Academic literature on the topic 'Computer Antivirus'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer Antivirus.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer Antivirus"

1

Manalu, Susi Yanti, and Jamaluddin Jamaluddin. "ANALISIS KEAMANAN ANTI VIRUS BERBASIS WEB." Majalah Ilmiah METHODA 12, no. 2 (2022): 143–46. http://dx.doi.org/10.46880/methoda.vol12no2.pp143-146.

Full text
Abstract:
Along with the rapid development of the use of computers as one of the human tools in various fields of work in life, viruses are certainly one of the threats and obstacles and slow down the work process of the computer system. Anti-virus is a computer program that is a type of software used to prevent, detect, secure, and remove computer viruses from computer systems. Anti-virus is often referred to as virus protection software as well as virus protection software. infected with the virus or not. Viruses usually attack computers that are not protected by anti-virus, but not all antiviruses ca
APA, Harvard, Vancouver, ISO, and other styles
2

Thomas, Remya, and M. Nachamai. "Performance Investigation of Antivirus - A Comparative Analysis." Oriental journal of computer science and technology 10, no. 1 (2017): 201–6. http://dx.doi.org/10.13005/ojcst/10.01.27.

Full text
Abstract:
Antivirus as name implies prevent the devices such as computers, mobiles and pen-drive from viruses. All gadgets which interact with open network are prone to virus. Virus is a malicious software program which replicates by copying its code multiple times or by infecting any computer program (like modifying the existing program) which can affect its process. Virus perform harmful task on affected host computer such as possessing on hard disk, CPU time, accessing private information etc. This paper specifies the performance of (McAFee, Avast, Avira, Bitdefender, Norton) antivirus and its effect
APA, Harvard, Vancouver, ISO, and other styles
3

Nachenberg, Carey. "Computer virus-antivirus coevolution." Communications of the ACM 40, no. 1 (1997): 46–51. http://dx.doi.org/10.1145/242857.242869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Siti Nur Athirah Mohd Zulkifly, Siti Nurul Fitriah Mohamad, Siti Aziemah Che Kob, et al. "Multi-Criteria Decision Making for Computer Antivirus Software using Fuzzy AHP Approach." Journal of Mathematics and Computing Science 8, no. 1 (2022): 12–24. https://doi.org/10.24191/jmcs.v8i1.6971.

Full text
Abstract:
Nowadays, there are many antiviruses software developed by the information sectors to ensure the security of computer systems. As a result, consumers and information professionals are always debating whether antivirus software provides the best protection on a given criterion. However, there are various types of security software out there that can influence users’ decisions. In addition, the determination of the appropriate antivirus software can be classified as a multi-criteria decision-making (MCDM) problem. Several methods could be used to determine the multi-criteria problem such as the
APA, Harvard, Vancouver, ISO, and other styles
5

Haritsah, Ma'arij, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis." Journal of Information System Research (JOSH) 4, no. 2 (2023): 693–700. http://dx.doi.org/10.47065/josh.v4i2.2908.

Full text
Abstract:
Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on a victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It is important for computer users to recognize and avoid malware when using computer devices. Therefore, computer users can overcome malware attacks by using protection software specifically for computer devices using Antivirus software designed to prevent, find, detect, and remove the types of malware that have been mentioned previously. In this study, the dynamic analysi
APA, Harvard, Vancouver, ISO, and other styles
6

Jovanović, Ivan, Milena Cvjetković, and Milovan Cvjetković. "The impact of the application of antivirus programs on the security of computer systems." Bizinfo Blace 15, no. 2 (2024): 11–19. https://doi.org/10.5937/bizinfo2402011j.

Full text
Abstract:
The paper presents a study that analyzes the application of different antivirus programs to reduce negative consequences on computer systems caused by malicious attacks. The research has shown the impact of antivirus programs on protecting computer systems from malicious attacks. The effect of antivirus programs was tested using neural networks. The following network activities were analyzed: payment for antivirus programs, sponsor advertising of antivirus programs, protection against viruses, system requirements, automatic updates, and technical support. The research results showed that the a
APA, Harvard, Vancouver, ISO, and other styles
7

Widarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.

