×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Viruses
Home
/
Discover
/
index-of.co.uk
/
Viruses
/
Parent Folder
A Bypass of Cohen's Impossibility Result.pdf
PDF
6 years ago
106.73 kB
Copy Link
A Classification of Viruses through Recursion Theorems.pdf
PDF
6 years ago
157.10 kB
Copy Link
A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed.pdf
PDF
6 years ago
1.01 MB
Copy Link
A Computational Model of Computer Virus Propagation.pdf
PDF
6 years ago
14.44 kB
Copy Link
A Computer Virus Is A Thought Manifested.pdf
PDF
6 years ago
5.64 kB
Copy Link
A Cooperative Immunization System for an Untrusting Internet.pdf
PDF
6 years ago
74.58 kB
Copy Link
A Cost Analysis of Typical Computer Viruses and Defenses.pdf
PDF
6 years ago
91.28 kB
Copy Link
A Critical Look at the Regulation of Computer Viruses.pdf
PDF
6 years ago
96.30 kB
Copy Link
A Distributed Approach against Computer Viruses Inspired by the Immune System.pdf
PDF
6 years ago
508.80 kB
Copy Link
A Dozen Dangerous Myths About Computer Viruses.pdf
PDF
6 years ago
109.39 kB
Copy Link
A Failure to Learn from the Past.pdf
PDF
6 years ago
94.73 kB
Copy Link
A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows.pdf
PDF
6 years ago
320.02 kB
Copy Link
A Feature Selection and Evaluation Scheme for Computer Virus Detection.pdf
PDF
6 years ago
229.89 kB
Copy Link
A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.pdf
PDF
6 years ago
139.08 kB
Copy Link
A Formal Definition of Computer Worms and Some Related Results.pdf
PDF
6 years ago
1.12 MB
Copy Link
A Framework for Deception.pdf
PDF
6 years ago
2.70 MB
Copy Link
A Framework to Detect Novel Computer Viruses via System Calls.pdf
PDF
6 years ago
310.65 kB
Copy Link
A Generic Virus Detection Agent on the Internet.pdf
PDF
6 years ago
559.65 kB
Copy Link
A Generic Virus Scanner in C .pdf
PDF
6 years ago
96.07 kB
Copy Link
A History Of Computer Viruses - Introduction.pdf
PDF
6 years ago
372.66 kB
Copy Link
A History Of Computer Viruses - The Famous `Trio'.pdf
PDF
6 years ago
1.29 MB
Copy Link
A History Of Computer Viruses - Three Special Viruses.pdf
PDF
6 years ago
790.07 kB
Copy Link
A Hybrid Model to Detect Malicious Executables.pdf
PDF
6 years ago
245.74 kB
Copy Link
A Hygiene Lesson.pdf
PDF
6 years ago
212.17 kB
Copy Link
A Mathematical Theory for the Spread of Computer Viruses.pdf
PDF
6 years ago
400.13 kB
Copy Link
A Memory Symptom-based Virus Detection Approach.pdf
PDF
6 years ago
167.43 kB
Copy Link
A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf
PDF
6 years ago
1.31 MB
Copy Link
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.pdf
PDF
6 years ago
266.24 kB
Copy Link
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations.pdf
PDF
6 years ago
337.68 kB
Copy Link
A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf
PDF
6 years ago
163.89 kB
Copy Link
A Network Worm Vaccine Architecture.pdf
PDF
6 years ago
70.60 kB
Copy Link
A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS.pdf
PDF
6 years ago
715.42 kB
Copy Link
A Pact with the Devil.pdf
PDF
6 years ago
106.28 kB
Copy Link
A Plague of Viruses Biological, Computer and Marketing.pdf
PDF
6 years ago
132.74 kB
Copy Link
A Potency Relation for Worms and Next-Generation Attack Tools.pdf
PDF
6 years ago
282.45 kB
Copy Link
A Proposed Taxonomy of Software Weapons.pdf
PDF
6 years ago
656.84 kB
Copy Link
A Public Health Approach to Preventing Malware Propagation.pdf
PDF
6 years ago
708.31 kB
Copy Link
A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig.pdf
PDF
6 years ago
11.75 kB
Copy Link
A Retrovirus Inspired Algorithm for Virus Detection & Optimization.pdf
PDF
6 years ago
343.34 kB
Copy Link
A Self-reproducing Analogue.pdf
PDF
6 years ago
304.47 kB
Copy Link
A Semantics-Based Approach to Malware Detection.pdf
PDF
6 years ago
343.99 kB
Copy Link
A Sense of 'Danger' for Windows Processes.pdf
PDF
6 years ago
273.55 kB
Copy Link
A Sense of Self for Unix Processes.pdf
PDF
6 years ago
68.12 kB
Copy Link
A Short Course on Computer Viruses.pdf
PDF
6 years ago
714.69 kB
Copy Link
A Short Visit to the Bot Zoo.pdf
PDF
6 years ago
742.15 kB
Copy Link
A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses.pdf
PDF
6 years ago
226.33 kB
Copy Link
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods.pdf
PDF
6 years ago
175.45 kB
Copy Link
A Study of Malcode-Bearing Documents.pdf
PDF
6 years ago
1.15 MB
Copy Link
A Survey of Cryptologic Issues in Computer Virology.pdf
PDF
6 years ago
270.89 kB
Copy Link
A Taxonomy of Computer Worms.pdf
PDF
6 years ago
100.26 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.