The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for virus with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1983 (15) 1984-1988 (32) 1989 (19) 1990 (16) 1991-1992 (17) 1993-1994 (16) 1995-1996 (23) 1997-1998 (29) 1999 (17) 2000 (24) 2001 (26) 2002 (31) 2003 (45) 2004 (79) 2005 (102) 2006 (133) 2007 (126) 2008 (125) 2009 (135) 2010 (97) 2011 (94) 2012 (78) 2013 (97) 2014 (104) 2015 (95) 2016 (80) 2017 (120) 2018 (113) 2019 (138) 2020 (175) 2021 (222) 2022 (170) 2023 (160) 2024 (24)
Publication types (Num. hits)
article(1567) book(3) data(6) incollection(6) inproceedings(1176) phdthesis(19)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 868 occurrences of 557 keywords

Results
Found 2777 publication records. Showing 2777 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Harold Joseph Highland Datacrime virus and new anti-virus products. Search on Bibsonomy Comput. Secur. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
24Harold Joseph Highland How to test a virus filter without a virus. Search on Bibsonomy Comput. Secur. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
24A. D. Sagar, L. A. Pickering, P. Sussman-Berger, W. E. Stewart II, P. B. Sehgal Heterogeneity of interferon mRNA species from Sendai virus-induced human lymphoblastoid (Namalva) cells and Newcastle disease virus- induced murine fibroblastoid (L) cells. Search on Bibsonomy Nucleic Acids Res. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
24P. M. Chumakov Transcription of the viral genome in cell lines transformed by simian virus 40. I. Mapping of virus-specific nuclear RNAs. Search on Bibsonomy Nucleic Acids Res. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
21Philippe Beaucamps Extended recursion-based formalization of virus mutation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ángel Martín del Rey A Computer Virus Spread Model Based on Cellular Automata on Graphs. Search on Bibsonomy IWANN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Patrick Kua BIOHAZARD - Engineering the Change Virus. Search on Bibsonomy XP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF agile patterns, Change, influence, organisational change
21William J. Godinez, Marko Lampe, Stefan Wörz, Barbara Müller, Roland Eils, Karl Rohr Probabilistic Tracking of Virus Particles in Fluorescence Microscopy Image Sequences. Search on Bibsonomy Bildverarbeitung für die Medizin The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21William J. Godinez, Marko Lampe, Stefan Wörz, Barbara Müller, Roland Eils, Karl Rohr Probabilistic tracking of virus particles in fluorescence microscopy images. Search on Bibsonomy ISBI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Yili Zheng, Peter C. Doerschuk A parallel software toolkit for statistical 3-D virus reconstructions from cryo electron microscopy images using computer clusters with multi-core shared-memory nodes. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Zheng Rong Yang A Probabilistic Peptide Machine for Predicting Hepatitis C Virus Protease Cleavage Sites. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21William J. Godinez, Marko Lampe, Stefan Wörz, Barbara Müller, Roland Eils, Karl Rohr Tracking of Virus Particles in Time-Lapse Fluorescence Microscopy Image Sequences. Search on Bibsonomy Bildverarbeitung für die Medizin The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21William J. Godinez, Marko Lampe, Stefan Wörz, Barbara Müller, Roland Eils, Karl Rohr Tracking of Virus Particles in Time-Lapse Fluorescence Microscopy Image Sequences. Search on Bibsonomy ISBI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Guang-Zheng Zhang, Kyungsook Han Discovering Inter-Domain Paths between Hepatitis C Virus NS5A and Human Liver Proteins. Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Chen Yu 0005, Dan C. Marinescu, John P. Morrison, Brian C. Clayton, David A. Power An Automated Data Processing Pipeline for Virus Structure Determination at High Resolution. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Nuanwan Soonthornphisaj, Supakpong Jinaratana, Taweesak Tanwandee, Masayuki Numao Knowledge Discovery for Hepatitis C Virus Diagnosis: A Framework for Mining Interesting Classification Rules. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Interesting Classification rules, time-series, Data Abstraction
