"וְהַסֵּעַ עֶגְלַת חַיָּיו": על מסעו של הסוס הטרויאני במאה ה-21 (2016-2004) - אחיה אדמוני

עמוד:494

494 Pattern Recognition ( CCVPR 2018 ) . Wellington, New Zealand, December 2018 . 15 - 13 Bouhnik & Another Piece of the U . SPart in the Information Warfare Admoni, 2022 Bouhnik, D . , & Admoni, A . ( 2022 ) . “We Had No Homefront” : Story . Information Security Journal : A Global Perspective, 32 ( 6 ) , 469 – 480 . doi : 10 . 1080 / 19393555 . 2022 . 2111005 Bose, Hu, Shin & Detection of Malware on Mobile Handsets . In : Proceedings of Park, 2008 Bose, A . , Hu, X . , Shin, K . G . & Park, T . ( 2008 ) . Behavioral the 6 th International Conference on Mobile Systems, Applications, and Services ( MobiSys 80' ) . ACM, New York, NY, USA, 17 - 20 June 2008, 225 - 238 . doi : 10 . 1145 / 1378600 . 1378626 Branstan, 1973 Branstan, D . K . ( 1973 ) . Privacy and Protection in Operating Systems . Computer, 6 ( 1 ) , 43 - 46 . doi : 10 . 1109 / C - M . 1973 . 217017 Calo, 2017 Calo, R . ( 2017 ) . Artificial Intelligence Policy : A Primer and Roadmap . UC Davis Law Review, 51 ( 2 ) , 399 - 435 . Cohen, 1992 Cohen, F . B . ( 1992 ) . Protection and Security on the Information Superhighway . New York : John Wiley & Sons . Wikipedia, n . d . CryptoLocker . ( n . d . ) . In Wikipedia . Retrieved December, 14, From https : / / en . wikipedia . org / wiki / CryptoLocker . 2015, Dagon, Martin & computing devices : the viruses are coming ! . IEEE Pervasive Starner, 2004 Dagon, D . , Martin, T . & Starner, T . ( 2004 ) . Mobile phones as Computing, 3 ( 4 ) , 11 - 15 . doi : 10 . 1109 / MPRV . 2004 . 21 Denning, 1982 Denning, D . E . ( 1982 ) . Cryptography and Data Security . Reading : Addison - Wesley . Gasser, 1988 Gasser, M . ( 1988 ) . Building a Secure Computer System . New York : Van Nostrand Reinhold . Gupta & Kumar, Sequence Based Approach for Detecting Malicious Program 2015 Gupta, S . & Kumar, P . ( 2015 ) . An Immediate System Call Executions in Cloud Environment . Wireless Personal Communications, 81 ( 1 ) , 405 - 425 . doi : 10 . 1007 / s11277 - 014 - 2136 - x Harley, 2003 Harley, D . ( 2003 ) . Trojans . In Anonymous ( Ed . ) , Maximum Security ( pp . 351 - 378 ) . Indiana : Sams Publishing .

אדמוני, אריאל


לצפייה מיטבית ורציפה בכותר