contributor author | Cobb, Stephen , Lee, Andrew | |
date accessioned | 2020-03-12T20:57:55Z | |
date available | 2020-03-12T20:57:55Z | |
date issued | 2014 | |
identifier other | 6916396.pdf | |
identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1032156?show=full | |
format | general | |
language | English | |
publisher | IEEE | |
title | Malware is called malicious for a reason: The risks of weaponizing code | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8157762 | |
subject keywords | Approximation methods | |
subject keywords | Bifurcation | |
subject keywords | Optimization methods | |
subject keywords | Search problems | |
subject keywords | Trajectory | |
subject keywords | Vectors | |
subject keywords | Chaos | |
subject keywords | Constrained Optimization | |
subject keywords | Global Optimization | |
subject keywords | Lagrange-Newton Dynamics | |
subject keywords | Sequential Quadratic Approximation | |
identifier doi | 10.1109/SMC.2014.6973967 | |
journal title | yber Conflict (CyCon 2014), 2014 6th International Conference On | |
filesize | 744944 | |
citations | 0 | |