Academic literature on the topic 'Antivirus software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Antivirus software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Antivirus software"
Hsu, Fu-Hau, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, and Chieh-Wen Chen. "Antivirus Software Shield Against Antivirus Terminators." IEEE Transactions on Information Forensics and Security 7, no. 5 (October 2012): 1439–47. http://dx.doi.org/10.1109/tifs.2012.2206028.
Full textSyarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (January 1, 2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.
Full textHeyman, Karen. "New Attack Tricks Antivirus Software." Computer 40, no. 5 (May 2007): 18–20. http://dx.doi.org/10.1109/mc.2007.179.
Full textNurhayati, Ai, and Frencius . "Mapping perception of consumer antivirus software with multidimensional scaling method." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 91–95. http://dx.doi.org/10.34306/csit.v4i3.96.
Full textNurhayati, Ai, and Frencius Frencius. "Mapping Perception of Consumer Antivirus Software with Multidimensional Scaling Method." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 91–95. http://dx.doi.org/10.11591/aptikom.j.csit.13.
Full textHaritsah, Ma'arij, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis." Journal of Information System Research (JOSH) 4, no. 2 (January 31, 2023): 693–700. http://dx.doi.org/10.47065/josh.v4i2.2908.
Full textShevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.
Full textNurhayati, Ai, Aditya Gautama, and Muchammad Naseer. "Decision making model design for antivirus software selection using Factor Analysis and Analytical Hierarchy Process." MATEC Web of Conferences 154 (2018): 03006. http://dx.doi.org/10.1051/matecconf/201815403006.
Full textKasuya, Masaki, and Kenji Kono. "Screening Legitimate and Fake/Crude Antivirus Software." IPSJ Online Transactions 7 (2014): 43–51. http://dx.doi.org/10.2197/ipsjtrans.7.43.
Full textSukwong, Orathai, Hyong Kim, and James Hoe. "Commercial Antivirus Software Effectiveness: An Empirical Study." Computer 44, no. 3 (March 2011): 63–70. http://dx.doi.org/10.1109/mc.2010.187.
Full textDissertations / Theses on the topic "Antivirus software"
Rasool, Muhammad Ahsan, and Abdul Jamal. "Quality of freeware antivirus software." Thesis, Linköpings universitet, Datorteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-74438.
Full textBaker, Erik. "Evaluating the Necessity of Third-Party Antivirus Software." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15220.
Full textЛегуша, О. А. "Робота найсучасніших антивірусних програм." Thesis, Вид-во СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/20671.
Full textValouch, Tomáš. "Rozhraní pro jádro antivirového software." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235871.
Full textDoležal, Ladislav. "Analýza trhu bezpečnostního softwaru." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-199249.
Full textCancellieri, Michela. "Computer-aided design, synthesis and evaluation of novel antiviral compounds." Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/69187/.
Full textBekrar, Sofia. "Recherche de vulnérabilités logicielles par combinaison d'analyses de code binaire et de frelatage (Fuzzing)." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM058.
Full textFuzz testing (a.k.a. fuzzing) is one of the most effective approaches for discovering security vulnerabilities in large and closed-source software. Despite their wide use in the software industry, traditional fuzzing techniques suffer from a poor coverage, which results in a large number of false negatives. The other common drawback is the lack of knowledge about the application internals. This limits their ability to generate high quality inputs. Thus such techniques have limited fault detection capabilities. We present an automated smart fuzzing approach which combines advanced binary code analysis techniques. Our approach has five components. A test suite reduction technique, to optimize the ratio between the amount of covered code and the execution time. A fast and optimized code coverage measurement technique, to evaluate the fuzzing effectiveness. A static analysis technique, to locate potentially sensitive sequences of code with respect to vulnerability patterns. An origin-aware dynamic taint analysis technique, to precisely identify the input fields that may trigger potential vulnerabilities. Finally, an evolutionary based test generation technique, to produce relevant inputs. We implemented our approach as an integrated tool chain, and we evaluated it on numerous industrial case studies. The obtained results demonstrate its effectiveness in automatically discovering zero-day vulnerabilities in major closed-source applications. Our approach is relevant to both defensive and offensive security purposes
Morávek, David. "Návrh elektronického obchodu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2008. http://www.nusl.cz/ntk/nusl-221652.
Full textChen, Chieh-wen, and 陳介文. "Antivirus Software Shield against Antivirus Terminators." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/81910129397289190317.
