| contributor author | Cobb, Stephen , Lee, Andrew | |
| date accessioned | 2020-03-12T20:57:55Z | |
| date available | 2020-03-12T20:57:55Z | |
| date issued | 2014 | |
| identifier other | 6916396.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1032156?locale-attribute=fa&show=full | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Malware is called malicious for a reason: The risks of weaponizing code | |
| type | Conference Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8157762 | |
| subject keywords | Approximation methods | |
| subject keywords | Bifurcation | |
| subject keywords | Optimization methods | |
| subject keywords | Search problems | |
| subject keywords | Trajectory | |
| subject keywords | Vectors | |
| subject keywords | Chaos | |
| subject keywords | Constrained Optimization | |
| subject keywords | Global Optimization | |
| subject keywords | Lagrange-Newton Dynamics | |
| subject keywords | Sequential Quadratic Approximation | |
| identifier doi | 10.1109/SMC.2014.6973967 | |
| journal title | yber Conflict (CyCon 2014), 2014 6th International Conference On | |
| filesize | 744944 | |
| citations | 0 | |