Academic literature on the topic 'Antivirus software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Antivirus software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Antivirus software"

1

Hsu, Fu-Hau, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, and Chieh-Wen Chen. "Antivirus Software Shield Against Antivirus Terminators." IEEE Transactions on Information Forensics and Security 7, no. 5 (October 2012): 1439–47. http://dx.doi.org/10.1109/tifs.2012.2206028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Syarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (January 1, 2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.

Full text
Abstract:
Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software also known as virus protection software. With this software we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are accessed. In today's antivirus Progress has been transformed and has many uses associated with the virus. But also the computer's performance. The virus code also usually always updated by the antivirus developer. So the computer is ensured its empowering. Even by new viruses though.
APA, Harvard, Vancouver, ISO, and other styles
3

Heyman, Karen. "New Attack Tricks Antivirus Software." Computer 40, no. 5 (May 2007): 18–20. http://dx.doi.org/10.1109/mc.2007.179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nurhayati, Ai, and Frencius . "Mapping perception of consumer antivirus software with multidimensional scaling method." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 91–95. http://dx.doi.org/10.34306/csit.v4i3.96.

Full text
Abstract:
Antivirus software industry is growing rapidly in the world in 2018. The domestic antivirus software industrymust be able to compete on a global scale. To face free trade, Indonesia's antivirus software industry must be able toknow its position in the minds of consumers, especially domestic consumers. In this research, Smadav will representthe antivirus software industry from Indonesia. In this research want to know how the position of smadav comparedwith its current competitors, namely Avast, Avira, AVG, Kaspersky, McAfee and Norton. This research is only done tomap antivirus software based on similarity according to respondent's perception. This research uses Multidimensionalscaling (MDS) method through SPSS software program version 23. The results showed that there are three groups ofdifferent antivirus software based on similarity level according to the respondent's perception. On the two-dimensionaland three-dimensional maps Norton antivirus software, Avast and Avira have similar resemblance according to therespondent's perception, because the location is closest and is in the same quadrant. Smadav differs according toperceptions of respondents. AVG, McAfee and Kaspersky have similarities according to respondents' perceptions.
APA, Harvard, Vancouver, ISO, and other styles
5

Nurhayati, Ai, and Frencius Frencius. "Mapping Perception of Consumer Antivirus Software with Multidimensional Scaling Method." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 91–95. http://dx.doi.org/10.11591/aptikom.j.csit.13.

Full text
Abstract:
Antivirus software industry is growing rapidly in the world in 2018. The domestic antivirus software industry must be able to compete on a global scale. To face free trade, Indonesia's antivirus software industry must be able to know its position in the minds of consumers, especially domestic consumers. In this research, Smadav will represent the antivirus software industry from Indonesia.In this research want to know how the position of smadav compared with its current competitors, namely Avast, Avira, AVG, Kaspersky, McAfee and Norton. This research is only done to map antivirus software based on similarity according to respondent's perception.This research uses Multidimensional scaling (MDS) method through SPSS software program version 23. The results showed that there are three groups of different antivirus software based on similarity level according to the respondent's perception.On the two-dimensional and three-dimensional maps Norton antivirus software, Avast and Avira have similar resemblance according to the respondent's perception, because the location is closest and is in the same quadrant. Smadav differs according to perceptions of respondents. AVG, McAfee and Kaspersky have similarities according to respondents' perceptions.
APA, Harvard, Vancouver, ISO, and other styles
6

Haritsah, Ma'arij, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis." Journal of Information System Research (JOSH) 4, no. 2 (January 31, 2023): 693–700. http://dx.doi.org/10.47065/josh.v4i2.2908.

Full text
Abstract:
Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on a victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It is important for computer users to recognize and avoid malware when using computer devices. Therefore, computer users can overcome malware attacks by using protection software specifically for computer devices using Antivirus software designed to prevent, find, detect, and remove the types of malware that have been mentioned previously. In this study, the dynamic analysis method is used to determine malware activity by running it and monitoring the activity that occurs. This method is usually used to identify the actions that malware performs when it runs. The results showed that the higher the number of malware activities, the higher the metrics tested on the antivirus, such as CPU, memory, disk, and scan time. Regarding the removable drive protection feature, Avast antivirus is relatively more efficient compared to other antiviruses because it has an average CPU usage, low memory, a fairly high detection rate, and fast scan times. Kaspersky Antivirus is relatively the most effective in detecting malware samples with the highest detection rate of 100%. Meanwhile, the Windows Defender antivirus is relatively the weakest in terms of detection rate because it has the lowest detection rate.
APA, Harvard, Vancouver, ISO, and other styles
7

Shevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.

