Results 61 to 70 of about 6,902 (163)

Unlocking the Mediating and Moderating Role of Information Security in Information Systems: A Combined TAM, ISM, and HBM Model

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam   +5 more
wiley   +1 more source

Antivirus evasion methods

open access: yes, 2020
This thesis focuses on antivirus evasion techniques. It examines how an antivirus engine operates and studies various evasion methods for each antivirus operation. Subsequently, it investigates the level of difficulty in bypassing an antivirus by manual modification of malware code to escape detection.
openaire   +2 more sources

Mx Is Not Responsible for the Antiviral Activity of Interferon-α against Japanese Encephalitis Virus

open access: yesViruses, 2017
Mx proteins are interferon (IFN)-induced dynamin-like GTPases that are present in all vertebrates and inhibit the replication of myriad viruses. However, the role Mx proteins play in IFN-mediated suppression of Japanese encephalitis virus (JEV) infection
Jing Zhou   +8 more
doaj   +1 more source

Screening of PI3K-Akt-targeting Drugs for Silkworm against Bombyx mori Nucleopolyhedrovirus

open access: yesMolecules, 2019
Bombyx mori nucleopolyhedrovirus (BmNPV) is the most prevalent threat to silkworms. Hence, there is a need for antiviral agents in sericulture. The PI3K-Akt pathway is essential for the efficient replication of the baculovirus.
Bingbing Wang   +6 more
doaj   +1 more source

Evolutionary Antivirus Signature Optimization

open access: yes2019 IEEE Congress on Evolutionary Computation (CEC), 2019
This work presents a methodology to improve machine-generated signatures for Android Malware detection. The technique relies on a population-less evolutionary algorithm and uses an unorthodox fitness function that incorporates unsystematic human expert knowledge in the form of a set of rules of thumb.
GIOVANNITTI, ELIANA   +3 more
openaire   +1 more source

Potensi Minyak Atsiri untuk Mengendalikan Potyvirus pada Tanaman Nilam

open access: yesJurnal Fitopatologi Indonesia, 2014
One of the problems in the cultivation of patchouli is a mosaic disease caused by viruses. The dominant virus causing mosaic disease on patchouli plant belongs to Potyvirus group.
Maya Mariana, Rita Noveriza
doaj   +1 more source

A Risk Management Approach to Double-Virus Tradeoff Problem

open access: yesIEEE Access, 2019
One of the major threats to cybersecurity is the emergence of new computer viruses. By emergence of new viruses, the cybersecurity companies assign a team of security experts and programmers to study the behavior of the virus and develop the ...
Jichao Bi   +4 more
doaj   +1 more source

Antivirus application in ophthalmology

open access: yesKazan medical journal, 1928
Several years have passed since Bezredko's major works (1921) and the publication of his book "Local Immunization" (1924) (1), during which time much material has accumulated in all specialties, particularly in ophthalmology. During this time experimental and clinical works have multiplied.
openaire   +2 more sources

English about Antivirus Software

open access: yesInternational Research Journal of Management, IT & Social Sciences, 2015
Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software also known as virus protection software. With this software we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are ...
openaire   +1 more source

Searching Malware and Sources of Its Distribution in the Internet

open access: yesБезопасность информационных технологий, 2011
In the article is considered for the first time developed by the author algorithm of searching malware and sources of its distribution, based on published HijackThis logs in the Internet.
L. L. Protsenko
doaj  

Home - About - Disclaimer - Privacy