzey
- ДокументMalware Research at SMUзагружено:Mukan Kuzey
- ДокументSlamdunkзагружено:Mukan Kuzey