Full text
Abstract:
The article is devoted to the problem of information security, namely the study of the characteristics of antivirus programs which are standardized in Ukraine. The study used statistical methods to analyze the characteristics of antivirus software and comparative methods of comparing the various types of such programs. Relying on researches in scientific literature, the main threats to information security in the field of information technology were analyzed. The emphasis is placed on the fact that antivirus software is the most effective protection against malicious software (malware). The basic methods of work of the antivirus – signature and heuristic – are described. The list of standardized in Ukraine antivirus programs is determined. The study was based on the quantitative and qualitative results which while testing had obtained by the independent testing laboratory AV-Comparatives (Austria), the independent Virus Bulletin (VB) laboratory for testing and certification in the field of security, the Center for antivirus protection information of the State Special Communication Service of Ukraine. The comparative analysis of the main characteristics of antivirus programs was carried out, namely: antivirus and anti-spyware; anti-phishing; anti-rootkit protection against exploits; Intrusion Prevention System; Real-time protection; parental control; host-based firewall; antispam; protection against network attacks; home network protection; anti-theft; password management.
APA, Harvard, Vancouver, ISO, and other styles
8

Nurhayati, Ai, Aditya Gautama, and Muchammad Naseer. "Decision making model design for antivirus software selection using Factor Analysis and Analytical Hierarchy Process." MATEC Web of Conferences 154 (2018): 03006. http://dx.doi.org/10.1051/matecconf/201815403006.

Full text
Abstract:
Virus spread increase significantly through the internet in 2017. One of the protection method is using antivirus software. The wide variety of antivirus software in the market tends to creating confusion among consumer. Selecting the right antivirus according to their needs has become difficult. This is the reason we conduct our research. We formulate a decision making model for antivirus software consumer. The model is constructed by using factor analysis and AHP method. First we spread questionnaires to consumer, then from those questionnaires we identified 16 variables that needs to be considered on selecting antivirus software. This 16 variables then divided into 5 factors by using factor analysis method in SPSS software. These five factors are security, performance, internal, time and capacity. To rank those factors we spread questionnaires to 6 IT expert then the data is analyzed using AHP method. The result is that performance factors gained the highest rank from all of the other factors. Thus, consumer can select antivirus software by judging the variables in the performance factors. Those variables are software loading speed, user friendly, no excessive memory use, thorough scanning, and scanning virus fast and accurately.
APA, Harvard, Vancouver, ISO, and other styles
9

Kasuya, Masaki, and Kenji Kono. "Screening Legitimate and Fake/Crude Antivirus Software." IPSJ Online Transactions 7 (2014): 43–51. http://dx.doi.org/10.2197/ipsjtrans.7.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sukwong, Orathai, Hyong Kim, and James Hoe. "Commercial Antivirus Software Effectiveness: An Empirical Study." Computer 44, no. 3 (March 2011): 63–70. http://dx.doi.org/10.1109/mc.2010.187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Antivirus software"

1

Rasool, Muhammad Ahsan, and Abdul Jamal. "Quality of freeware antivirus software." Thesis, Linköpings universitet, Datorteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-74438.

Full text
Abstract:
War between malware and antimalware software started two decade back and have adopted the modern techniques with the evolution of technological development in the field of information technology. This thesis was targeted to analyze the performance of freeware antivirus programs available in the market. Several tests were performed to analyze the performance with respect to the core responsibilities of these software’s to scan and detect the viruses and also prevent and eradicate form them. Although irrelevant for common users may be but very important for technical professionals, many tests were performed to analyze the quality of these softwares with respect to their effects on the system it-self like utilization and engagement of precious resources, processing times and also system slowdown because of monitoring techniques. The results derived from these tests show not only the performance and quality of these softwares but also enlighten some areas to be focused for further analysis.
APA, Harvard, Vancouver, ISO, and other styles
2

Baker, Erik. "Evaluating the Necessity of Third-Party Antivirus Software." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15220.

