![]() | ![]() |
2005 | ||
---|---|---|
8 | EE | Elias Levy: Worm Propagation and Generic Attacks. IEEE Security & Privacy 3(2): 63-65 (2005) |
2004 | ||
7 | EE | Elias Levy: Criminals Become Tech Savvy. IEEE Security & Privacy 2(2): 65-68 (2004) |
6 | EE | Elias Levy: Approaching Zero. IEEE Security & Privacy 2(4): 65-66 (2004) |
5 | EE | Elias Levy: Interface Illusions. IEEE Security & Privacy 2(6): 66-69 (2004) |
2003 | ||
4 | EE | Ivan Arce, Elias Levy: An Analysis of the Slapper Worm. IEEE Security & Privacy 1(1): 82-87 (2003) |
3 | EE | Elias Levy: Poisoning the Software Supply Chain. IEEE Security & Privacy 1(3): 70-73 (2003) |
2 | EE | Elias Levy: The Making of a Spam Zombie Army: Dissecting the Sobig Worms. IEEE Security & Privacy 1(4): 58-59 (2003) |
1 | EE | Elias Levy: Crossover: Online Pests Plaguing the Offline World. IEEE Security & Privacy 1(6): 71-73 (2003) |
1 | Ivan Arce | [4] |