ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Morality and technology, or is it wrong to create and let loose a computer virus
Proceedings of the Twenty-Eighth Hawaii International Conference on System Sciences, vol.3
◽
10.1109/hicss.1995.375640
◽
2002
◽
Cited By ~ 1
Author(s):
U.E. Gattiker
◽
H. Kelley
Keyword(s):
Computer Virus
Download Full-text
Related Documents
Cited By
References
Computer virus
AccessScience
◽
10.1036/1097-8542.yb000330
◽
2015
◽
Keyword(s):
Computer Virus
Download Full-text
The Computer Virus: Infection, Removal, and Protection
10.21236/ada637045
◽
1993
◽
Author(s):
W. P. Murray
Keyword(s):
Virus Infection
◽
Computer Virus
Download Full-text
An Computer Virus Spreading Model with Delayed Quarantine in Internet
Proceedings of the 6th International Conference on Communication and Network Security - ICCNS '16
◽
10.1145/3017971.3017972
◽
2016
◽
Cited By ~ 1
Author(s):
Qiming Liu
◽
Changsong Deng
Keyword(s):
Computer Virus
◽
Spreading Model
◽
Virus Spreading
Download Full-text
Mathematical Analysis and Design of the Nonstandard Computational Method for an Epidemic Model of Computer Virus with Delay Effect: Application of Mathematical Biology in Computer Science
Results in Physics
◽
10.1016/j.rinp.2020.103750
◽
2020
◽
pp. 103750
Author(s):
Ali Raza
◽
Umbreen Fatima
◽
Muhammad Rafiq
◽
Nauman Ahmed
◽
Ilyas Khan
◽
...
Keyword(s):
Mathematical Biology
◽
Computer Science
◽
Mathematical Analysis
◽
Epidemic Model
◽
Computer Virus
◽
Computational Method
◽
Delay Effect
◽
Analysis And Design
Download Full-text
Adequacy of checksum algorithms for computer virus detection
ACM SIGICE Bulletin
◽
10.1145/122459.122462
◽
1991
◽
Vol 17
(1)
◽
pp. 27-29
Author(s):
Doug Varney
Keyword(s):
Virus Detection
◽
Computer Virus
Download Full-text
ID-based authentication system for computer virus detection
Electronics Letters
◽
10.1049/el:19900756
◽
1990
◽
Vol 26
(15)
◽
pp. 1169
◽
Cited By ~ 4
Author(s):
E. Okamoto
◽
H. Masumoto
Keyword(s):
Virus Detection
◽
Computer Virus
◽
Authentication System
Download Full-text
Adequacy of checksum algorithms for computer virus detection
Proceedings of the 1990 ACM SIGSMALL/PC symposium on Small systems - SIGSMALL '90
◽
10.1145/99412.99494
◽
1990
◽
Cited By ~ 3
Author(s):
Doug Varney
Keyword(s):
Virus Detection
◽
Computer Virus
Download Full-text
A stochastic model for computer virus propagation
Journal of Dynamics & Games
◽
10.3934/jdg.2020010
◽
2020
◽
Vol 7
(2)
◽
pp. 163-174
Author(s):
Mario Lefebvre
◽
Keyword(s):
Stochastic Model
◽
Computer Virus
◽
Virus Propagation
Download Full-text
An Approximate Solution of a Computer Virus Model with Antivirus using Modified Differential Transform Method
International Journal of Engineering Research and
◽
10.17577/ijertv7is040077
◽
2018
◽
Vol V7
(04)
◽
Author(s):
Onwubuoya Cletus
◽
Keyword(s):
Approximate Solution
◽
Computer Virus
◽
Differential Transform Method
◽
Transform Method
◽
Differential Transform
◽
Virus Model
Download Full-text
The effect of computer virus occurrence and virus threat level on antivirus companies' financial performance
2004 IEEE International Engineering Management Conference (IEEE Cat. No.04CH37574)
◽
10.1109/iemc.2004.1407486
◽
2004
◽
Cited By ~ 1
Author(s):
J.R. Harrald
◽
S.A. Schmitt
◽
S. Shrestha
Keyword(s):
Financial Performance
◽
Computer Virus
◽
Threat Level
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close