21Qun Zhou A Service-Oriented Solution Framework for Distributed Virus Detection and Vulnerability Remediation (VDVR) System. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Sarah Gordon Understanding the Adversary: Virus Writers and Beyond. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Marc Stiegler, Alan H. Karp, Ka-Ping Yee, Tyler Close, Mark S. Miller Polaris: virus-safe computing for Windows XP. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Feng-Mao Lin, Hsien-Da Huang, Y.-C. Chang, Ann-Ping Tsou, P.-L. Chan, L.-C. Wu, Meng-Feng Tsai, Jorng-Tzong Horng Database to Dynamically Aid Probe Design for Virus Identification. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Olivier Henchiri, Nathalie Japkowicz A Feature Selection and Evaluation Scheme for Computer Virus Detection. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Siu-Yeung Cho, Peh-Ti Lim A novel Virus Infection Clustering for Flower Images Identification. Search on Bibsonomy ICPR (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié Thresholds for virus spread on networks. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SIR epidemic, largest connected component, random graphs, spectral radius
21Peter I. Cowling, Munir Hussain Naveed, M. Alamgir Hossain A Coevolutionary Model for The Virus Game. Search on Bibsonomy CIG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Frank H. Katz Campus-wide spyware and virus removal as a method of teaching information security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security awareness programs, design, information security, information security education
21Yongchang Ji, Dan C. Marinescu Rotational and Translational Alignment Errors in 3D Reconstruction of Virus Structures at High Resolution. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Shin-Jia Hwang, Kuang-Hsi Chen A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Tao Li 0016, XiaoJie Liu, Hongbin Li 0001 An Immune-Based Model for Computer Virus Detection. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Il-Seop Song, Youngseok Lee 0002, Taeck-Geun Kwon A Multi-gigabit Virus Detection Algorithm Using Ternary CAM. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF content inspection, network security, pattern matching, Deep packet inspection, TCAM
21Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi Reducing Worm Detection Time and False Alarm in Virus Throttling. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Terry Costlow Digital Postmark Helps Fight Spam, Virus Attacks. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Dan Xu, Xiang Li 0010, Xiao Fan Wang 0001 Mechanisms for spreading of computer virus on the Internet: an overview. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Yan Ding, Hong Cao, Shu Wen VirusFinder: A Web-Based Virus Identification System Using Viral Nucleotide Signatures. Search on Bibsonomy CSB The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21A. Fazel Famili, Junjun Ouyang, Marko Kryworuchko, Ikuri Alvarez-Maya, Brandon Smith, Francisco Diaz-Mitoma Knowledge Discovery in Hepatitis C Virus Transgenic Mice. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Robert E. Lynch, Yongchang Ji, Dan C. Marinescu, Hong Lin A Parallel 3D Piecewise Constant Reconstruction Algorithm for Asymmetric Virus Structures. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Djamel Brahmi, Camille Serruys, Alain Giron, Bernard Fertil, Nathalie Cassoux, Phuc Lehoang Segmentation of Virus-Infected areas in Retinal Angiograms Using a Learning-by-Sample Approach. Search on Bibsonomy IJCNN (1) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Jan J. Mulawka, Piotr Wasiewicz, Katarzyna Pietak Virus-Enhanced Genetic Algorithms Inspired by DNA Computing. Search on Bibsonomy ISMIS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Vladimir A. Golovko, Sergei V. Bezobrazov, Pavel Kachurka, Leanid U. Vaitsekhovich Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. Search on Bibsonomy Advances in Machine Learning II The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Pradip De, Yonghe Liu, Sajal K. Das 0001 An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Rodica Mihai, Morten Mjelde A Self-stabilizing Algorithm for Graph Searching in Trees. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Guylaine Poisson, Mahdi Belcaid, Anne Bergeron Comparative Genomics and Extensive Recombinations in Phage Communities. Search on Bibsonomy RECOMB-CG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Anil Sorathiya, Pietro Liò, Luca Sguanci Mathematical Model of HIV Superinfection and Comparative Drug Therapy. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF viral dynamics, quasispecies, coinfection, superinfection, HAART, Maraviroc, Zinc-finger nucleases, HIV
18S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq Malware detection using statistical analysis of byte-level file content. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computer malware, data mining, forensics
18Kazuya Sata, Kouichi Hirata, Kimihito Ito, Tetsuji Kuboyama Discovering Networks for Global Propagation of Influenza A (H3N2) Viruses by Clustering. Search on Bibsonomy KES (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Deepayan Chakrabarti, Yang Wang 0008, Chenxi Wang, Jure Leskovec, Christos Faloutsos Epidemic thresholds in real networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Viral propagation, eigenvalue, epidemic threshold
18Paola Flocchini, Bernard Mans, Nicola Santoro Tree Decontamination with Temporary Immunity. Search on Bibsonomy ISAAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network decontamination, antiviral agents, distributed algorithm, mobile agents, tree networks
18Ian Castle, Eimear Buckley The Automatic Discovery, Identification and Measurement of Botnets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Yan Zhou, W. Meador Inge Malware detection using adaptive data compression. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF statistical data compression, machine learning, malware detection
18Yan Wu 0002, Gary Kee Khoon Lee, Xiuju Fu, Harold Soh, Terence Hung Mining Weather Information in Dengue Outbreak: Predicting Future Cases Based on Wavelet, SVM and GA. Search on Bibsonomy World Congress on Engineering (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dengue fever modelling, data mining, SVM, wavelet, infectious disease
18Chun Wei, Alan P. Sprague, Gary Warner Detection of networks blocks used by the Storm Worm botnet. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensic analysis, cyber crime
18Kelly Westbrooks, Irina Astrovskaya, David S. Campo, Yuri Khudyakov, Piotr Berman, Alexander Zelikovsky HCV Quasispecies Assembly Using Network Flows. Search on Bibsonomy ISBRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov Learning and Classification of Malware Behavior. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Amit Vasudevan MalTRAK: Tracking and Eliminating Unknown Malware. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Edmund B. Nightingale, Daniel Peek, Peter M. Chen, Jason Flinn Parallelizing security checks on commodity hardware. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, performance, parallel, operating systems, speculative execution
18Yu Wang 0019, Feng Lin, Hongyi Wu Cross-layer protocol design for delay/fault-tolerant mobile sensor networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Junghoon Lee, Peter C. Doerschuk, John E. Johnson Exact Reduced-Complexity Maximum Likelihood Reconstruction of Multiple 3-D Objects From Unlabeled Unoriented 2-D Projections and Electron Microscopy of Viruses. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Antonio Miguel Mora, Juan Julián Merelo Guervós, Carlos Briones, Federico Morán, Juan Luis Jiménez Laredo Clustering and Visualizing HIV Quasispecies Using Kohonen's Self-Organizing Maps. Search on Bibsonomy IWANN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. Search on Bibsonomy CIDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Radu Dobrescu, Loretta Ichim Fractal Dimension of Mie Scattering Spectra for the Appraisal of Infected HeLa Cells in Cultures. Search on Bibsonomy BIBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici Improving the Detection of Unknown Computer Worms Activity Using Active Learning. Search on Bibsonomy KI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malcode Detection, Classification, Support Vector Machines, Active Learning
18Abhishek Karnik, Suchandra Goswami, Ratan K. Guha Detecting Obfuscated Viruses Using Cosine Similarity Analysis. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Carlotta Orsenigo, Carlo Vercellis Predicting HIV Protease-Cleavable Peptides by Discrete Support Vector Machines. Search on Bibsonomy EvoBIO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HIV protease, cleavable peptides prediction, discrete support vector machines
18Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti E-Risk Management through Self Insurance: An Option Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-risk, option model, self-insurance, e-commerce, security breach
18Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici Host Based Intrusion Detection using Machine Learning. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii Simplified Network Management with DACS Scheme. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum RFID malware: truth vs. myth. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Ilhan Kaya, Taskin Koçak A Low Power Lookup Technique for Multi-Hashing Network Applications. Search on Bibsonomy ISVLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Honghai Feng, Hao Xu, Baoyan Liu, Bingru Yang, Zhuye Gao, Yueli Li Using Rough Set to Find the Factors That Negate the Typical Dependency of a Decision Attribute on Some Condition Attributes. Search on Bibsonomy IDEAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Jianping Guo, Yong Xue, Shaobo Zhong, Chunxiang Cao, Wuchun Cao, Xiaowen Li 0001, Liqun Fang Preliminary Study of Avian Influenza A Infection Using Remote Sensing and GIS Techniques. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Chaur-Chin Chen, Cheng-Yan Kao, Chun-Fan Chang, Hsueh-Ting Chu, Chiung-Nien Chen Simple Software for Microarray Image Analysis. Search on Bibsonomy CRV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fisher criterion, M-A plot, dendrogram, cDNA microarray
18Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-risk, premium, e-commerce, Bayesian Belief Network (BBN), copula, security breach
18Luca Sguanci, Pietro Liò, Franco Bagnoli Modeling Evolutionary Dynamics of HIV Infection. Search on Bibsonomy CMSB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Ruijuan Zheng, Huiqiang Wang A Computer Immune System: LAN Immune System Model based on Host (LISMH). Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Stefan Dziembowski On Forward-Secure Storage. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Daniel Reynaud-Plantey New threats of Java viruses. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18James Aspnes, Kevin L. Chang, Aleksandr Yampolskiy Inoculation strategies for victims of viruses and the sum-of-squares partition problem. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
18Noam Berger, Christian Borgs, Jennifer T. Chayes, Amin Saberi On the spread of viruses on the internet. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
18Janice G. El-Bayoumi Leveraging student owned laptops on campus: I can't connect to the network. can you help me? Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, support, help desk, customer service, laptops
18Jitimon Keinduangjun, Punpiti Piamsa-nga, Yong Poovorawan Signature Recognition Methods for Identifying Influenza Sequences. Search on Bibsonomy AIME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Keisuke Ishibashi, Tsuyoshi Toyono, Hirotaka Matsuoka, Katsuyasu Toyama, Masahiro Ishino, Chika Yoshimura, Takehiro Ozaki, Yuichi Sakamoto, Ichiro Mizukoshi Measurement of DNS Traffic Caused by DDoS Attacks. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18James W. Mickens, Brian D. Noble Modeling epidemic spreading in mobile environments. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF proximity attacks, mobile networks, computer viruses
18Boyun Zhang, Jianping Yin, Jingbo Hao Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. Search on Bibsonomy FSKD (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Hai Jin 0001, Zhiling Yang, Jianhua Sun 0002, Xuping Tu, Zongfen Han CIPS: Coordinated Intrusion Prevention System. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Peder Jungck, Simon S. Y. Shim Issues in High-Speed Internet Security. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Mitsuru Akashi, Takami Akagi, Tatsuo Kaneko, Masanori Baba, Masanori Hayami Anti-Retroviral Vaccine Using Polymeric Nanoparticles. Search on Bibsonomy ICMENS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Eyob Teweldemedhin, Tshilidzi Marwala, Conrad Mueller Agent-Based Modelling: A Case Study in HIV Epidemic. Search on Bibsonomy HIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Alexander Bockmayr, Arnaud Courtois, Damien Eveillard, M. Vezain Building and Analysing an Integrative Model of HIV-1 RNA Alternative Splicing. Search on Bibsonomy CMSB The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Kihun Chong, Ha Yoon Song, Sam H. Noh Traffic Characterization of the Web Server Attacks of Worm Viruses. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Greg Hoglund, Gary McGraw Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software. Search on Bibsonomy IEEE Softw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Matthew M. Williamson Throttling Viruses: Restricting propagation to defeat malicious mobile code. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Niko Beerenwinkel, Barbara Schmidt, Hauke Walter, Rolf Kaiser, Thomas Lengauer, Daniel Hoffmann, Klaus Korn, Joachim Selbig Geno2pheno: Interpreting Genotypic HIV Drug Resistance Tests. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Adam L. Young, Moti Yung Cryptovirology: Extortion-Based Security Threats and Countermeasures. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Ran Canetti, Amir Herzberg Maintaining Security in the Presence of Transient Faults. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15Noriaki Yoshikai, Shun-ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata Experimental Research on Personal Awareness and Behavior for Information Security Protection. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF virus infection, DDos, normalcy bias, psychology, botnet, virtual game
15Brijesh Kumar, Constantine Katsinis A Network Based Approach to Malware Detection in Large IT Infrastructures. Search on Bibsonomy NCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF host security, distributed virus detection, malware detection, Infrastructure security
Displaying result #201 - #300 of 2777 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license