Search results for: Mark Stamp
Journal of Computer Virology and Hacking Techniques > 2019 > 15 > 3 > 147-160
Journal of Computer Virology and Hacking Techniques > 2019 > 15 > 2 > 97-107
Journal of Computer Virology and Hacking Techniques > 2018 > 14 > 2 > 157-165
Lecture Notes in Control and Information Sciences > New Directions and Applications in Control Theory > 367-378
Journal of Computer Virology and Hacking Techniques > 2018 > 14 > 1 > 39-52
Journal of Computer Virology and Hacking Techniques > 2017 > 13 > 3 > 141-152
Journal of Computer Virology and Hacking Techniques > 2017 > 13 > 2 > 95-107
Journal of Computer Virology and Hacking Techniques > 2017 > 13 > 1 > 1-12
Journal of Computer Virology and Hacking Techniques > 2016 > 12 > 4 > 203-212
Journal of Computer Virology and Hacking Techniques > 2016 > 12 > 4 > 213-224
Journal of Computer Virology and Hacking Techniques > 2015 > 11 > 2 > 59-73
Journal of Computer Virology and Hacking Techniques > 2015 > 11 > 2 > 103-118
Journal of Computer Virology and Hacking Techniques > 2015 > 11 > 4 > 203-216
Journal of Computer Virology and Hacking Techniques > 2015 > 11 > 2 > 89-102
Computers & Security > 2014 > 45 > Complete > 242-254
Journal of Computer Virology and Hacking Techniques > 2014 > 10 > 1 > 53-65
Journal of Computer Virology and Hacking Techniques > 2014 > 10 > 4 > 273-297