Full text
Abstract:
The use of information technology devices such as computers or laptops is currently increasing. The increased use is due to the fact that these devices are very supportive of our daily work activities. With the increasing use of these computers, data security on a computer or laptop device must be completely safe from virus attacks. To ward off viral attacks m aka requires the application of anti-virus to inhibit and prevent a variety of viruses that enter into the computer system so that the computer user's activity was not bothered by the many viruses are easily spread. Because there are too
APA, Harvard, Vancouver, ISO, and other styles
8

Syarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.

Full text
Abstract:
Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software also known as virus protection software. With this software we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are accessed. In today's antivirus Progress has been transformed and has many uses associated with the virus. But also the computer's performance. The virus code also usually always updated by the antivirus developer. So the computer is ensured its em
APA, Harvard, Vancouver, ISO, and other styles
9

Abdulmalik, Usman Ismail, Nura Abubakar Anka, Shamsudeen Sani Muhammed, and Saidu Aliyu Illo. "A Survey on The Effect of Computer Virus Attacks and Its Preventive Measures Among Computer Users." Kasu Journal of Computer Science 1, no. 2 (2024): 134–50. http://dx.doi.org/10.47514/kjcs/2024.1.2.001.

Full text
Abstract:
Computer use is becoming part of people’s lives, however, there have been considerable threats of computer virus attacks in the recent past. Viruses have had adverse effects on computer resources ranging from loss of data, destruction of computer, stealing of confidential information, damage to credibility and in some cases, mild effects such as slowdown computer performance or message pop-ups appear on the screen. This research studied the effect of computer virus attacks, identify the most common types of computer virus infections, and provide guidelines on how individuals can protect their
APA, Harvard, Vancouver, ISO, and other styles
10

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Full text
Abstract:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical ba
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer Antivirus"

1

Baker, Erik. "Evaluating the Necessity of Third-Party Antivirus Software." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15220.

Full text
Abstract:
Some may assume that it is essential to purchase and install antivirus software to protect the underlying layers of an IT infrastructure. However, nowadays the Windows 10 operating system is shipped with a built-in antivirus feature by default. With Microsoft being a large contender in the antivirus market it raises the question if it is necessary to use third-party antivirus software in a Windows 10 environment.   The aim of this research is to determine the necessity of third-party antivirus software by examining the detection capabilities and measuring the performance impact caused by third
APA, Harvard, Vancouver, ISO, and other styles
2

Jusas, Simonas. "Aktyvaus procesų stebėjimo kompiuteryje programinės įrangos kūrimas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2007. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2007~D_20070816_144337-66662.

Full text
Abstract:
Šis darbas pradedamas nuo dabar kompiuteriui iškylančių grėsmių analizės. Nagrinėjami kenkėjiškos programinės įrangos tipai bei analizuojamos jų veiklos. Tuomet pristatomi populiariausi kovos su kenkėjiška programine įranga įrankiai – antivirusai. Nors antivirusų efektyvumas sprendžiant problemas yra didelis, tačiau jų požiūris į problemos sprendimą nesikeičia jau daugelį metų. Galbūt tas problemas galima spręsti kitaip ir tai daryti nemažesniu efektyvumu? Šis klausimas privertė iškelti teiginį, jog virusų sąrašus pakeitus gerų procesų sąrašu, taip pat sėkmingai būtų galima užtikrinti kompiute
APA, Harvard, Vancouver, ISO, and other styles
3

Kercher, Kellie Elizabeth. "Distributed Agent Cloud-Sourced Malware Reporting Framework." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/4250.

Full text
Abstract:
Malware is a fast growing threat that consists of a malicious script or piece of software that is used to disrupt the integrity of a user's experience. Antivirus software can help protect a user against these threats and there are numerous vendors users can choose from for their antivirus protection. However, each vendor has their own set of virus definitions varying in resources and capabilities in recognizing new threats. Currently, a persistent system is not in place that measures and displays data on the performance of antivirus vendors in responding to new malware over a continuous period
APA, Harvard, Vancouver, ISO, and other styles
4

Arding, Petter, and Hugo Hedelin. "Computer virus : design and detection." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108484.

Full text
Abstract:
Computer viruses uses a few different techniques, with various intentions, toinfect files. However, what most of them have in common is that they wantto avoid detection by anti-malware software. To not get detected and stay unnoticed,virus creators have developed several methods for this. Anti-malwaresoftware is constantly trying to counter these methods of virus infections withtheir own detection-techniques. In this paper we have analyzed the differenttypes of viruses and their infection techniques, and tried to determined whichworks the best to avoid detection. In the experiments we have don
APA, Harvard, Vancouver, ISO, and other styles
5

Bilan, Carolina, and Carl Hedberg. "Säkerhetshot och lösningar för privatpersoner med bredband." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.

