Author: Vasserman Eugene
Publisher: Springer Publishing Company
ISSN: 1615-5262
Source: International Journal of Information Security (IJIS), Vol.8, Iss.2, 2009-04, pp. : 121-135
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
By Alimhan Keylan Inaba Hiroshi
International Journal of Modelling, Identification and Control, Vol. 5, Iss. 1, 2008-12 ,pp. :
Hunting for undetectable metamorphic viruses
By Lin Da
Journal in Computer Virology, Vol. 7, Iss. 3, 2011-08 ,pp. :
A provably complete exploration strategy by constructing Voronoi diagrams
By Kim Jonghoek
Autonomous Robots, Vol. 29, Iss. 3-4, 2010-11 ,pp. :