Full text
Abstract:
Some may assume that it is essential to purchase and install antivirus software to protect the underlying layers of an IT infrastructure. However, nowadays the Windows 10 operating system is shipped with a built-in antivirus feature by default. With Microsoft being a large contender in the antivirus market it raises the question if it is necessary to use third-party antivirus software in a Windows 10 environment.   The aim of this research is to determine the necessity of third-party antivirus software by examining the detection capabilities and measuring the performance impact caused by third-party antivirus software, in comparison with the antivirus service that is integrated with the Windows 10 operating system. This was done by measuring the response time of certain user activities to determine how the user-experience is affected differently by using third-party antivirus software. In addition to the effect on performance, the documentation of the tested products was studied to determine if there is value in using non-integrated antivirus software.   The results of the performance benchmarks showed that overall there was a significant performance increase when using third-party antivirus. Additionally, the study showed that some third-party antivirus software offers more ways to detect malicious activities than Windows Defender Antivirus. These two facts put together suggests that using third-party antivirus software in a Windows 10 environment is necessary if there is a desire to increase the efficiency of performing certain user activities and if there is a desire to have more detection capabilities available.
APA, Harvard, Vancouver, ISO, and other styles
3

Легуша, О. А. "Робота найсучасніших антивірусних програм." Thesis, Вид-во СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/20671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Valouch, Tomáš. "Rozhraní pro jádro antivirového software." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235871.

Full text
Abstract:
This master's thesis is dealing with problematics of antivirus program development. It describe evolution of viruses, antiviruses and it is trying to estimate the future development in this area of interest. There is described a design of graphic user interface for antivirus program. Finally are dicussed possible approaches for implementing the graphics user interface for forementioned antivirus program. Important part of this thesis is part which is dealing with description of implementation of mentioned user interface.
APA, Harvard, Vancouver, ISO, and other styles
5

Doležal, Ladislav. "Analýza trhu bezpečnostního softwaru." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-199249.

Full text
Abstract:
In this thesis, I analyze the global supply of security software (for operating system Win-dows) with a focus on anti-virus programs, which currently mostly implicitly include vari-ous modules of security software. In the first part of my thesis, I will focus on the clarification of issues related to IS / IT se-curity and cybercrime. I describe here the security IS / IT in general, describes the basic concepts and information safety, so that readers gain a basic understanding of this issue. I explain the concept of cybercrime and characterize its main crime. The second part will focus on the clarification of issues relating to security and safety not only domestic, but also corporate computers. I further characterize the greatest threats of our time for PC users and the possibility of prevention. In the third part, I will analyze the security software market analysis due to their market shares and qualifying tests conducted by recognized independent organizations, so to currently provide their full offer. Using the survey I will find out what is the awareness on the selection and use of antivirus software, and on this basis determine what antivirus software are most popular by users.
APA, Harvard, Vancouver, ISO, and other styles
6

Cancellieri, Michela. "Computer-aided design, synthesis and evaluation of novel antiviral compounds." Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/69187/.

Full text
Abstract:
RNA viruses are a major cause of disease that in the last fifteen years counted for frequent outbreaks, infecting both humans and animals. Examples of emerging or ri-emerging viral pathogens are the Foot-and- Mouth disease virus (FMDV) for animals, Chikungunya virus (CHIKV), Coxsackie virus B3 (CVB3) and Respiratory Syncytial virus (RSV) for humans, all responsible for infections associated with mild to severe complications. Although both vaccines and small-molecule compounds are at different stages of development, no selective antiviral drugs have been approved so far, therefore for all four these viruses improved treatment strategies are required. Promising targets are the viral non-structural proteins, which are commonly evaluated for the identification of new antivirals. Starting from the study of different viral proteins, several computer-aided techniques were applied, aiming to identify hit molecules first, and secondly to synthesise new series of potential antiviral compounds. The available crystal structures of some of the proteins that play a role in viral replication were used for structure- and ligand-based virtual screenings of commercially available compounds against CVB3, FMDV and RSV. New families of potential anti-CHIKV compounds were rationally designed and synthesized, in order to establish a structureactivity relationship study on a lead structure previously found in our group. Finally, a de-novo drug design approach was performed to find a suitable scaffold for the synthesis of a series of zinc-ejecting compounds against RSV. Inhibition of virus replication was evaluated for all the new compounds, of which different showed antiviral potential.
APA, Harvard, Vancouver, ISO, and other styles
7

Bekrar, Sofia. "Recherche de vulnérabilités logicielles par combinaison d'analyses de code binaire et de frelatage (Fuzzing)." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM058.

