- DocumentoAGISA Towards Automatic Generation of Infection Signaturescaricato daMukan Kuzey
- DocumentoNew Thoughts in Ring3 NT Rootkitcaricato daMukan Kuzey
- DocumentoAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codecaricato daMukan Kuzey
- DocumentoA Self-reproducing Analoguecaricato daMukan Kuzey
- DocumentoA Plague of Viruses Biological, Computer and Marketingcaricato daMukan Kuzey
- DocumentoA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormscaricato daMukan Kuzey
- DocumentoA Dozen Dangerous Myths About Computer Virusescaricato daMukan Kuzey
- DocumentoA Cost Analysis of Typical Computer Viruses and Defensescaricato daMukan Kuzey
- DocumentoA Computational Model of Computer Virus Propagationcaricato daMukan Kuzey
- DocumentoA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededcaricato daMukan Kuzey
- DocumentoA Classification of Viruses Through Recursion Theoremscaricato daMukan Kuzey
- DocumentoA Bypass of Cohen's Impossibility Resultcaricato daMukan Kuzey
- DocumentoAn Architecture for Generating Semantic-Aware Signaturescaricato daMukan Kuzey
- DocumentoAn Email Worm Vaccine Architecturecaricato daMukan Kuzey
- DocumentoAn Epidemic Model of Mobile Phone Viruscaricato daMukan Kuzey
- DocumentoAn Epidemiological Model of Virus Spread and Cleanupcaricato daMukan Kuzey
- DocumentoAn Evaluation of Two Host Based Intrusion Prevention Systemscaricato daMukan Kuzey
- DocumentoAn Internet-Worm Early Warning Systemcaricato daMukan Kuzey
- DocumentoAn OS Independent Heuristics-based Worm-containment Systemcaricato daMukan Kuzey
- DocumentoAn Overview of Unix Rootkitscaricato daMukan Kuzey
- DocumentoAn Undetectable Computer Viruscaricato daMukan Kuzey
- DocumentoAnalysis and Detection of Computer Viruses and Wormscaricato daMukan Kuzey
- DocumentoAnalysis of a Scanning Model of Worm Propagationcaricato daMukan Kuzey
- DocumentoAnalysis of Rxbotcaricato daMukan Kuzey
- DocumentoAnalysis of Virus Algorithmscaricato daMukan Kuzey
- DocumentoAnalysis of Web Application Worms and Virusescaricato daMukan Kuzey
- DocumentoAnalyzing Worms and Network Traffic Using Compressioncaricato daMukan Kuzey
- DocumentoAnatomy of a Semantic Viruscaricato daMukan Kuzey
- DocumentoArtificial Immunity Using Constraint-based Detectorscaricato daMukan Kuzey
- DocumentoARTISTA a Network for ARTifical Immune SysTemscaricato daMukan Kuzey
- DocumentoASM-based Modelling of Self-Replicating Programscaricato daMukan Kuzey
- DocumentoAutomatically Generated Win32 Heuristic Virus Detectioncaricato daMukan Kuzey
- DocumentoSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logiccaricato daMukan Kuzey
- DocumentoStatic Analysis of Binary Code to Isolate Malicious Behaviorscaricato daMukan Kuzey
- DocumentoMechanics of Self-reproductioncaricato daMukan Kuzey
- DocumentoMathematical Virusescaricato daMukan Kuzey
- DocumentoManaging Computer Viruses in a Groupware Environmentcaricato daMukan Kuzey
- DocumentoMalware Pattern Scanning Schemes Secure Against Black-box Analysiscaricato daMukan Kuzey
- DocumentoStriking Similaritiescaricato daMukan Kuzey
- DocumentoStoned Bootkitcaricato daMukan Kuzey
- DocumentoMetaAware Identifying Metamorphic Malwarecaricato daMukan Kuzey
- DocumentoPowerful Virus Hits Computerscaricato daMukan Kuzey
- DocumentoMobile Code Threats, Fact or Fictioncaricato daMukan Kuzey
- DocumentoMetaAware Identifying Metamorphic Malwarecaricato daMukan Kuzey
- DocumentoMalware Normalizationcaricato daMukan Kuzey
- DocumentoMeasuring and Modeling Computer Virus Prevalencecaricato daMukan Kuzey
- DocumentoMalware, Viruses and Log Visualisationcaricato daMukan Kuzey
- DocumentoMalware Research at SMUcaricato daMukan Kuzey
- DocumentoSlamdunkcaricato daMukan Kuzey