Results 131 to 140 of about 6,902 (163)
Some of the next articles are maybe not open access.
Antivirus Software Shield Against Antivirus Terminators
IEEE Transactions on Information Forensics and Security, 2012In the last several decades, the arms race between malware writers and antivirus programmers has become more and more severe. The simplest way for a computer user to secure his computer is to install antivirus software on his computer. As antivirus software becomes more sophisticated and powerful, evading the detection of antivirus software becomes an ...
Fu-Hau Hsu +4 more
openaire +1 more source
Antivirus antibodies in myasthenia gravis
Neurology, 1985Serum antibodies to influenza A, measles, rubella, cytomegalovirus, varicella zoster, herpes simplex type 1, and mumps have been assayed in 104 patients with myasthenia gravis, grouped according to clinical features plus thymus pathology, and compared with matched controls. No significant differences in incidence or antibody titer were detected.
L S, Klavinskis +3 more
openaire +2 more sources
Vulnerability Dependencies in Antivirus Software
2008 Second International Conference on Emerging Security Information, Systems and Technologies, 2008In this paper we present an application of the MATINE method for investigating dependencies in antivirus (AV) software and some vulnerabilities arising from these dependencies. Previously, this method has been effectively used to find vulnerabilities in network protocols.
Askola, Kreetta +6 more
openaire +2 more sources
Microcomputer Antivirus Program
2001Abstract : This Instruction updates the Office of the Inspector General, Department of Defense (OIG, DoD), Microcomputer Antivirus Program. Additionally, it provides procedures for dealing with suspected virus attacks.
openaire +1 more source
Nanoparticles in Antivirus Therapy
Advanced Materials Research, 2013The new mechanism of the virus activity inhibition is proposed. The idea is based on the nonspecific interaction between the viral particle and nanoparticles forming a stable bound state. The formation of the interaction potential between the virus and nanoparticles is caused by the presence of both linear and nonlinear polarizabilities, leading to the
Mikhail Lokshyn +5 more
openaire +1 more source
Characterizing antivirus workload execution
ACM SIGARCH Computer Architecture News, 2005Despite the pervasive use of anti-virus (AV) software, there has not been a systematic study of the characteristics of the execution of this workload. In this paper we present a characterization of four commonly used anti-virus software packages.
Derek Uluski, Micha Moffie, David Kaeli
openaire +1 more source
Malware and Antivirus Procedures
2005The last decade has witnessed the dramatic emergence of the Internet as a force of inter-organizational and inter-personal change. The Internet and its component technologies, which continue to experience growing global adoption, have become essential facilitators and drivers in retailing, supply chain management, government, entertainment, and other ...
Xin Luo, Merrill Warkentin
openaire +1 more source
2019
There’s no denying that it is becoming increasingly difficult to combat cybercrime. The stakes are getting higher, the gangsters are getting more and more professional, and now there are cyberspies, cybersabotage, and threats of cyberwar to contend with. Malware is sprayed out into the world like buckshot.
openaire +1 more source
There’s no denying that it is becoming increasingly difficult to combat cybercrime. The stakes are getting higher, the gangsters are getting more and more professional, and now there are cyberspies, cybersabotage, and threats of cyberwar to contend with. Malware is sprayed out into the world like buckshot.
openaire +1 more source
2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), 2023
Tathagata Bhattacharya +4 more
openaire +1 more source
Tathagata Bhattacharya +4 more
openaire +1 more source