Full text
Abstract:
Le frelatage (ou fuzzing) est l'une des approches les plus efficaces pour la détection de vulnérabilités dans les logiciels de tailles importantes et dont le code source n'est pas disponible. Malgré une utilisation très répandue dans l'industrie, les techniques de frelatage "classique" peuvent avoir des résultats assez limités, et pas toujours probants. Ceci est dû notamment à une faible couverture des programmes testés, ce qui entraîne une augmentation du nombre de faux-négatifs; et un manque de connaissances sur le fonctionnement interne de la cible, ce qui limite la qualité des entrées générées. Nous présentons dans ce travail une approche automatique de recherche de vulnérabilités logicielles par des processus de test combinant analyses avancées de code binaire et frelatage. Cette approche comprend : une technique de minimisation de suite de tests, pour optimiser le rapport entre la quantité de code testé et le temps d'exécution ; une technique d'analyse de couverture optimisée et rapide, pour évaluer l'efficacité du frelatage ; une technique d'analyse statique, pour localiser les séquences de codes potentiellement sensibles par rapport à des patrons de vulnérabilités; une technique dynamique d'analyse de teinte, pour identifier avec précision les zones de l'entrée qui peuvent être à l'origine de déclenchements de vulnérabilités; et finalement une technique évolutionniste de génération de test qui s'appuie sur les résultats des autres analyses, afin d'affiner les critères de décision et d'améliorer la qualité des entrées produites. Cette approche a été mise en œuvre à travers une chaîne d'outils intégrés et évalués sur de nombreuses études de cas fournies par l'entreprise. Les résultats obtenus montrent son efficacité dans la détection automatique de vulnérabilités affectant des applications majeures et sans accès au code source
Fuzz testing (a.k.a. fuzzing) is one of the most effective approaches for discovering security vulnerabilities in large and closed-source software. Despite their wide use in the software industry, traditional fuzzing techniques suffer from a poor coverage, which results in a large number of false negatives. The other common drawback is the lack of knowledge about the application internals. This limits their ability to generate high quality inputs. Thus such techniques have limited fault detection capabilities. We present an automated smart fuzzing approach which combines advanced binary code analysis techniques. Our approach has five components. A test suite reduction technique, to optimize the ratio between the amount of covered code and the execution time. A fast and optimized code coverage measurement technique, to evaluate the fuzzing effectiveness. A static analysis technique, to locate potentially sensitive sequences of code with respect to vulnerability patterns. An origin-aware dynamic taint analysis technique, to precisely identify the input fields that may trigger potential vulnerabilities. Finally, an evolutionary based test generation technique, to produce relevant inputs. We implemented our approach as an integrated tool chain, and we evaluated it on numerous industrial case studies. The obtained results demonstrate its effectiveness in automatically discovering zero-day vulnerabilities in major closed-source applications. Our approach is relevant to both defensive and offensive security purposes
APA, Harvard, Vancouver, ISO, and other styles
8

Morávek, David. "Návrh elektronického obchodu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2008. http://www.nusl.cz/ntk/nusl-221652.

Full text
Abstract:
This thesis deals with a creation of a company´s electronic shopping. On the basis of the knowledge and information acquired from a theoretical part, the suggestion involves the best possibilities of electronic shopping that will lead to a stable and firm position on this kind of market, and to increase of the capital as well as the reputation of the company with potential customers.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Chieh-wen, and 陳介文. "Antivirus Software Shield against Antivirus Terminators." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/81910129397289190317.

Full text
Abstract:
碩士
國立中央大學
資訊工程研究所
99
In the near several decades, the arms race between malware writers and system security watchmen has become more and more severe. The simplest way for a user to secure her/his computer while using it is to install antivirus software on her/his computer. As antivirus software becomes more sophisticated and powerful, evading the detection of antivirus software becomes an important part of malware. Without a good approach to bypass the detection of antivirus software, before doing any vicious activity, malware may have already been removed by antivirus software. As a result, malware writers have developed various approaches to increase the survivability and stealth of their malware. And many malware self-defense technologies have been implemented. One of these technologies is to disrupt the functionality of security solutions, especially antivirus software. For example, lot of malware terminates antivirus software right after their execution. Without the protection of the terminated security tool, an attacker can do anything on the intruded host. In this paper, we propose a mechanism, called ANtivirus Software Shield (ANSS), to prevent antivirus software from being terminated without the consciousness of the antivirus software users. ANSS uses SSDT hook to intercept specific Windows APIs and analyzes them to filter out hazardous API calls that will viciously terminate antivirus software. Experimental results show that ANSS can protect antivirus software from being terminated by malware used in our experiments with at most 3.5% performance overhead.
APA, Harvard, Vancouver, ISO, and other styles
10

Hsieh, Hsiao-Min, and 謝孝民. "A Study on Growth Strategy of Antivirus Software Companies." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/55500619528011020885.

