• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 23
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 36
  • 36
  • 14
  • 8
  • 7
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Computer virus prevention and control in Hong Kong /

Szeto, Wai-chi. January 1993 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1992.
2

Multi-agent based human immune system

林衛華, Lam, Wai-wa. January 1999 (has links)
published_or_final_version / Computer Science and Information Systems / Master / Master of Philosophy
3

Overcoming limitations in computer worm models

Posluszny, Frank S. January 2005 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: computer virus; network simulation; worm propagation; worm simulation; computer worm. Includes bibliographical references (p. 72-73).
4

Multi-agent based human immune system /

Lam, Wai-wa. January 1999 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1999. / Includes bibliographical references (leaves 99-104).
5

Detecting malicious software by dynamic execution

Dai, Jianyong. January 2009 (has links)
Thesis (Ph.D.)--University of Central Florida, 2009. / Adviser: Ratan K. Guha. Includes bibliographical references (p. 98-106).
6

The impact of population mixing rules on epidemic communication /

Lin, Meng-jang, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 127-132). Available also in a digital version from Dissertation Abstracts.
7

Static detection and identification of X86 malicious executables a multidisciplinary approach /

Wang, Zhiyu. January 2009 (has links)
Thesis (M. Sc.)--University of Alberta, 2009. / Title from PDF file main screen (viewed on Aug. 19, 2009). "A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Science, Department of Computing Science, University of Alberta." Includes bibliographical references.
8

The use of heuristics in identifying self-propagating malicious mobile code

Twardus, Jesse. January 2005 (has links)
Thesis (M.S.)--West Virginia University, 2005. / Title from document title page. Document formatted into pages; contains viii, 104 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 89-92).
9

A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users

Weideman, Melius January 1994 (has links)
Thesis (Masters Diploma (Information Technology))--Cape Technikon, Cape Town, 1994 / Computer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in industry was measured by sending a questionnaire to 388 companies country-wide. &~ average of 2l,5% of the respondents claimed detrimental effects to information stored on disk due to computer viruses. This and other data was used to guide laboratory experiments on the actual damage done by computer viruses to stored information. A set of test disks was prepared to represent programs and data of a typical PC user in industry. Fifteen different virus programs were used individually to infect the test disks. After each infection, all the test disks were inspected to ascertain damage to data, system and program files as well as to separate disk sectors. The research established that: The damage done by computer viruses to stored information is generally limited to one file or disk area. Where damage to stored information did occur, it was often reversible. Irrational user responses to virus symptoms provide a large potential source for damage to stored information. The availability of master program disks (for program file restoration) and recent, validated data backup is essential to recovery from a computer virus infection. A user can solve most problems caused by virus infections if he has a basic understanding of disk structure, i.e. tracks, sectors, sides, the FAT, etc, and of the use of disk utility programs like Norton Utilities or PCTools. The fact that some of the findings of prominent virus researchers could not be verified, suggests that virus programs could be unstable. Claims regarding the damage inflicted by viruses must be considered to be valid only for a specific copy of the virus under discussion. The importance of using original application software (to minimize the transfer of viruses and to enable program file restoration) , regular back-ups (to enable data file restoration) and basic user awareness (infection prevention, symptoms, the use of anti-viral and utility programs, etc.) was emphasized. The average PC user should be able to clear up a virus infection without assistance by following the given disinfection procedure. Suggestions for further study include virus origins, generations, mutations, multiple infections, and the effect of viruses on computer networks.
10

Offline forensic analysis of Microsoft Windows XP physical memory

Schultz, John S. 09 1900 (has links)
actual physical memory images, and C language code for the program itself.

Page generated in 0.0608 seconds