Author:
Katsikas Sokratis,Spyrou Thomas,Gritzalis Dimitris,Darzentas John
Subject
Computer Networks and Communications
Reference18 articles.
1. Computational aspects of computer viruses;Cohen;Computers & Security,1989
2. Computer viruses;Cohen,1985
3. Computer viruses: Theory and experiments;Cohen;Computers & Security,1987
4. An abstract theory of computer viruses;Adleman,1990
5. Directed graph epidemiological models of computer viruses;Kephart,1991
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?;2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing;2013-12
2. Propagation Model of Mobile Phone Virus Based on Efficiency of Immunization;2008 International Conference on MultiMedia and Information Technology;2008-12
3. The Cascade Vulnerability Problem for Open Distributed Systems: A Review;Reliability, Quality and Safety of Software-Intensive Systems;1997