Full text國立中央大學
資訊工程研究所
99
In the near several decades, the arms race between malware writers and system security watchmen has become more and more severe. The simplest way for a user to secure her/his computer while using it is to install antivirus software on her/his computer. As antivirus software becomes more sophisticated and powerful, evading the detection of antivirus software becomes an important part of malware. Without a good approach to bypass the detection of antivirus software, before doing any vicious activity, malware may have already been removed by antivirus software. As a result, malware writers have developed various approaches to increase the survivability and stealth of their malware. And many malware self-defense technologies have been implemented. One of these technologies is to disrupt the functionality of security solutions, especially antivirus software. For example, lot of malware terminates antivirus software right after their execution. Without the protection of the terminated security tool, an attacker can do anything on the intruded host. In this paper, we propose a mechanism, called ANtivirus Software Shield (ANSS), to prevent antivirus software from being terminated without the consciousness of the antivirus software users. ANSS uses SSDT hook to intercept specific Windows APIs and analyzes them to filter out hazardous API calls that will viciously terminate antivirus software. Experimental results show that ANSS can protect antivirus software from being terminated by malware used in our experiments with at most 3.5% performance overhead.
Hsieh, Hsiao-Min, and 謝孝民. "A Study on Growth Strategy of Antivirus Software Companies." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/55500619528011020885.
Full text國立臺灣大學
國際企業學研究所
91
Antivirus software is presented to the public for more than ten years. Trend Micro Incorporation established by Mr. Ming-cheng Chang is well known by its "PC-cillin", antivirus software, in the world, and becomes the top three antivirus software company in less than fifteen years. Furthermore, Trend Micro stepped on to No.6 among the entire Information Security Industry in year 2001. Trend Micro obtained many awards in products and technologies, and was successive elected as best benchmark enterprise in software industry by Common Wealth magazine. Trend Micro, as a Taiwanese company, broke the traditional phenomenon, Western companies dominating the software industry, for taking an important part among top software companies. The achievement of Trend Micro is highly evaluated by our nation as well as society, and its successful strategy becomes a paradigm for Taiwanese software companies. Based on Resource-Based View and Core Competence Theories, this research aims to analyze the growth history of Trend Micro, develop the key successful factors of Trend''s enterprise management, identify decision making processes, core competence building as well as extending procedures, and interpret its key competitive advantages. To be regarded as a reference for software enterprises management, the research faithfully presents the important R&D processes, personal training and marketing strategy of software companies in case study method. Due to the influence of external environment, the definition of software industry changed greatly in recent years. Because of gradual attention to information security, "Information Security" almost becomes a code word for Antivirus Industry. Which growth strategy did Trend Micro adopt when facing severe changes in industrial environment? The research takes Symantec, the No.1 antivirus company, as the other research case to compare with Trend Micro, analyzing the similarities and dissimilarities of strategies between the two companies. The result shows that Trend Micro favors competence-based growth of internal development while Symantec prefers opportunity-based growth of M&A. Besides the influences from industrial environment, internal resources and management strategic thinking, the selection of growth strategy is also affected by interference from alliance partners. To analyze above-mentioned factors of strategy selection, based on Co-optition Theory, the research uses Value Net method to analyze the role played by case companies in industry after strategy selection. The result reveals that software companies must take both "partnership" and "value-added" into consideration without partiality when making important strategic decisions in order to maximize profit and future development.
Books on the topic "Antivirus software"
Technological turf wars: A case study of the antivirus industry. Philadelphia PA: Temple University Press, 2008.
Find full textPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Find full textBlokdyk, Gerardus. Antivirus software: End-To-End Data Analysis. CreateSpace Independent Publishing Platform, 2017.
Find full textYehoshua, Nir, and Uriel Kosayev. Antivirus Bypass Techniques: Learn Practical Techniques and Tactics to Combat, Bypass, and Evade Antivirus Software. Packt Publishing, Limited, 2021.
Find full textFree Antivirus Software Untuk Ubuntu Linux Dan Kali Linux Versi Bahasa Inggris. Blurb, 2021.
Find full textJohnston, Jessica R. Technological Turf Wars: A Case Study of the Computer Antivirus Industry. Temple University Press, 2009.
Find full textAlbert, Jon. PC Computer Security & Backup Guide: How to Secure & Backup Your PC with Antivirus & Malware Software. Lulu Press, Inc., 2020.
Find full textAsensi, Joan Ferrando, and Jon Albert. Guía de Seguridad Informática y Copias de Seguridad para PC: Como Realizar Copias de Seguridad y Proteger Tu PC con Software Antivirus y Antimalware. Babelcube Inc, 2021.
