- DocumentAGISA Towards Automatic Generation of Infection Signaturestéléversé parMukan Kuzey
- DocumentNew Thoughts in Ring3 NT Rootkittéléversé parMukan Kuzey
- DocumentAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codetéléversé parMukan Kuzey
- DocumentA Self-reproducing Analoguetéléversé parMukan Kuzey
- DocumentA Plague of Viruses Biological, Computer and Marketingtéléversé parMukan Kuzey
- DocumentA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormstéléversé parMukan Kuzey
- DocumentA Dozen Dangerous Myths About Computer Virusestéléversé parMukan Kuzey
- DocumentA Cost Analysis of Typical Computer Viruses and Defensestéléversé parMukan Kuzey
- DocumentA Computational Model of Computer Virus Propagationtéléversé parMukan Kuzey
- DocumentA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededtéléversé parMukan Kuzey
- DocumentA Classification of Viruses Through Recursion Theoremstéléversé parMukan Kuzey
- DocumentA Bypass of Cohen's Impossibility Resulttéléversé parMukan Kuzey
- DocumentAn Architecture for Generating Semantic-Aware Signaturestéléversé parMukan Kuzey
- DocumentAn Email Worm Vaccine Architecturetéléversé parMukan Kuzey
- DocumentAn Epidemic Model of Mobile Phone Virustéléversé parMukan Kuzey
- DocumentAn Epidemiological Model of Virus Spread and Cleanuptéléversé parMukan Kuzey
- DocumentAn Evaluation of Two Host Based Intrusion Prevention Systemstéléversé parMukan Kuzey
- DocumentAn Internet-Worm Early Warning Systemtéléversé parMukan Kuzey
- DocumentAn OS Independent Heuristics-based Worm-containment Systemtéléversé parMukan Kuzey
- DocumentAn Overview of Unix Rootkitstéléversé parMukan Kuzey
- DocumentAn Undetectable Computer Virustéléversé parMukan Kuzey
- DocumentAnalysis and Detection of Computer Viruses and Wormstéléversé parMukan Kuzey
- DocumentAnalysis of a Scanning Model of Worm Propagationtéléversé parMukan Kuzey
- DocumentAnalysis of Rxbottéléversé parMukan Kuzey
- DocumentAnalysis of Virus Algorithmstéléversé parMukan Kuzey
- DocumentAnalysis of Web Application Worms and Virusestéléversé parMukan Kuzey
- DocumentAnalyzing Worms and Network Traffic Using Compressiontéléversé parMukan Kuzey
- DocumentAnatomy of a Semantic Virustéléversé parMukan Kuzey
- DocumentArtificial Immunity Using Constraint-based Detectorstéléversé parMukan Kuzey
- DocumentARTISTA a Network for ARTifical Immune SysTemstéléversé parMukan Kuzey
- DocumentASM-based Modelling of Self-Replicating Programstéléversé parMukan Kuzey
- DocumentAutomatically Generated Win32 Heuristic Virus Detectiontéléversé parMukan Kuzey
- DocumentSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logictéléversé parMukan Kuzey
- DocumentStatic Analysis of Binary Code to Isolate Malicious Behaviorstéléversé parMukan Kuzey
- DocumentMechanics of Self-reproductiontéléversé parMukan Kuzey
- DocumentMathematical Virusestéléversé parMukan Kuzey
- DocumentManaging Computer Viruses in a Groupware Environmenttéléversé parMukan Kuzey
- DocumentMalware Pattern Scanning Schemes Secure Against Black-box Analysistéléversé parMukan Kuzey
- DocumentStriking Similaritiestéléversé parMukan Kuzey
- DocumentStoned Bootkittéléversé parMukan Kuzey
- DocumentMetaAware Identifying Metamorphic Malwaretéléversé parMukan Kuzey
- DocumentPowerful Virus Hits Computerstéléversé parMukan Kuzey
- DocumentMobile Code Threats, Fact or Fictiontéléversé parMukan Kuzey
- DocumentMetaAware Identifying Metamorphic Malwaretéléversé parMukan Kuzey
- DocumentMalware Normalizationtéléversé parMukan Kuzey
- DocumentMeasuring and Modeling Computer Virus Prevalencetéléversé parMukan Kuzey
- DocumentMalware, Viruses and Log Visualisationtéléversé parMukan Kuzey
- DocumentMalware Research at SMUtéléversé parMukan Kuzey
- DocumentSlamdunktéléversé parMukan Kuzey