Oxford Index Search Results

You are looking at 1-12 of 12 items for:

virus x Computer Science x clear all

Refine by type

Refine by product

 

virus

Overview page. Subjects: Computing.

Program code written to replicate by attaching copies of itself to other objects within the system, and normally also having a detrimental effect. This may range from generation of...

See overview in Oxford Index

Some Further Theoretical Results about Computer Viruses

Zhihong Zuo and Mingtian Zhou.

in The Computer Journal

January 2004; p ublished online January 2004 .

Journal Article. Subjects: Computer Science. 0 words.

In this paper we give some general definitions of computer viruses which comply with our common understanding of computer viruses. Based on these definitions, we prove theoretically that...

Go to »  abstract

Comment on ‘A Framework for Modelling Trojans and Computer Virus Infection’

Erkki Mäkinen.

in The Computer Journal

January 2001; p ublished online January 2001 .

Journal Article. Subjects: Computer Science. 0 words.

We (re-)introduce a Turing machine model for computer viruses. Despite the recent criticism of Turing machine models, they enjoy important advantages: their well-known notation and rich...

Go to »  abstract

A Framework for Modelling Trojans and Computer Virus Infection

H. Thimbleby, S. Anderson and P. Cairns.

in The Computer Journal

January 1998; p ublished online January 1998 .

Journal Article. Subjects: Computer Science. 0 words.

It is not possible to view a computer operating in the real world, including the possibility of Trojan horse programs and computer viruses, as simply a finite realisation of a Turing...

Go to »  abstract

Hardware Accelerator to Detect Multi-Segment Virus Patterns

Xing Wang, Nga Lam Or, Ziyan Lu and Derek Pao.

in The Computer Journal

October 2015; p ublished online August 2014 .

Journal Article. Subjects: Computer Science. 0 words.

Multi-segment pattern is a common virus structure, and there are 2229 multi-segment patterns in the ClamAV virus database version 54. We observe that (i) the pattern set contains over 100...

Reply to ‘Comment on “A Framework for Modelling Trojans and Computer Virus Infection”’ by E. Mäkinen

H. Thimbleby, S. O. Anderson and P. A. Cairns.

in The Computer Journal

January 2001; p ublished online January 2001 .

Journal Article. Subjects: Computer Science. 0 words.

Computer viruses are a worrying real-world problem, and a challenge to theoretical modelling. In this issue of the Computer Journal, Erkki Mäkinen proposes universal Turing machines in a...

Go to »  abstract

Reply to ‘Comment on “A Framework for Modelling Trojans and Computer Virus Infection”’ by E. Mäkinen

Fred Cohen.

in The Computer Journal

January 2001; p ublished online January 2001 .

Journal Article. Subjects: Computer Science. 0 words.

Go to »  abstract

Authentic Outcomes

Eric Klopfer.

in Augmented Learning

April 2008; p ublished online August 2013 .

Chapter. Subjects: Computer Science. 6411 words.

This chapter describes the use of role play and collaboration in mobile games. The discussions focus on game known as Outbreak @ the Institute, which combines the virus modeling of the...

Go to The MIT Press »  abstract

Contrasting Subgroup Discovery

Laura Langohr, Vid Podpečan, Marko Petek, Igor Mozetič, Kristina Gruden, Nada Lavrač and Hannu Toivonen.

in The Computer Journal

March 2013; p ublished online September 2012 .

Journal Article. Subjects: Computer Science. 0 words.

Subgroup discovery methods find interesting subsets of objects of a given class. Motivated by an application in bioinformatics, we first define a generalized subgroup discovery problem. In...

Go to »  abstract

Information Security Risk Modeling Using Bayesian Index

Chien-Lung Chan.

in The Computer Journal

April 2011; p ublished online July 2010 .

Journal Article. Subjects: Computer Science. 0 words.

The goal of this study lies in the construction and evaluation of a Bayesian index for measuring enterprises’ information security (IS) risk. By integrating IS experts’ judgments, we...

Go to »  abstract

The insecure computer

in The Computer

December 2011; p ublished online September 2013 .

Chapter. Subjects: Computer Science; Computing. 4668 words.

‘The insecure computer’ outlines the main threats to computer security, and gives advice on how they can be countered. Malware is software that is introduced to a system illegally and which...

Go to »  abstract

Modelling multi-state diffusion process in complex networks: theory and applications

Yishi Lin, John C. S. Lui, Kyomin Jung and Sungsu Lim.

in Journal of Complex Networks

December 2014; p ublished online July 2014 .

Journal Article. Subjects: Mathematics; Computer Science. 11435 words.

Recent years have witnessed a growing interest in understanding the fundamental principles of how epidemic, ideas or behaviour spread over large networks (e.g. the Internet or online social...

Identifying patterns in informal sources of security information

Emilee Rader and Rick Wash.

in Journal of Cybersecurity

September 2015; p ublished online December 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 20810 words.

Computer users have access to computer security information from many different sources, but few people receive explicit computer security training. Despite this lack of formal education,...

Go to »  full text: open access