Journal articles on the topic 'Antivirus software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Antivirus software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hsu, Fu-Hau, Min-Hao Wu, Chang-Kuo Tso, Chi-Hsien Hsu, and Chieh-Wen Chen. "Antivirus Software Shield Against Antivirus Terminators." IEEE Transactions on Information Forensics and Security 7, no. 5 (October 2012): 1439–47. http://dx.doi.org/10.1109/tifs.2012.2206028.
Full textSyarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (January 1, 2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.
Full textHeyman, Karen. "New Attack Tricks Antivirus Software." Computer 40, no. 5 (May 2007): 18–20. http://dx.doi.org/10.1109/mc.2007.179.
Full textNurhayati, Ai, and Frencius . "Mapping perception of consumer antivirus software with multidimensional scaling method." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (January 27, 2020): 91–95. http://dx.doi.org/10.34306/csit.v4i3.96.
Full textNurhayati, Ai, and Frencius Frencius. "Mapping Perception of Consumer Antivirus Software with Multidimensional Scaling Method." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (November 1, 2019): 91–95. http://dx.doi.org/10.11591/aptikom.j.csit.13.
Full textHaritsah, Ma'arij, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis." Journal of Information System Research (JOSH) 4, no. 2 (January 31, 2023): 693–700. http://dx.doi.org/10.47065/josh.v4i2.2908.
Full textShevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.
Full textNurhayati, Ai, Aditya Gautama, and Muchammad Naseer. "Decision making model design for antivirus software selection using Factor Analysis and Analytical Hierarchy Process." MATEC Web of Conferences 154 (2018): 03006. http://dx.doi.org/10.1051/matecconf/201815403006.
Full textKasuya, Masaki, and Kenji Kono. "Screening Legitimate and Fake/Crude Antivirus Software." IPSJ Online Transactions 7 (2014): 43–51. http://dx.doi.org/10.2197/ipsjtrans.7.43.
Full textSukwong, Orathai, Hyong Kim, and James Hoe. "Commercial Antivirus Software Effectiveness: An Empirical Study." Computer 44, no. 3 (March 2011): 63–70. http://dx.doi.org/10.1109/mc.2010.187.
Full textCollinson, Helen. "Taking the measure of NetWare antivirus software." Computers & Security 14, no. 6 (January 1995): 522. http://dx.doi.org/10.1016/0167-4048(95)99326-k.
Full textGarba, Faisal A., Rosemary M. Dima, A. Balarabe Isa, A. Abdulrazaq Bello, A. Sarki Aliyu, F. Umar Yarima, and S. Abbas Ibrahim. "Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System." Journal of Cybersecurity and Information Management 10, no. 1 (2022): 18–33. http://dx.doi.org/10.54216/jcim.090105.
Full textBohra, Vanshika. "Antivirus Software, its Working Techniques, Drawbacks and an Account on Fake Antivirus Programs." International Journal for Research in Applied Science and Engineering Technology 9, no. 5 (May 31, 2021): 14–17. http://dx.doi.org/10.22214/ijraset.2021.34027.
Full textManalu, Susi Yanti, and Jamaluddin Jamaluddin. "ANALISIS KEAMANAN ANTI VIRUS BERBASIS WEB." Majalah Ilmiah METHODA 12, no. 2 (August 31, 2022): 143–46. http://dx.doi.org/10.46880/methoda.vol12no2.pp143-146.
Full textMin, Byungho, Vijay Varadharajan, Udaya Tupakula, and Michael Hitchens. "Antivirus security: naked during updates." Software: Practice and Experience 44, no. 10 (April 22, 2013): 1201–22. http://dx.doi.org/10.1002/spe.2197.
Full textSamociuk, Dominik. "Antivirus Evasion Methods in Modern Operating Systems." Applied Sciences 13, no. 8 (April 19, 2023): 5083. http://dx.doi.org/10.3390/app13085083.
Full textKurniawati, Ana, and Ardiansyah Ardiansyah. "ANALISIS PERFORMA PERANGKAT LUNAK ANTIVIRUS DENGAN MENGGUNAKAN METODOLOGI PENGUKURAN PERFORMANCE." Jurnal Ilmiah Matrik 22, no. 1 (March 30, 2020): 43–54. http://dx.doi.org/10.33557/jurnalmatrik.v22i1.838.
Full textTHANOON, Karam H., Basim MAHMOOD, and Marwah M. A. DABDAWB. "THE EFFECT OF MALWARE’S APIS RELATIONS ON SOFTWARE SECURITY DESIGN." MINAR International Journal of Applied Sciences and Technology 4, no. 1 (March 1, 2022): 1–157. http://dx.doi.org/10.47832/2717-8234.10.14.