Full text
Abstract:
As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats.
APA, Harvard, Vancouver, ISO, and other styles
6

Klimenko, Kyrylo. "Computer-aided drug design of broad-spectrum antiviral compounds." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAF008/document.

Full text
Abstract:
De nouveaux antiviraux à large spectre, agissant comme intercalant d'acides nucléiques, ont été identifiés par criblage virtuel et grâce à des cartes de l’espace chimique. La 1ère partie de la thèse présente le modèle QSPR pour la solubilité aqueuse des molécules organiques dans une grande gamme de températures. Ce modèle a été utilisé pour l'évaluation de la solubilité des composés antiviraux. Dans la 2ème partie de cette thèse, les filtres structuraux, les modèles QSAR et pharmacophores sont présentés. Leur utilisation pour cribler une base de données contenant plus de 3,2 M de composés est
APA, Harvard, Vancouver, ISO, and other styles
7

Borello, Jean-Marie. "Étude du métamorphisme viral : modélisation, conception et détection." Phd thesis, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00660274.

Full text
Abstract:
La protection contre les codes malveillants représente un enjeu majeur. Il suffit de considérer les exemples récents des vers Conficker et Stuxnet pour constater que tout système d'information peut aujourd'hui être la cible de ce type d'attaques. C'est pourquoi, nous abordons dans cette thèse la menace représentée par les codes malveillants et plus particulièrement le cas du métamorphisme. Ce dernier constitue en effet l'aboutissement des techniques d'évolution de codes (" obfuscation ") permettant à un programme d'éviter sa détection. Pour aborder le métamorphisme nous adoptons une double pro
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Jian. "Computer-aided drug design for influenza A virus." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B44205156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Островський, О. О. "Система захисту комп’ютерної інформації від вірусів-шифрувальників". Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khedr, Mohammed Abdou. "Computer-aided drug design and synthesis of novel antivirals." Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54378/.

Full text
Abstract:
The Flaviviridae is a family of 66 viruses of which almost half have been associated with human disease. The most well-known members are: Hepatitis C virus (HCV), Dengue virus (DV), and West Nile virus (WNV). Diseases caused by these viruses are a global health problem that put an estimated 2.5 billion people at risk. At present, there are neither vaccines nor other treatments available to prevent or cure these diseases. Potential targets for the development of therapeutics against the virus are the viral protease and polymerase. The aims of this project are to design and synthesize compounds
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer Antivirus"

1

Corporation, Symantec. Norton AntiVirus for Windows 95: User's guide. Symantec, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Dunod, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Levin, Richard B. Bilgisiyarda viruü antivirüs. Doruk, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Parker, Philip M., and James N. Parker. Valtrex: A medical dictionary, bibliography, and annotated research guide to Internet references. ICON Health, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koret, Joxean, and Elias Bachaalany. Antivirus Hacker's Handbook. Wiley & Sons, Limited, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Koret, Joxean, and Elias Bachaalany. Antivirus Hacker's Handbook. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koret, Joxean, and Elias Bachaalany. Antivirus Hacker's Handbook. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Antivirus Hacker's Handbook. Wiley & Sons, Limited, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shimonski, Robert, Robert J. Shimonski, Laura E. Hunter, and Athar A. Khan. Configuring Symantec AntiVirus Corporate Edition. Syngress, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Norton Antivirus 2006: Madrikh la-mishtamesh. Symantec Corporation, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer Antivirus"

1

Cobb, Chey, and Allysa Myers. "Antivirus Technology." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grishunina, Yulia, and Larisa Manita. "Optimal Antivirus Protection Strategy in Computer Networks." In Analytical and Computational Methods in Probability Theory. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71504-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vasiliadis, Giorgos, and Sotiris Ioannidis. "GrAVity: A Massively Parallel Antivirus Engine." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15512-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Xuguo, Shengzhe Kan, and Yeli Xu. "Embedded Security-Critical Device Resource Isolation." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_17.

Full text
Abstract:
Abstract At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accidents that may cause casualties. In the field of embedded device security, there are many studies, for instance, OPENTEE for ARM handheld devices, providing a secure execution environment for payment devices, and SGX for Intel desk top devices, for security-critical applications, such as bank teller systems, build a safe operating environment. But it is a lack of correlation between
APA, Harvard, Vancouver, ISO, and other styles
5

Gashi, Ilir, Bertrand Sobesto, Vladimir Stankovic, and Michel Cukier. "Does Malware Detection Improve with Diverse AntiVirus Products? An Empirical Study." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40793-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stavova, Vlasta, Vashek Matyas, and Kamil Malinka. "The Challenge of Increasing Safe Response of Antivirus Software Users." In Mathematical and Engineering Methods in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29817-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohanty, Swapnita, Prasant Kumar Nayak, and Saktiprasad Mohanty. "Quarantine Approach to Defend Against Malicious Codes in a Traditional Antivirus Computer Network." In Advances in Energy and Control Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0154-4_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Horne, Dwight. "Green Cybersecurity: An Evaluation of Antivirus Energy Consumption and Implications for Sustainable Software Engineering." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-86637-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Heqing, Kai Chen, Peng Liu, Sencun Zhu, and Dinghao Wu. "Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23802-9_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sundar, Shyam, Sumiti Narayan Tewari, and Niranjan Swaroop. "Understanding Virus Propagation in Computer Networks and Strengthening Security with Antivirus Programs for a Safer Society: A Mathematical Study." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3256-5_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer Antivirus"

1

Wang, Shuangge, Zhilin He, Zihao Xu, Cymra Haskell, and Bhaskar Krishnamachari. "Optimal Control for Antivirus Routing in Epidemiological-Based Heterogeneous Computer Network Clusters." In 2024 American Control Conference (ACC). IEEE, 2024. http://dx.doi.org/10.23919/acc60939.2024.10644719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blancaflor, Eric B., Justine Ryle T. Magleo, Juan Patrick Angelo P. Garcia, Jermaine Roy D. Navarro, and Jagg Aethan Q. Lebosada. "The Usability Assessment of Antivirus Software Using the Unified Theory of Acceptance and Use of Technology (UTAUT) Model." In 2024 17th International Conference on Advanced Computer Theory and Engineering (ICACTE). IEEE, 2024. https://doi.org/10.1109/icacte62428.2024.10871741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Majidifar, Shayan, Fatemeh Nasiri, and Mohsen Hooshmand. "Virus-Antiviral Prediction Using Machine and Deep Learning Methods." In 2024 14th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 2024. https://doi.org/10.1109/iccke65377.2024.10874457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhattacharya, Tathagata, s. Ramyasree Thungapati, Supriya Gurrapu, Anusha Madichetty, and Sai Teja. "STAR Antivirus Software." In 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE). IEEE, 2023. http://dx.doi.org/10.1109/csce60160.2023.00377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Deshpande, Sanjay, Chuanqi Xu, Theodoros Trochatos, et al. "Design of Quantum Computer Antivirus." In 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2023. http://dx.doi.org/10.1109/host55118.2023.10133711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Asli, Mohammed, and Taher Ahmed Ghaleb. "Review of Signature-based Techniques in Antivirus Products." In 2019 International Conference on Computer and Information Sciences (ICCIS). IEEE, 2019. http://dx.doi.org/10.1109/iccisci.2019.8716381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hassan, Mahamat, and Ibrahim Sogukpinar. "Android Malware Variant Detection by Comparing Traditional Antivirus." In 2022 7th International Conference on Computer Science and Engineering (UBMK). IEEE, 2022. http://dx.doi.org/10.1109/ubmk55850.2022.9919458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thamsirarak, Natthanon, Thanayut Seethongchuen, and Paruj Ratanaworabhan. "A case for malware that make antivirus irrelevant." In 2015 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). IEEE, 2015. http://dx.doi.org/10.1109/ecticon.2015.7206972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Z., Aos A., A. W. Naji, Shihab A. Hameed, Fazida Othman, and B. B. Zaidan. "Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File." In 2009 International Association of Computer Science and Information Technology - Spring Conference. IEEE, 2009. http://dx.doi.org/10.1109/iacsit-sc.2009.103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kalsi, Krishna, and Vishal Sharma. "The modern Antivirus security classification model to enhance the protection for commercial computer networks." In 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC). IEEE, 2022. http://dx.doi.org/10.1109/iihc55949.2022.10059622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!