Top View
- Looking Towards the Future with Teachings from the Past
- Guide to Malware Incident Prevention and Handling
- VIRUS ANALYSIS 2 WE’RE ALL DOOMED Gabor Szappanos Virusbuster, Hungary
- Feature Extraction and Static Analysis for Large-Scale Detection of Malware Types and Families
- A Survey Paper on Malicious Computer Worms IB
- 10 Worst Computer Viruses of All Time 10 Worst Computer Viruses of All
- Technology Update Jonathan Phillippe David Babb, CPA
- Computer Worms: Past, Present, and Future Craig Fosnock CISSP, MCSE, CNE East Carolina University
- Cylance Ai Endpoint Platform Solutions
- Mydoom Worm 01.28.2004
- Strategies of Computer Worms
- Active Worms, Buffer Overflows, and BGP Attacks
- Report on Computer Worms and Viruses in 2004 by Christopher J
- Intractable Problems in Malware Analysis and Practical Solutions
- Malware: Malicious Software
- Setting a Worm Attack Warning by Using Machine Learning to Classify Netflow Data
- Malicious Computer Worms and Viruses: a Survey
- Understanding Worms, Their Behavior and Containing Them
- An Interactive Relaxation Approach for Anomaly Detection and Preventive Measures in Computer Networks
- Designing, Implementing, and Analyzing a System for Virus Detection
- Network Security -- Mydoom, Doomjuice, Win32/Doomjuice Worms and Dos/Ddos Attacks Hang Chau
- Security Considerations for a Vehicular Multimedia Architecture - from Use of Iot Perspective
- A Similarity Metric Method of Obfuscated Malware Using Function-Call Graph
- Malware History.Pdf
- Analysis of Sobig.F and Blaster Worm Characteristics
- The SASSER Event: History and Implications.Pdf