Full textAditiawarman, Umar, Alfian Dody, Teddy Mantoro, Haris Al Qodri Maarif, and Anggy Pradiftha. "Evading Antivirus Software Detection Using Python and PowerShell Obfuscation Framework." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 22, no. 3 (July 14, 2023): 519–28. http://dx.doi.org/10.30812/matrik.v22i3.3088.
Full textKoloseni, Daniel, and Eliamani Mathew Sedoyeka. "The Adoption of Security Control Apps among Smartphone Users in Tanzania." International Journal of Technology Diffusion 10, no. 4 (October 2019): 1–18. http://dx.doi.org/10.4018/ijtd.2019100101.
Full textNazarenko, M. A., A. I. Gorobets, D. V. Miskov, V. V. Muravyev, and A. S. Novikov. "ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA." Russian Technological Journal 7, no. 1 (February 28, 2019): 48–56. http://dx.doi.org/10.32362/2500-316x-2019-7-1-48-56.
Full textAndrushchak, І. Ye, Y. Y. Matviiv, and V. A. Koshelyuk. "Components of viruses and antivirus software in modern information security." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 48 (October 1, 2022): 26–30. http://dx.doi.org/10.36910/6775-2524-0560-2022-48-04.
Full textMamaghani, Farrokh. "Evaluation and selection of an antivirus and content filtering software." Information Management & Computer Security 10, no. 1 (March 2002): 28–32. http://dx.doi.org/10.1108/09685220210417481.
Full textPérez-Sánchez, Antonio, and Rafael Palacios. "Evaluation of Local Security Event Management System vs. Standard Antivirus Software." Applied Sciences 12, no. 3 (January 20, 2022): 1076. http://dx.doi.org/10.3390/app12031076.
Full textMeghana, Kvs, and S. Sivaprasad. "Comparative Analysis of Antiviral Properties of Carbohydrates Derivatives over Commercial Antiviral Drugs." CARDIOMETRY, no. 25 (February 14, 2023): 1577–83. http://dx.doi.org/10.18137/cardiometry.2022.25.15771583.
Full textThomas, Remya, and M. Nachamai. "Performance Investigation of Antivirus - A Comparative Analysis." Oriental journal of computer science and technology 10, no. 1 (March 24, 2017): 201–6. http://dx.doi.org/10.13005/ojcst/10.01.27.
Full textO. E., Rubtsov, Norkina A. N., and Chicherov K.A. "Information Protection Tools for Android-based Mobile Devices." KnE Social Sciences 3, no. 2 (February 15, 2018): 235. http://dx.doi.org/10.18502/kss.v3i2.1548.
Full textMoussas, Vassilios, and Antonios Andreatos. "Malware Detection Based on Code Visualization and Two-Level Classification." Information 12, no. 3 (March 11, 2021): 118. http://dx.doi.org/10.3390/info12030118.
Full textHsu, Jane Lu, and Ya-Lan Su. "USAGE OF UNAUTHORIZED SOFTWARE IN TAIWAN." Social Behavior and Personality: an international journal 36, no. 1 (January 1, 2008): 1–8. http://dx.doi.org/10.2224/sbp.2008.36.1.1.
Full textChevychelov, A. V., A. V. Burmistrov, and K. Yu Voyshhev. "Detecting malicious software using machine learning." Issues of radio electronics, no. 11 (November 20, 2019): 42–45. http://dx.doi.org/10.21778/2218-5453-2019-11-42-45.
Full textTikhomirov, Pavel A. "Lessons of Centralized Procurement of Domestic Office and Antivirus Software in 2019–2020 Years." Economic Strategies 144, no. 5 (October 20, 2021): 122–33. http://dx.doi.org/10.33917/es-5.179.2021.122-133.
Full textAl-Saleh, Mohammed Ibrahim, Antonio M. Espinoza, and Jedediah R. Crandall. "Antivirus performance characterisation: system-wide view." IET Information Security 7, no. 2 (June 1, 2013): 126–33. http://dx.doi.org/10.1049/iet-ifs.2012.0192.
Full textSuryanti, Etik, Abdul Rahem, and Anita Purnamayanti. "PROFIL PENGGUNAAN OBAT ANTIVIRUS COVID-19 DI RSUD dr. MURJANI-SAMPIT." Jurnal Ilmiah Ibnu Sina (JIIS): Ilmu Farmasi dan Kesehatan 7, no. 1 (March 29, 2022): 116–23. http://dx.doi.org/10.36387/jiis.v7i1.842.
Full textA. Incherevsky, A. "Replacement of imported software for modern Russian companies and businesses." Upravlenie kachestvom (Quality management), no. 4 (March 10, 2023): 22–30. http://dx.doi.org/10.33920/pro-01-2304-04.
