- DocumentAGISA Towards Automatic Generation of Infection Signaturesuploaded byMukan Kuzey
- DocumentNew Thoughts in Ring3 NT Rootkituploaded byMukan Kuzey
- DocumentAn Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers From Malicious Codeuploaded byMukan Kuzey
- DocumentA Self-reproducing Analogueuploaded byMukan Kuzey
- DocumentA Plague of Viruses Biological, Computer and Marketinguploaded byMukan Kuzey
- DocumentA Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Wormsuploaded byMukan Kuzey
- DocumentA Dozen Dangerous Myths About Computer Virusesuploaded byMukan Kuzey
- DocumentA Cost Analysis of Typical Computer Viruses and Defensesuploaded byMukan Kuzey
- DocumentA Computational Model of Computer Virus Propagationuploaded byMukan Kuzey
- DocumentA Comprehensive Program for Preventing and Detecting Computer Viruses is Neededuploaded byMukan Kuzey
- DocumentA Classification of Viruses Through Recursion Theoremsuploaded byMukan Kuzey
- DocumentA Bypass of Cohen's Impossibility Resultuploaded byMukan Kuzey
- DocumentAn Architecture for Generating Semantic-Aware Signaturesuploaded byMukan Kuzey
- DocumentAn Email Worm Vaccine Architectureuploaded byMukan Kuzey
- DocumentAn Epidemic Model of Mobile Phone Virusuploaded byMukan Kuzey
- DocumentAn Epidemiological Model of Virus Spread and Cleanupuploaded byMukan Kuzey
- DocumentAn Evaluation of Two Host Based Intrusion Prevention Systemsuploaded byMukan Kuzey
- DocumentAn Internet-Worm Early Warning Systemuploaded byMukan Kuzey
- DocumentAn OS Independent Heuristics-based Worm-containment Systemuploaded byMukan Kuzey
- DocumentAn Overview of Unix Rootkitsuploaded byMukan Kuzey
- DocumentAn Undetectable Computer Virusuploaded byMukan Kuzey
- DocumentAnalysis and Detection of Computer Viruses and Wormsuploaded byMukan Kuzey
- DocumentAnalysis of a Scanning Model of Worm Propagationuploaded byMukan Kuzey
- DocumentAnalysis of Rxbotuploaded byMukan Kuzey
- DocumentAnalysis of Virus Algorithmsuploaded byMukan Kuzey
- DocumentAnalysis of Web Application Worms and Virusesuploaded byMukan Kuzey
- DocumentAnalyzing Worms and Network Traffic Using Compressionuploaded byMukan Kuzey
- DocumentAnatomy of a Semantic Virusuploaded byMukan Kuzey
- DocumentArtificial Immunity Using Constraint-based Detectorsuploaded byMukan Kuzey
- DocumentARTISTA a Network for ARTifical Immune SysTemsuploaded byMukan Kuzey
- DocumentASM-based Modelling of Self-Replicating Programsuploaded byMukan Kuzey
- DocumentAutomatically Generated Win32 Heuristic Virus Detectionuploaded byMukan Kuzey
- DocumentSpecification and Evaluation of Polymorphic Shellcode Properties Using a New Temporal Logicuploaded byMukan Kuzey
- DocumentStatic Analysis of Binary Code to Isolate Malicious Behaviorsuploaded byMukan Kuzey
- DocumentMechanics of Self-reproductionuploaded byMukan Kuzey
- DocumentMathematical Virusesuploaded byMukan Kuzey
- DocumentManaging Computer Viruses in a Groupware Environmentuploaded byMukan Kuzey
- DocumentMalware Pattern Scanning Schemes Secure Against Black-box Analysisuploaded byMukan Kuzey
- DocumentStriking Similaritiesuploaded byMukan Kuzey
- DocumentStoned Bootkituploaded byMukan Kuzey
- DocumentMetaAware Identifying Metamorphic Malwareuploaded byMukan Kuzey
- DocumentPowerful Virus Hits Computersuploaded byMukan Kuzey
- DocumentMobile Code Threats, Fact or Fictionuploaded byMukan Kuzey
- DocumentMetaAware Identifying Metamorphic Malwareuploaded byMukan Kuzey
- DocumentMalware Normalizationuploaded byMukan Kuzey
- DocumentMeasuring and Modeling Computer Virus Prevalenceuploaded byMukan Kuzey
- DocumentMalware, Viruses and Log Visualisationuploaded byMukan Kuzey
- DocumentMalware Research at SMUuploaded byMukan Kuzey
- DocumentSlamdunkuploaded byMukan Kuzey