- DocumentAGISA Towards Automatic Generation of Infection Signaturesîncărcat deMukan Kuzey
- DocumentNew Thoughts in Ring3 NT Rootkitîncărcat deMukan Kuzey
- DocumentAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codeîncărcat deMukan Kuzey
- DocumentA Self-reproducing Analogueîncărcat deMukan Kuzey
- DocumentA Plague of Viruses Biological, Computer and Marketingîncărcat deMukan Kuzey
- DocumentA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormsîncărcat deMukan Kuzey
- DocumentA Dozen Dangerous Myths About Computer Virusesîncărcat deMukan Kuzey
- DocumentA Cost Analysis of Typical Computer Viruses and Defensesîncărcat deMukan Kuzey
- DocumentA Computational Model of Computer Virus Propagationîncărcat deMukan Kuzey
- DocumentA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededîncărcat deMukan Kuzey
- DocumentA Classification of Viruses Through Recursion Theoremsîncărcat deMukan Kuzey
- DocumentA Bypass of Cohen's Impossibility Resultîncărcat deMukan Kuzey
- DocumentAn Architecture for Generating Semantic-Aware Signaturesîncărcat deMukan Kuzey
- DocumentAn Email Worm Vaccine Architectureîncărcat deMukan Kuzey
- DocumentAn Epidemic Model of Mobile Phone Virusîncărcat deMukan Kuzey
- DocumentAn Epidemiological Model of Virus Spread and Cleanupîncărcat deMukan Kuzey
- DocumentAn Evaluation of Two Host Based Intrusion Prevention Systemsîncărcat deMukan Kuzey
- DocumentAn Internet-Worm Early Warning Systemîncărcat deMukan Kuzey
- DocumentAn OS Independent Heuristics-based Worm-containment Systemîncărcat deMukan Kuzey
- DocumentAn Overview of Unix Rootkitsîncărcat deMukan Kuzey
- DocumentAn Undetectable Computer Virusîncărcat deMukan Kuzey
- DocumentAnalysis and Detection of Computer Viruses and Wormsîncărcat deMukan Kuzey
- DocumentAnalysis of a Scanning Model of Worm Propagationîncărcat deMukan Kuzey
- DocumentAnalysis of Rxbotîncărcat deMukan Kuzey
- DocumentAnalysis of Virus Algorithmsîncărcat deMukan Kuzey
- DocumentAnalysis of Web Application Worms and Virusesîncărcat deMukan Kuzey
- DocumentAnalyzing Worms and Network Traffic Using Compressionîncărcat deMukan Kuzey
- DocumentAnatomy of a Semantic Virusîncărcat deMukan Kuzey
- DocumentArtificial Immunity Using Constraint-based Detectorsîncărcat deMukan Kuzey
- DocumentARTISTA a Network for ARTifical Immune SysTemsîncărcat deMukan Kuzey
- DocumentASM-based Modelling of Self-Replicating Programsîncărcat deMukan Kuzey
- DocumentAutomatically Generated Win32 Heuristic Virus Detectionîncărcat deMukan Kuzey
- DocumentSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logicîncărcat deMukan Kuzey
- DocumentStatic Analysis of Binary Code to Isolate Malicious Behaviorsîncărcat deMukan Kuzey
- DocumentMechanics of Self-reproductionîncărcat deMukan Kuzey
- DocumentMathematical Virusesîncărcat deMukan Kuzey
- DocumentManaging Computer Viruses in a Groupware Environmentîncărcat deMukan Kuzey
- DocumentMalware Pattern Scanning Schemes Secure Against Black-box Analysisîncărcat deMukan Kuzey
- DocumentStriking Similaritiesîncărcat deMukan Kuzey
- DocumentStoned Bootkitîncărcat deMukan Kuzey
- DocumentMetaAware Identifying Metamorphic Malwareîncărcat deMukan Kuzey
- DocumentPowerful Virus Hits Computersîncărcat deMukan Kuzey
- DocumentMobile Code Threats, Fact or Fictionîncărcat deMukan Kuzey
- DocumentMetaAware Identifying Metamorphic Malwareîncărcat deMukan Kuzey
- DocumentMalware Normalizationîncărcat deMukan Kuzey
- DocumentMeasuring and Modeling Computer Virus Prevalenceîncărcat deMukan Kuzey
- DocumentMalware, Viruses and Log Visualisationîncărcat deMukan Kuzey
- DocumentMalware Research at SMUîncărcat deMukan Kuzey
- DocumentSlamdunkîncărcat deMukan Kuzey