Author:
Filiol Eric,Helenius Marko,Zanero Stefano
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI;Annual Computer Security Applications Conference;2023-12-04
2. The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes;Journal of Computer Virology and Hacking Techniques;2021-05-17
3. The Blockchain Potential in Computer Virology;Proceedings of the 6th International Conference on Information Systems Security and Privacy;2020
4. Malware Propagation and Control in Internet of Things;Security and Privacy in Internet of Things (IoTs);2016-04-06
5. Mathematical model on vulnerability characterization and its impact on network epidemics;International Journal of System Assurance Engineering and Management;2016-03-14