Full textLu, Xiaofeng, Fei Wang, Cheng Jiang, and Pietro Lio. "A Universal Malicious Documents Static Detection Framework Based on Feature Generalization." Applied Sciences 11, no. 24 (December 20, 2021): 12134. http://dx.doi.org/10.3390/app112412134.
Full textSAPUTRI, SEVTY WAHIDDIRANI. "PEMILIHAN SOFTWARE ANTIVIRUS UNTUK LABORATORIUM KOMPUTER AKUNTANSI DENGAN METODE AHP ( ANALYTICAL HIERARCHY PROCESS )." Jurnal Akuntansi : Kajian Ilmiah Akuntansi (JAK) 5, no. 2 (July 14, 2018): 159. http://dx.doi.org/10.30656/jak.v5i2.672.
Full textSahara, Sucitra, Rizqi Agung Permana, and Hariyanto Hariyanto. "Particle Swarm Optimization pada Analisa Review Software Antivirus Menggunakan Metode K-Nearest Neighbors." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (June 2, 2020): 123. http://dx.doi.org/10.51211/itbi.v4i2.1313.
Full textGordon, Sarah. "A short course in antivirus software testing: seven simple rules for evaluating tests." Network Security 2004, no. 6 (June 2004): 17–18. http://dx.doi.org/10.1016/s1353-4858(04)00094-7.
Full textJardine, Eric. "The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity." Risk Analysis 40, no. 8 (June 22, 2020): 1571–88. http://dx.doi.org/10.1111/risa.13534.
Full textAstakhov, D. S., N. O. Lysenko, V. B. Mazurenko, and А. I. Fedorovych. "Analysis of Modern Anti-Virus Software in Cyber Security Tasks." Science and Transport Progress, no. 5(95) (October 18, 2021): 27–35. http://dx.doi.org/10.15802/stp2021/253290.
Full textBavishi, Ujaliben Kalpesh, and Bhavesh Madanlal Jain. "Malware Analysis." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (January 3, 2018): 27. http://dx.doi.org/10.23956/ijarcsse.v7i12.507.
Full textAnisimov, V. G., E. G. Anisimov, T. N. Saurenko, and V. P. Los’. "Performance Evaluation of Antivirus Systems for Computer Networks." Automatic Control and Computer Sciences 56, no. 8 (December 2022): 883–87. http://dx.doi.org/10.3103/s0146411622080016.
Full textShukla, J. B., Gaurav Singh, Poonam Shukla, and Agraj Tripathi. "Modeling and analysis of the effects of antivirus software on an infected computer network." Applied Mathematics and Computation 227 (January 2014): 11–18. http://dx.doi.org/10.1016/j.amc.2013.10.091.
Full textNtantogian, Christoforos, Georgios Poulios, Georgios Karopoulos, and Christos Xenakis. "Transforming malicious code to ROP gadgets for antivirus evasion." IET Information Security 13, no. 6 (November 1, 2019): 570–78. http://dx.doi.org/10.1049/iet-ifs.2018.5386.
Full textRodriguez, Miranda. "All Your IP Are Belong to Us." Texas A&M Law Review 3, no. 3 (May 2016): 663–89. http://dx.doi.org/10.37419/lr.v3.i3.7.
Full textSun, Haitao, Chengjie Jin, Xiaohan Helu, Hui Lu, Man Zhang, and Zhihong Tian. "Research on android infiltration technology based on the silent installation of an accessibility service." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090362. http://dx.doi.org/10.1177/1550147720903628.
Full textKhumaidi, Ach, and Astik Umiyah. "Potential Antivirus Viral Nervous Necrosis Methanol extract of Amphora sp. in Cantang Grouper (Epinephelus sp.)." Samakia : Jurnal Ilmu Perikanan 10, no. 2 (October 23, 2019): 114–20. http://dx.doi.org/10.35316/jsapi.v10i2.538.
Full textYang, Xiaofan, Bei Liu, and Chenquan Gan. "Global Stability of an Epidemic Model of Computer Virus." Abstract and Applied Analysis 2014 (2014): 1–5. http://dx.doi.org/10.1155/2014/456320.
Full textDong, Tao, Xiaofeng Liao, and Huaqing Li. "Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus." Abstract and Applied Analysis 2012 (2012): 1–16. http://dx.doi.org/10.1155/2012/841987.
Full textKosyakina, Anastasia, and Alina Podlesnaya. "Counteraction to Monopolistic Activity in the Field of Software on the Example of Cases against Microsoft." Scientific Research of Faculty of Economics. Electronic Journal 10, no. 2 (June 28, 2018): 29–52. http://dx.doi.org/10.38050/2078-3809-2018-10-2-29-52.
Full text