![]() |
| 2005 | ||
|---|---|---|
| 8 | EE | Elias Levy: Worm Propagation and Generic Attacks. IEEE Security & Privacy 3(2): 63-65 (2005) |
| 2004 | ||
| 7 | EE | Elias Levy: Criminals Become Tech Savvy. IEEE Security & Privacy 2(2): 65-68 (2004) |
| 6 | EE | Elias Levy: Approaching Zero. IEEE Security & Privacy 2(4): 65-66 (2004) |
| 5 | EE | Elias Levy: Interface Illusions. IEEE Security & Privacy 2(6): 66-69 (2004) |
| 2003 | ||
| 4 | EE | Ivan Arce, Elias Levy: An Analysis of the Slapper Worm. IEEE Security & Privacy 1(1): 82-87 (2003) |
| 3 | EE | Elias Levy: Poisoning the Software Supply Chain. IEEE Security & Privacy 1(3): 70-73 (2003) |
| 2 | EE | Elias Levy: The Making of a Spam Zombie Army: Dissecting the Sobig Worms. IEEE Security & Privacy 1(4): 58-59 (2003) |
| 1 | EE | Elias Levy: Crossover: Online Pests Plaguing the Offline World. IEEE Security & Privacy 1(6): 71-73 (2003) |
| 1 | Ivan Arce | [4] |