| contributor author | Cobb, Stephen , Lee, Andrew |  | 
| date accessioned | 2020-03-12T20:57:55Z |  | 
| date available | 2020-03-12T20:57:55Z |  | 
| date issued | 2014 |  | 
| identifier other | 6916396.pdf |  | 
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1032156?locale-attribute=fa&show=full |  | 
| format | general |  | 
| language | English |  | 
| publisher | IEEE |  | 
| title | Malware is called malicious for a reason: The risks of weaponizing code |  | 
| type | Conference Paper |  | 
| contenttype | Metadata Only |  | 
| identifier padid | 8157762 |  | 
| subject keywords | Approximation methods |  | 
| subject keywords | Bifurcation |  | 
| subject keywords | Optimization methods |  | 
| subject keywords | Search problems |  | 
| subject keywords | Trajectory |  | 
| subject keywords | Vectors |  | 
| subject keywords | Chaos |  | 
| subject keywords | Constrained Optimization |  | 
| subject keywords | Global Optimization |  | 
| subject keywords | Lagrange-Newton Dynamics |  | 
| subject keywords | Sequential Quadratic Approximation |  | 
| identifier doi | 10.1109/SMC.2014.6973967 |  | 
| journal title | yber Conflict (CyCon 2014), 2014 6th International Conference On |  | 
| filesize | 744944 |  | 
| citations | 0 |  |