Full text
Abstract:
碩士
國立臺灣大學
國際企業學研究所
91
Antivirus software is presented to the public for more than ten years. Trend Micro Incorporation established by Mr. Ming-cheng Chang is well known by its "PC-cillin", antivirus software, in the world, and becomes the top three antivirus software company in less than fifteen years. Furthermore, Trend Micro stepped on to No.6 among the entire Information Security Industry in year 2001. Trend Micro obtained many awards in products and technologies, and was successive elected as best benchmark enterprise in software industry by Common Wealth magazine. Trend Micro, as a Taiwanese company, broke the traditional phenomenon, Western companies dominating the software industry, for taking an important part among top software companies. The achievement of Trend Micro is highly evaluated by our nation as well as society, and its successful strategy becomes a paradigm for Taiwanese software companies. Based on Resource-Based View and Core Competence Theories, this research aims to analyze the growth history of Trend Micro, develop the key successful factors of Trend''s enterprise management, identify decision making processes, core competence building as well as extending procedures, and interpret its key competitive advantages. To be regarded as a reference for software enterprises management, the research faithfully presents the important R&D processes, personal training and marketing strategy of software companies in case study method. Due to the influence of external environment, the definition of software industry changed greatly in recent years. Because of gradual attention to information security, "Information Security" almost becomes a code word for Antivirus Industry. Which growth strategy did Trend Micro adopt when facing severe changes in industrial environment? The research takes Symantec, the No.1 antivirus company, as the other research case to compare with Trend Micro, analyzing the similarities and dissimilarities of strategies between the two companies. The result shows that Trend Micro favors competence-based growth of internal development while Symantec prefers opportunity-based growth of M&A. Besides the influences from industrial environment, internal resources and management strategic thinking, the selection of growth strategy is also affected by interference from alliance partners. To analyze above-mentioned factors of strategy selection, based on Co-optition Theory, the research uses Value Net method to analyze the role played by case companies in industry after strategy selection. The result reveals that software companies must take both "partnership" and "value-added" into consideration without partiality when making important strategic decisions in order to maximize profit and future development.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Antivirus software"

1

Technological turf wars: A case study of the antivirus industry. Philadelphia PA: Temple University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blokdyk, Gerardus. Antivirus software: End-To-End Data Analysis. CreateSpace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yehoshua, Nir, and Uriel Kosayev. Antivirus Bypass Techniques: Learn Practical Techniques and Tactics to Combat, Bypass, and Evade Antivirus Software. Packt Publishing, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Free Antivirus Software Untuk Ubuntu Linux Dan Kali Linux Versi Bahasa Inggris. Blurb, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Johnston, Jessica R. Technological Turf Wars: A Case Study of the Computer Antivirus Industry. Temple University Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Albert, Jon. PC Computer Security & Backup Guide: How to Secure & Backup Your PC with Antivirus & Malware Software. Lulu Press, Inc., 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Asensi, Joan Ferrando, and Jon Albert. Guía de Seguridad Informática y Copias de Seguridad para PC: Como Realizar Copias de Seguridad y Proteger Tu PC con Software Antivirus y Antimalware. Babelcube Inc, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretically exact matching feature are still relevant when creating information security systems such as network intrusion detection systems, antivirus, anti-spam, and wormcontainment systems. The real time multi-pattern string matching task has been a major performance bottleneck in such systems. To speed up the recognition process, developers use a reconfigurable hardware platform based on FPGA devices. Such platform provides almost software flexibility and near-ASIC performance. The most important component of a signature-based information security system in terms of efficiency is the recognition module, in which the multipattern matching task is directly solved. It must not only check each byte of input data at speeds of tens and hundreds of gigabits/sec against hundreds of thousand or even millions patterns of signature database, but also change its structure every time a new signature appears or the operating conditions of the protected system change. As a result of the analysis of numerous examples of the development of reconfigurable information security systems, three most promising approaches to the construction of hardware circuits of recognition modules were identified, namely, content-addressable memory based on digital comparators, Bloom filter and Aho–Corasick finite automata. A method for fast quantification of components of recognition module and the entire system was proposed. The method makes it possible to exclude resource-intensive procedures for synthesizing digital circuits on FPGAs when building complex reconfigurable information security systems and their components. To improve the efficiency of the systems under study, structural-level combinational methods are proposed, which allow combining into single recognition device several matching schemes built on different approaches and their modifications, in such a way that their advantages are enhanced and disadvantages are eliminated. In order to achieve the maximum efficiency of combining methods, optimization methods are used. The methods of: parallel combining, sequential cascading and vertical junction have been formulated and investigated. The principle of multi-level combining of combining methods is also considered and researched. Algorithms for the implementation of the proposed combining methods have been developed. Software has been created that allows to conduct experiments with the developed methods and tools. Quantitative estimates are obtained for increasing the efficiency of constructing recognition modules as a result of using combination methods. The issue of optimization of reconfigurable devices presented in hardware description languages is considered. A modification of the method of affine transformations, which allows parallelizing such cycles that cannot be optimized by other methods, was presented. In order to facilitate the practical application of the developed methods and tools, a web service using high-performance computer technologies of grid and cloud computing was considered. The proposed methods to increase efficiency of matching procedure can also be used to solve important problems in other fields of science as data mining, analysis of DNA molecules, etc. Keywords: information security, signature, multi-pattern matching, FPGA, structural combining, efficiency, optimization, hardware description language.
APA, Harvard, Vancouver, ISO, and other styles
10

