Malware is called malicious for a reason: The risks of weaponizing code
نویسنده:
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/SMC.2014.6973967
کلیدواژه(گان): Approximation methods,Bifurcation,Optimization methods,Search problems,Trajectory,Vectors,Chaos,Constrained Optimization,Global Optimization,Lagrange-Newton Dynamics,Sequential Quadratic Approximation
کالکشن
:
-
آمار بازدید
Malware is called malicious for a reason: The risks of weaponizing code
Show full item record
| contributor author | Cobb, Stephen , Lee, Andrew | |
| date accessioned | 2020-03-12T20:57:55Z | |
| date available | 2020-03-12T20:57:55Z | |
| date issued | 2014 | |
| identifier other | 6916396.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1032156 | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Malware is called malicious for a reason: The risks of weaponizing code | |
| type | Conference Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8157762 | |
| subject keywords | Approximation methods | |
| subject keywords | Bifurcation | |
| subject keywords | Optimization methods | |
| subject keywords | Search problems | |
| subject keywords | Trajectory | |
| subject keywords | Vectors | |
| subject keywords | Chaos | |
| subject keywords | Constrained Optimization | |
| subject keywords | Global Optimization | |
| subject keywords | Lagrange-Newton Dynamics | |
| subject keywords | Sequential Quadratic Approximation | |
| identifier doi | 10.1109/SMC.2014.6973967 | |
| journal title | yber Conflict (CyCon 2014), 2014 6th International Conference On | |
| filesize | 744944 | |
| citations | 0 |


