Spelling suggestions: "subject:"computer comoviruses"" "subject:"computer bocaviruses""
1 |
Computer virus prevention and control in Hong Kong /Szeto, Wai-chi. January 1993 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1992.
|
2 |
Multi-agent based human immune system林衛華, Lam, Wai-wa. January 1999 (has links)
published_or_final_version / Computer Science and Information Systems / Master / Master of Philosophy
|
3 |
Overcoming limitations in computer worm modelsPosluszny, Frank S. January 2005 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: computer virus; network simulation; worm propagation; worm simulation; computer worm. Includes bibliographical references (p. 72-73).
|
4 |
Multi-agent based human immune system /Lam, Wai-wa. January 1999 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1999. / Includes bibliographical references (leaves 99-104).
|
5 |
Detecting malicious software by dynamic executionDai, Jianyong. January 2009 (has links)
Thesis (Ph.D.)--University of Central Florida, 2009. / Adviser: Ratan K. Guha. Includes bibliographical references (p. 98-106).
|
6 |
The impact of population mixing rules on epidemic communication /Lin, Meng-jang, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 127-132). Available also in a digital version from Dissertation Abstracts.
|
7 |
Static detection and identification of X86 malicious executables a multidisciplinary approach /Wang, Zhiyu. January 2009 (has links)
Thesis (M. Sc.)--University of Alberta, 2009. / Title from PDF file main screen (viewed on Aug. 19, 2009). "A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Science, Department of Computing Science, University of Alberta." Includes bibliographical references.
|
8 |
The use of heuristics in identifying self-propagating malicious mobile codeTwardus, Jesse. January 2005 (has links)
Thesis (M.S.)--West Virginia University, 2005. / Title from document title page. Document formatted into pages; contains viii, 104 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 89-92).
|
9 |
A critical evaluation of the destructive impact of computer viruses on files stored by personal computer usersWeideman, Melius January 1994 (has links)
Thesis (Masters Diploma (Information Technology))--Cape Technikon, Cape Town, 1994 / Computer virus programs are generally perceived to be a
threat to the information stored by computer users. This
research evaluated the impact computer viruses have on
information stored by computer users. The emphasis was on
the effects of computer viruses rather than on the detail of
their operation. The main hypotheses involved the question
of whether or not computer viruses do pose a threat to the
information stored by computer users.
The effect of computer viruses on the information of users
in industry was measured by sending a questionnaire to 388
companies country-wide. &~ average of 2l,5% of the
respondents claimed detrimental effects to information
stored on disk due to computer viruses. This and other data
was used to guide laboratory experiments on the actual
damage done by computer viruses to stored information.
A set of test disks was prepared to represent programs and
data of a typical PC user in industry. Fifteen different
virus programs were used individually to infect the test
disks. After each infection, all the test disks were
inspected to ascertain damage to data, system and program
files as well as to separate disk sectors. The research established that:
The damage done by computer viruses to stored
information is generally limited to one file or disk
area.
Where damage to stored information did occur, it was
often reversible.
Irrational user responses to virus symptoms provide a
large potential source for damage to stored
information.
The availability of master program disks (for program
file restoration) and recent, validated data backup is
essential to recovery from a computer virus infection.
A user can solve most problems caused by virus
infections if he has a basic understanding of disk
structure, i.e. tracks, sectors, sides, the FAT, etc,
and of the use of disk utility programs like Norton
Utilities or PCTools.
The fact that some of the findings of prominent virus
researchers could not be verified, suggests that virus
programs could be unstable.
Claims regarding the damage inflicted by viruses must
be considered to be valid only for a specific copy of
the virus under discussion. The importance of using original application software (to
minimize the transfer of viruses and to enable program file
restoration) , regular back-ups (to enable data file
restoration) and basic user awareness (infection prevention,
symptoms, the use of anti-viral and utility programs, etc.)
was emphasized.
The average PC user should be able to clear up a virus
infection without assistance by following the given
disinfection procedure. Suggestions for further study
include virus origins, generations, mutations, multiple
infections, and the effect of viruses on computer networks.
|
10 |
Offline forensic analysis of Microsoft Windows XP physical memorySchultz, John S. 09 1900 (has links)
actual physical memory images, and C language code for the program itself.
|
Page generated in 0.0608 seconds