Results 41 to 50 of about 6,902 (163)

MLDAS: Machine Learning Dynamic Algorithm Selection for Software‐Defined Networking Security

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Network security is a critical concern in the digital landscape of today, with users demanding secure browsing experiences and protection of their personal data. This study explores the dynamic integration of Machine Learning (ML) algorithms with Software‐Defined Networking (SDN) controllers to enhance network security through adaptive ...
Pablo Benlloch   +3 more
wiley   +1 more source

A Novel Murine Model of Hemophagocytic Lymphohistiocytosis‐Like Inflammation in ZNFX1 Deficiency

open access: yesEuropean Journal of Immunology, Volume 56, Issue 2, February 2026.
LCMV‐infected Znfx1‐deficient mice develop hemophagocytic lymphohistiocytosis (HLH)‐like immune dysregulation, mirroring key aspects of the immunopathology observed in ZNFX1‐deficient patients. ABSTRACT Hemophagocytic lymphohistiocytosis (HLH) is a severe inflammatory syndrome characterized by persistent activation of lymphocytes and macrophages ...
Diana Tintor   +9 more
wiley   +1 more source

Selección de productos antivirus. Una mirada actual desde el sector de la salud en Cuba

open access: yesRevista Cubana de Informática Médica, 2014
La selección del antivirus en ocasiones puede resultar un trabajo un poco tedioso debido a la gran gama de variedades que existe en el mercado. El presente trabajo brindó una panorámica actual a los principales antivirus utilizados en el sistema de salud
Lissette Nuñez Maturel   +3 more
doaj   +2 more sources

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

The impact of the application of antivirus programs on the security of computer systems

open access: yesBizInfo
The paper presents a study that analyzes the application of different antivirus programs to reduce negative consequences on computer systems caused by malicious attacks.
Ivan Jovanović   +2 more
doaj   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Antivirus Engines

open access: yes
Antivirus Engines. [EN] The presentation provides a systematic overview of the architecture and functionality of antivirus engines, covering classical detection methods based on signatures as well as advanced techniques involving heuristics, behavioral analysis, and modern innovations in cybersecurity.
  +4 more sources

Proteomic and bioinformatic analysis of condyloma acuminata: mild hyperthermia treatment reveals compromised HPV infectivity of keratinocytes via regulation of metabolism, differentiation and anti-viral responses

open access: yesInternational Journal of Hyperthermia, 2019
Background: Hyperthermia has proved successful in treating cutaneous human papillomavirus infectious diseases such as plantar wart and condyloma acuminata (CA).
Yu-Zhe Sun   +7 more
doaj   +1 more source

PENGEMBANGAN ANTIVIRUS HUMAN PAPILLOMA VIRUS BERBASIS MOLEKUL KECIL

open access: yesMajalah Kedokteran Andalas, 2014
AbstrakSekalipun telah ada program skrining deteksi dini infeksi HPV maupun kanker servis sertaadanya dua vaksin yang telah berlisensi, sekarang ini belum ada obat antivirus yang efektif.Prospek pengembangan molekul kecil inhibitor sebagai antivirus HPV ...
Dwi Wulandari, T. Mirawati Sudiro
doaj   +1 more source

Exploiting an antivirus interface [PDF]

open access: yesComputer Standards & Interfaces, 2009
We propose a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector's underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector.
Kevin W. Hamlen   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy