Results 131 to 140 of about 6,902 (163)
Some of the next articles are maybe not open access.

Antivirus Software Shield Against Antivirus Terminators

IEEE Transactions on Information Forensics and Security, 2012
In the last several decades, the arms race between malware writers and antivirus programmers has become more and more severe. The simplest way for a computer user to secure his computer is to install antivirus software on his computer. As antivirus software becomes more sophisticated and powerful, evading the detection of antivirus software becomes an ...
Fu-Hau Hsu   +4 more
openaire   +1 more source

Antivirus antibodies in myasthenia gravis

Neurology, 1985
Serum antibodies to influenza A, measles, rubella, cytomegalovirus, varicella zoster, herpes simplex type 1, and mumps have been assayed in 104 patients with myasthenia gravis, grouped according to clinical features plus thymus pathology, and compared with matched controls. No significant differences in incidence or antibody titer were detected.
L S, Klavinskis   +3 more
openaire   +2 more sources

Vulnerability Dependencies in Antivirus Software

2008 Second International Conference on Emerging Security Information, Systems and Technologies, 2008
In this paper we present an application of the MATINE method for investigating dependencies in antivirus (AV) software and some vulnerabilities arising from these dependencies. Previously, this method has been effectively used to find vulnerabilities in network protocols.
Askola, Kreetta   +6 more
openaire   +2 more sources

Microcomputer Antivirus Program

2001
Abstract : This Instruction updates the Office of the Inspector General, Department of Defense (OIG, DoD), Microcomputer Antivirus Program. Additionally, it provides procedures for dealing with suspected virus attacks.
openaire   +1 more source

Nanoparticles in Antivirus Therapy

Advanced Materials Research, 2013
The new mechanism of the virus activity inhibition is proposed. The idea is based on the nonspecific interaction between the viral particle and nanoparticles forming a stable bound state. The formation of the interaction potential between the virus and nanoparticles is caused by the presence of both linear and nonlinear polarizabilities, leading to the
Mikhail Lokshyn   +5 more
openaire   +1 more source

Characterizing antivirus workload execution

ACM SIGARCH Computer Architecture News, 2005
Despite the pervasive use of anti-virus (AV) software, there has not been a systematic study of the characteristics of the execution of this workload. In this paper we present a characterization of four commonly used anti-virus software packages.
Derek Uluski, Micha Moffie, David Kaeli
openaire   +1 more source

Malware and Antivirus Procedures

2005
The last decade has witnessed the dramatic emergence of the Internet as a force of inter-organizational and inter-personal change. The Internet and its component technologies, which continue to experience growing global adoption, have become essential facilitators and drivers in retailing, supply chain management, government, entertainment, and other ...
Xin Luo, Merrill Warkentin
openaire   +1 more source

The Antivirus Companies

2019
There’s no denying that it is becoming increasingly difficult to combat cybercrime. The stakes are getting higher, the gangsters are getting more and more professional, and now there are cyberspies, cybersabotage, and threats of cyberwar to contend with. Malware is sprayed out into the world like buckshot.
openaire   +1 more source

STAR Antivirus Software

2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), 2023
Tathagata Bhattacharya   +4 more
openaire   +1 more source

Antivirus Engines

2020
Abhijit Mohanta, Anoop Saldanha
openaire   +1 more source

Home - About - Disclaimer - Privacy