Hoffman, Edward J., Matthew Kohut, and Laurence Prusak. The Smart Mission. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/13696.001.0001.

Full text
Abstract:
Why human skills and expertise, not technical tools, are what make projects succeed. The project is the basic unit of work in many industries. Software applications, antiviral vaccines, launch-ready spacecraft: all were produced by a team and managed as a project. Project management emphasizes control, processes, and tools—but, according to The Smart Mission, that is not the right way to run a project. Human skills and expertise, not technical tools, are what make projects successful. Projects run on knowledge. This paradigm-shifting book—by three project management experts, all of whom have decades of experience at NASA and elsewhere—challenges the conventional wisdom on project management, focusing on the human dimension: learning, collaboration, teaming, communication, and culture. The authors emphasize three themes: projects are fundamentally about how teams work and learn together to get things done; the local level—not an organization's upper levels—is where the action happens; and projects don't operate in a vacuum but exist within organizations that are responsible to stakeholders. Drawing on examples and case studies from NASA and other organizations, the authors identify three project models—micro, macro, and global—and their different knowledge needs. Successful organizations have a knowledge-based culture. Successful project management guides the interplay of knowledge, projects, and people.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Antivirus software"

1

Stone-Gross, Brett, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, and Giovanni Vigna. "The Underground Economy of Fake Antivirus Software." In Economics of Information Security and Privacy III, 55–78. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-1981-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Drakulić, Una, and Edin Mujčić. "A Comparative Performance Analysis of Various Antivirus Software." In Lecture Notes in Networks and Systems, 423–30. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-43056-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Polakis, Iasonas, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, and Sotiris Ioannidis. "Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software." In Detection of Intrusions and Malware, and Vulnerability Assessment, 165–84. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20550-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stavova, Vlasta, Vashek Matyas, and Kamil Malinka. "The Challenge of Increasing Safe Response of Antivirus Software Users." In Mathematical and Engineering Methods in Computer Science, 133–43. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29817-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huang, Heqing, Kai Chen, Peng Liu, Sencun Zhu, and Dinghao Wu. "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 359–66. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23802-9_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Xuguo, Shengzhe Kan, and Yeli Xu. "Embedded Security-Critical Device Resource Isolation." In Communications in Computer and Information Science, 222–34. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_17.