Find full textHilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full textHoffman, Edward J., Matthew Kohut, and Laurence Prusak. The Smart Mission. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/13696.001.0001.
Full textBook chapters on the topic "Antivirus software"
Stone-Gross, Brett, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, and Giovanni Vigna. "The Underground Economy of Fake Antivirus Software." In Economics of Information Security and Privacy III, 55–78. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1981-5_4.
Full textDrakulić, Una, and Edin Mujčić. "A Comparative Performance Analysis of Various Antivirus Software." In Lecture Notes in Networks and Systems, 423–30. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-43056-5_30.
Full textPolakis, Iasonas, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, and Sotiris Ioannidis. "Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software." In Detection of Intrusions and Malware, and Vulnerability Assessment, 165–84. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20550-2_9.
Full textStavova, Vlasta, Vashek Matyas, and Kamil Malinka. "The Challenge of Increasing Safe Response of Antivirus Software Users." In Mathematical and Engineering Methods in Computer Science, 133–43. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29817-7_12.
Full textHuang, Heqing, Kai Chen, Peng Liu, Sencun Zhu, and Dinghao Wu. "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 359–66. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23802-9_27.
Full textWang, Xuguo, Shengzhe Kan, and Yeli Xu. "Embedded Security-Critical Device Resource Isolation." In Communications in Computer and Information Science, 222–34. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_17.
Full textSlade, Robert. "Antiviral Software and Evaluation." In Robert Slade's Guide to Computer Viruses, 137–60. New York, NY: Springer New York, 1994. http://dx.doi.org/10.1007/978-1-4684-0227-8_6.
Full textSlade, Robert. "Antiviral Software and Evaluation." In Guide to Computer Viruses, 145–68. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_6.
Full text"Antivirus Software Evasion." In The Antivirus Hacker's Handbook, 103–16. Indianapolis, IN, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183525.ch6.
Full text"Introduction to Antivirus Software." In The Antivirus Hacker's Handbook, 1–14. Indianapolis, IN, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183525.ch1.
Full textConference papers on the topic "Antivirus software"
Askola, Kreetta, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, and Juha Röning. "Vulnerability Dependencies in Antivirus Software." In 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE). IEEE, 2008. http://dx.doi.org/10.1109/securware.2008.10.
Full textLevesque, Fanny Lalonde, Anil Somayaji, Dennis Batchelder, and Jose M. Fernandez. "Measuring the health of antivirus ecosystems." In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2015. http://dx.doi.org/10.1109/malware.2015.7413690.
Full textFedler, Rafael, Marcel Kulicke, and Julian Schutte. "An antivirus API for Android malware recognition." In 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE). IEEE, 2013. http://dx.doi.org/10.1109/malware.2013.6703688.
Full textChamorro, Eugene, Jianchao Han, and Mohsen Beheshti. "The Design and Implementation of an Antivirus Software Advising System." In 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, 2012. http://dx.doi.org/10.1109/itng.2012.161.
Full textJohnson, Andrew, and Rami J. Haddad. "Evading Signature-Based Antivirus Software Using Custom Reverse Shell Exploit." In SoutheastCon 2021. IEEE, 2021. http://dx.doi.org/10.1109/southeastcon45413.2021.9401881.
Full textBishop, Peter, Robin Bloomfield, Ilir Gashi, and Vladimir Stankovic. "Diversity for Security: A Study with Off-the-Shelf AntiVirus Engines." In 2011 IEEE 22nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2011. http://dx.doi.org/10.1109/issre.2011.15.
Full textGashi, Ilir, Bertrand Sobesto, Stephen Mason, Vladimir Stankovic, and Michel Cukier. "A study of the relationship between antivirus regressions and label changes." In 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2013. http://dx.doi.org/10.1109/issre.2013.6698897.
Full textHuang, Heqing, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, and Dinghao Wu. "Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android." In ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2714576.2714589.
Full textKumar Jha, Animesh, Abhishek Vaish, Simona Sternad Zabukovšek, and Samo Bobek. "A Comparative Study of Metamorphic Malware Detection Techniques." In Challenges in Economics and Business in the Post-COVID Times. University of Maribor Press, 2022. http://dx.doi.org/10.18690/um.epf.5.2022.4.
Full textBotacin, Marcus, Paulo de Geus, and André Grégio. "On the Malware Detection Problem: Challenges & Novel Approaches." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg_estendido.2022.224746.
Full textReports on the topic "Antivirus software"
Falco, Joe, Steve Hurd, and Dave Teumim. Using host-based antivirus software on industrial control systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.1058.
Full text