Author:
Murad Khurram,Shirazi Syed Noor-ul-Hassan,Zikria Yousaf Bin,Ikram Nassar
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Aycock, J.: Computer Viruses and malware, Springer Science+Business Media (2006)
2. Cohen, F.: Computer viruses: theory and experiments. Computer Security 6(1), 22–35 (1987)
3. Stamp, M.: Information Security: Principles and Practice (August 2005)
4. Walenstein, R., Mathur, M., Chouchane, R., Lakhotia, A.: The design space of metamorphic malware. In: Proceedings of the 2nd International Conference on Information Warfare (March 2007)
5. Borello, J., Me, L.: Code Obfuscation Techniques for Metamorphic Viruses (Feburary 2008),
http://www.springerlink.com/content/233883w3r2652537
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献