Full text
Abstract:
Abstract At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accidents that may cause casualties. In the field of embedded device security, there are many studies, for instance, OPENTEE for ARM handheld devices, providing a secure execution environment for payment devices, and SGX for Intel desk top devices, for security-critical applications, such as bank teller systems, build a safe operating environment. But it is a lack of correlation between these new and existing technologies. In our opinion, through the combination of mature technology accumulation and embedded devices, the antivirus industry can create a more secure user environment. In this paper, we propose a source isolation method to make the resources used by key processes exclusive. This method uses antivirus software and builds a more comprehensive embedded security system in critical security applications. The experimental results show that the proposed method is effective and safe.
APA, Harvard, Vancouver, ISO, and other styles
7

Slade, Robert. "Antiviral Software and Evaluation." In Robert Slade's Guide to Computer Viruses, 137–60. New York, NY: Springer New York, 1994. http://dx.doi.org/10.1007/978-1-4684-0227-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Slade, Robert. "Antiviral Software and Evaluation." In Guide to Computer Viruses, 145–68. New York, NY: Springer New York, 1996. http://dx.doi.org/10.1007/978-1-4612-2384-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Antivirus Software Evasion." In The Antivirus Hacker's Handbook, 103–16. Indianapolis, IN, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183525.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Introduction to Antivirus Software." In The Antivirus Hacker's Handbook, 1–14. Indianapolis, IN, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183525.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Antivirus software"

1

Askola, Kreetta, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, and Juha Röning. "Vulnerability Dependencies in Antivirus Software." In 2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE). IEEE, 2008. http://dx.doi.org/10.1109/securware.2008.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levesque, Fanny Lalonde, Anil Somayaji, Dennis Batchelder, and Jose M. Fernandez. "Measuring the health of antivirus ecosystems." In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2015. http://dx.doi.org/10.1109/malware.2015.7413690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fedler, Rafael, Marcel Kulicke, and Julian Schutte. "An antivirus API for Android malware recognition." In 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE). IEEE, 2013. http://dx.doi.org/10.1109/malware.2013.6703688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chamorro, Eugene, Jianchao Han, and Mohsen Beheshti. "The Design and Implementation of an Antivirus Software Advising System." In 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, 2012. http://dx.doi.org/10.1109/itng.2012.161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, Andrew, and Rami J. Haddad. "Evading Signature-Based Antivirus Software Using Custom Reverse Shell Exploit." In SoutheastCon 2021. IEEE, 2021. http://dx.doi.org/10.1109/southeastcon45413.2021.9401881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bishop, Peter, Robin Bloomfield, Ilir Gashi, and Vladimir Stankovic. "Diversity for Security: A Study with Off-the-Shelf AntiVirus Engines." In 2011 IEEE 22nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2011. http://dx.doi.org/10.1109/issre.2011.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gashi, Ilir, Bertrand Sobesto, Stephen Mason, Vladimir Stankovic, and Michel Cukier. "A study of the relationship between antivirus regressions and label changes." In 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2013. http://dx.doi.org/10.1109/issre.2013.6698897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Heqing, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, and Dinghao Wu. "Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android." In ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2714576.2714589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar Jha, Animesh, Abhishek Vaish, Simona Sternad Zabukovšek, and Samo Bobek. "A Comparative Study of Metamorphic Malware Detection Techniques." In Challenges in Economics and Business in the Post-COVID Times. University of Maribor Press, 2022. http://dx.doi.org/10.18690/um.epf.5.2022.4.

Full text
Abstract:
Malware is a major threat in the evolving global cyber space. The different detection techniques that currently exist are insufficient at detecting metamorphic malware, as they can change the internal structure of their code, thus keeping the flow of the programme equivalent to the virus. Commercial antivirus software depends on signature detection algorithms to identify viruses, however, code obfuscation techniques can successfully circumvent these algorithms. The objective of this research is to analyse the various detection techniques of such metamorphic malware used over the years and to unearth the strengths, weaknesses and advance research directions possible in the field of the detection of metamorphic malware.
APA, Harvard, Vancouver, ISO, and other styles
10

Botacin, Marcus, Paulo de Geus, and André Grégio. "On the Malware Detection Problem: Challenges & Novel Approaches." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg_estendido.2022.224746.

Full text
Abstract:
Many solutions to detect malware have been proposed over time, but effective and efficient malware detection still remains an open problem. In this work, I take a look at some malware detection challenges and pitfalls to contribute towards increasing system’s malware detection capabilities. I propose a new approach to tackle malware research in a practical but still scientific manner and leverage this approach to investigate four issues: (i) the need for understanding context to allow proper detection of localized threats; (ii) the need for developing better metrics for AntiVirus (AV) evaluation; (iii) the feasibility of leveraging hardware-software collaboration for efficient AV implementation, and (iv) the need for predicting future threats to allow faster incident responses.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Antivirus software"

1

Falco, Joe, Steve Hurd, and Dave Teumim. Using host-based antivirus software on industrial control systems :. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.1058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography