To see the other types of publications on this topic, follow the link: Computer Antivirus.

Journal articles on the topic 'Computer Antivirus'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer Antivirus.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Manalu, Susi Yanti, and Jamaluddin Jamaluddin. "ANALISIS KEAMANAN ANTI VIRUS BERBASIS WEB." Majalah Ilmiah METHODA 12, no. 2 (2022): 143–46. http://dx.doi.org/10.46880/methoda.vol12no2.pp143-146.

Full text
Abstract:
Along with the rapid development of the use of computers as one of the human tools in various fields of work in life, viruses are certainly one of the threats and obstacles and slow down the work process of the computer system. Anti-virus is a computer program that is a type of software used to prevent, detect, secure, and remove computer viruses from computer systems. Anti-virus is often referred to as virus protection software as well as virus protection software. infected with the virus or not. Viruses usually attack computers that are not protected by anti-virus, but not all antiviruses ca
APA, Harvard, Vancouver, ISO, and other styles
2

Thomas, Remya, and M. Nachamai. "Performance Investigation of Antivirus - A Comparative Analysis." Oriental journal of computer science and technology 10, no. 1 (2017): 201–6. http://dx.doi.org/10.13005/ojcst/10.01.27.

Full text
Abstract:
Antivirus as name implies prevent the devices such as computers, mobiles and pen-drive from viruses. All gadgets which interact with open network are prone to virus. Virus is a malicious software program which replicates by copying its code multiple times or by infecting any computer program (like modifying the existing program) which can affect its process. Virus perform harmful task on affected host computer such as possessing on hard disk, CPU time, accessing private information etc. This paper specifies the performance of (McAFee, Avast, Avira, Bitdefender, Norton) antivirus and its effect
APA, Harvard, Vancouver, ISO, and other styles
3

Nachenberg, Carey. "Computer virus-antivirus coevolution." Communications of the ACM 40, no. 1 (1997): 46–51. http://dx.doi.org/10.1145/242857.242869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Siti Nur Athirah Mohd Zulkifly, Siti Nurul Fitriah Mohamad, Siti Aziemah Che Kob, et al. "Multi-Criteria Decision Making for Computer Antivirus Software using Fuzzy AHP Approach." Journal of Mathematics and Computing Science 8, no. 1 (2022): 12–24. https://doi.org/10.24191/jmcs.v8i1.6971.

Full text
Abstract:
Nowadays, there are many antiviruses software developed by the information sectors to ensure the security of computer systems. As a result, consumers and information professionals are always debating whether antivirus software provides the best protection on a given criterion. However, there are various types of security software out there that can influence users’ decisions. In addition, the determination of the appropriate antivirus software can be classified as a multi-criteria decision-making (MCDM) problem. Several methods could be used to determine the multi-criteria problem such as the
APA, Harvard, Vancouver, ISO, and other styles
5

Haritsah, Ma'arij, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis." Journal of Information System Research (JOSH) 4, no. 2 (2023): 693–700. http://dx.doi.org/10.47065/josh.v4i2.2908.

Full text
Abstract:
Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on a victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It is important for computer users to recognize and avoid malware when using computer devices. Therefore, computer users can overcome malware attacks by using protection software specifically for computer devices using Antivirus software designed to prevent, find, detect, and remove the types of malware that have been mentioned previously. In this study, the dynamic analysi
APA, Harvard, Vancouver, ISO, and other styles
6

Jovanović, Ivan, Milena Cvjetković, and Milovan Cvjetković. "The impact of the application of antivirus programs on the security of computer systems." Bizinfo Blace 15, no. 2 (2024): 11–19. https://doi.org/10.5937/bizinfo2402011j.

Full text
Abstract:
The paper presents a study that analyzes the application of different antivirus programs to reduce negative consequences on computer systems caused by malicious attacks. The research has shown the impact of antivirus programs on protecting computer systems from malicious attacks. The effect of antivirus programs was tested using neural networks. The following network activities were analyzed: payment for antivirus programs, sponsor advertising of antivirus programs, protection against viruses, system requirements, automatic updates, and technical support. The research results showed that the a
APA, Harvard, Vancouver, ISO, and other styles
7

Widarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.

Full text
Abstract:
The use of information technology devices such as computers or laptops is currently increasing. The increased use is due to the fact that these devices are very supportive of our daily work activities. With the increasing use of these computers, data security on a computer or laptop device must be completely safe from virus attacks. To ward off viral attacks m aka requires the application of anti-virus to inhibit and prevent a variety of viruses that enter into the computer system so that the computer user's activity was not bothered by the many viruses are easily spread. Because there are too
APA, Harvard, Vancouver, ISO, and other styles
8

Syarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.

Full text
Abstract:
Antivirus is a type of software used to detect existing viruses on the computer system. Antivirus software also known as virus protection software. With this software we can find out whether a computer system is exposed to a virus or not. In general, this software runs in the background or the background, and also perform a scan of all files that are accessed. In today's antivirus Progress has been transformed and has many uses associated with the virus. But also the computer's performance. The virus code also usually always updated by the antivirus developer. So the computer is ensured its em
APA, Harvard, Vancouver, ISO, and other styles
9

Abdulmalik, Usman Ismail, Nura Abubakar Anka, Shamsudeen Sani Muhammed, and Saidu Aliyu Illo. "A Survey on The Effect of Computer Virus Attacks and Its Preventive Measures Among Computer Users." Kasu Journal of Computer Science 1, no. 2 (2024): 134–50. http://dx.doi.org/10.47514/kjcs/2024.1.2.001.

Full text
Abstract:
Computer use is becoming part of people’s lives, however, there have been considerable threats of computer virus attacks in the recent past. Viruses have had adverse effects on computer resources ranging from loss of data, destruction of computer, stealing of confidential information, damage to credibility and in some cases, mild effects such as slowdown computer performance or message pop-ups appear on the screen. This research studied the effect of computer virus attacks, identify the most common types of computer virus infections, and provide guidelines on how individuals can protect their
APA, Harvard, Vancouver, ISO, and other styles
10

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Full text
Abstract:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical ba
APA, Harvard, Vancouver, ISO, and other styles
11

DARAJAT, PANGESTUTI PRIMA, and TYAS HUSADANINGSIH. "KONTROL OPTIMAL PADA MODEL PENYEBARAN VIRUS KOMPUTER DENGAN KLASIFIKASI PENGAMANAN." E-Jurnal Matematika 8, no. 4 (2019): 253. http://dx.doi.org/10.24843/mtk.2019.v08.i04.p261.

Full text
Abstract:
In this paper, a model of the spread of computer viruses with security classification and nonlinear infection rates is formulated. From the short analysis, is found that the model does not have a virus-free equilibrium point. This show that the virus will always exist in the system and increasingly that can not be avoided. Therefore, control strategy by installing antivirus on subpopulation susceptible low-security level and infective subpopulation aims to minimize the number of infective computers, and minimize the cost related to these strategies. Hence, an important tool, in this case is, o
APA, Harvard, Vancouver, ISO, and other styles
12

Mrs, A. Nalini. "Foray Spotlight System." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 1078–80. https://doi.org/10.31142/ijtsrd18811.

Full text
Abstract:
This Project "Foray spotlight system" is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for computers. Once it enters into the computer it will corrupt the files. Foray spotlight system acts like an antivirus software. It detects malwares like other antivirus software's, but it has some more additional advantages. Malwares are easily spread over the computer at the time of connecting the external devices like Pen drive, Car
APA, Harvard, Vancouver, ISO, and other styles
13

Scott, Ralph L. "Wired to the World: Spyware." North Carolina Libraries 61, no. 4 (2009): 154. http://dx.doi.org/10.3776/ncl.v61i4.180.

Full text
Abstract:
Antivirus programs monitor your computer to detect viruses, while firewalls block access to your computer by hackers. Common antivirus programs and firewalls do not protect your computer against Spyware.Spyware comes attached to programs or Web pages that you want to use and that you have allowed to be placed on your computer willingly. Spyware programs are very invasive. They track your keystrokes, keep a record of which Web sites you have visited, suddenly redirect yourbrowser to a page you did not select, or even crash the browser completely.
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Xiaofan, Bei Liu, and Chenquan Gan. "Global Stability of an Epidemic Model of Computer Virus." Abstract and Applied Analysis 2014 (2014): 1–5. http://dx.doi.org/10.1155/2014/456320.

Full text
Abstract:
With the rapid popularization of the Internet, computers can enter or leave the Internet increasingly frequently. In fact, no antivirus software can detect and remove all sorts of computer viruses. This implies that viruses would persist on the Internet. To better understand the spread of computer viruses in these situations, a new propagation model is established and analyzed. The unique equilibrium of the model is globally asymptotically stable, in accordance with the reality. A parameter analysis of the equilibrium is also conducted.
APA, Harvard, Vancouver, ISO, and other styles
15

Stoll, Barbara J., and Roger I. Glass. "Potential antitussive effects of a computer antivirus program." Lancet 349, no. 9045 (1997): 140. http://dx.doi.org/10.1016/s0140-6736(05)60933-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Anisimov, V. G., E. G. Anisimov, T. N. Saurenko, and V. P. Los’. "Performance Evaluation of Antivirus Systems for Computer Networks." Automatic Control and Computer Sciences 56, no. 8 (2022): 883–87. http://dx.doi.org/10.3103/s0146411622080016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hsu, Fu-Hau, Chia-Hao Lee, Ting Luo, Ting-Cheng Chang, and Min-Hao Wu. "A Cloud-Based Real-Time Mechanism to Protect End Hosts against Malware." Applied Sciences 9, no. 18 (2019): 3748. http://dx.doi.org/10.3390/app9183748.

Full text
Abstract:
Nowadays, antivirus is one of the most popular tools used to protect computer systems. Diverse antivirus vendors are established to protect their customers against malware. However, antivirus is facing some critical problems, such as significant detection windows, vulnerability inside antivirus, and long scanning time. In this paper, we recommend a cloud-based real-time defense mechanism named Skywalker to allow users to safely utilize antivirus without the above problems. After Skywalker is installed in a host, the host does not need to install any antivirus. However, Skywalker guarantees tha
APA, Harvard, Vancouver, ISO, and other styles
18

Meng, Ji. "Research on Common Virus Properties in Computer Lab." Advanced Materials Research 926-930 (May 2014): 2803–6. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2803.

Full text
Abstract:
This paper probes into the properties common virus in computer lab, such as damage effect, communication mechanism and self-protection mechanism, and carries out the important referring materials for Systemic antivirus program of lab based on Restore & Protect Technology.
APA, Harvard, Vancouver, ISO, and other styles
19

Peng, Mei, Xing He, Junjian Huang, and Tao Dong. "Modeling Computer Virus and Its Dynamics." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/842614.

Full text
Abstract:
Based on that the computer will be infected by infected computer and exposed computer, and some of the computers which are in suscepitible status and exposed status can get immunity by antivirus ability, a novel coumputer virus model is established. The dynamic behaviors of this model are investigated. First, the basic reproduction numberR0, which is a threshold of the computer virus spreading in internet, is determined. Second, this model has a virus-free equilibriumP0, which means that the infected part of the computer disappears, and the virus dies out, andP0is a globally asymptotically sta
APA, Harvard, Vancouver, ISO, and other styles
20

Razi, Nausheen, Muhammad Bilal Riaz, Ambreen Bano, Tayyab Kamran, Umar Ishtiaq, and Anum Shafiq. "Applying fractional calculus to malware spread: A fractal-based approach to threat analysis." PLOS ONE 20, no. 1 (2025): e0313914. https://doi.org/10.1371/journal.pone.0313914.

Full text
Abstract:
Malware is a common word in modern era. Everyone using computer is aware of it. Some users have to face the problem known as Cyber crimes. Nobody can survive without use of modern technologies based on computer networking. To avoid threat of malware, different companies provide antivirus strategies on a high cost. To prevent the data and keep privacy, companies using computers have to buy these antivirus programs (software). Software varies due to types of malware and is developed on structure of malware with a deep insight on behavior of nodes. We selected a mathematical malware propagation m
APA, Harvard, Vancouver, ISO, and other styles
21

Terekhov, V. I., A. N. Stadnik, K. S. Skryl, I. I. Korovin, and E. R. Bashaeva. "Theoretical foundations for implementation of methodological apparatus to optimize mechanisms of resident type antivirus protection." Telecommunications, no. 1 (2024): 25–29. http://dx.doi.org/10.31044/1684-2588-2024-0-1-25-29.

Full text
Abstract:
The urgency of the problem of improving the methodological apparatus, which allows to scientifically substantiate the conditions for the effective use of resident-type antivirus tools in computer systems, is stated. The possibility of solving this problem by optimizing the time resources of these systems is being considered. The formal representation of the indicator of the timeliness of the implementation of the information process in a computer system is substantiated. The theoretical grounds for the development of a methodological apparatus for optimizing the mechanisms of resident-type ant
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Zizhen, and Huizhong Yang. "Stability and Hopf Bifurcation for a Delayed SLBRS Computer Virus Model." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/373171.

Full text
Abstract:
By incorporating the time delay due to the period that computers use antivirus software to clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed in this paper. The dynamical behaviors which include local stability and Hopf bifurcation are investigated by regarding the delay as bifurcating parameter. Specially, direction and stability of the Hopf bifurcation are derived by applying the normal form method and center manifold theory. Finally, an illustrative example is also presented to testify our analytical results.
APA, Harvard, Vancouver, ISO, and other styles
23

Bogosi, Monyamane. "An Analysis of Internet Security Challenges Faced By Organisations in Botswana: The Reviewed Literature." American Based Research Journal - ISSN (2304-7151) 10, no. 03 (2021): 112–22. https://doi.org/10.5281/zenodo.4678397.

Full text
Abstract:
<em>The purpose of this paper was to&nbsp;analyse&nbsp;internet security challenges faced by organisations in Botswana. The paper used the Qualitative Content Analysis approach to analyse secondary data from published articles, conference papers, news articles and government publications that provided statistical data about internet security issues that have been reported by organisations in Botswana and other countries. This paper recommended solutions to internet security challenges faced by organisations as follows: Ensuring that all computers are installed with genuine antivirus software;
APA, Harvard, Vancouver, ISO, and other styles
24

Dong, Tao, Xiaofeng Liao, and Huaqing Li. "Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus." Abstract and Applied Analysis 2012 (2012): 1–16. http://dx.doi.org/10.1155/2012/841987.

Full text
Abstract:
By considering that people may immunize their computers with countermeasures in susceptible state, exposed state and using anti-virus software may take a period of time, a computer virus model with time delay based on an SEIR model is proposed. We regard time delay as bifurcating parameter to study the dynamical behaviors which include local asymptotical stability and local Hopf bifurcation. By analyzing the associated characteristic equation, Hopf bifurcation occurs when time delay passes through a sequence of critical value. The linerized model and stability of the bifurcating periodic solut
APA, Harvard, Vancouver, ISO, and other styles
25

Mahmudah, Dewi Erla, Muhammad Zidny Naf’an, Muh Sofi’i, and Wika Wika. "KONTROL OPTIMAL MODEL PENYEBARAN VIRUS KOMPUTER DENGAN PENGARUH KOMPUTER EKSTERNAL YANG TERINFEKSI DAN REMOVABLE STORAGE MEDIA." Jurnal Ilmiah Matematika dan Pendidikan Matematika 9, no. 1 (2017): 113. http://dx.doi.org/10.20884/1.jmp.2017.9.1.2860.

Full text
Abstract:
. In this paper, we discuss an optimal control on the spread of computer viruses under the effects of infected external computers and removable storage media. Prevention Strategies do with ascertaining control prevention to minimize the number of infective computers (Latent and Breakingout) and installing effective antivirus programs in each sub-population. The aim are to derive optimal prevention strategies and minimize the cost associated with the control. The characterization of optimal control is perform analitically by applying Pontryagin Minimum Principle. The obtained optimality system
APA, Harvard, Vancouver, ISO, and other styles
26

Heyman, Karen. "New Attack Tricks Antivirus Software." Computer 40, no. 5 (2007): 18–20. http://dx.doi.org/10.1109/mc.2007.179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Garba, Faisal A., Rosemary M. Dima, A. Balarabe Isa, et al. "Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System." Journal of Cybersecurity and Information Management 10, no. 1 (2022): 18–33. http://dx.doi.org/10.54216/jcim.090105.

Full text
Abstract:
There is a general assumption that one must purchase costly antivirus software products to defend one’s computer system. However, if one is using the Windows Operating System, the question that arises is whether one needs to purchase antivirus software or not. The Windows operating system has a market share of 31.15% behind Android with a market share of 41.56% worldwide amongst all the operating systems. This makes Windows a prime target for hacking due to its large user base. Windows 11 a recent upgrade to the Windows operating system has claimed to have taken its security to the next level.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by secu
APA, Harvard, Vancouver, ISO, and other styles
29

Miller, S. K. "Acquisition accentuates antivirus industry." IEEE Security & Privacy 1, no. 5 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1236228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Manasa, R., and Jayanthila Devi A. "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 7, no. 2 (2023): 90–105. https://doi.org/10.5281/zenodo.7818522.

Full text
Abstract:
<strong>Purpose: </strong><em>Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is an information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do
APA, Harvard, Vancouver, ISO, and other styles
31

Ensmenger, Nathan. "Technological Turf Wars: A Case Study of the Computer Antivirus Industry." Technology and Culture 51, no. 4 (2010): 1054–56. http://dx.doi.org/10.1353/tech.2010.0058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Held, Gilbert. "Focus on the ESET NOD32 antivirus system." International Journal of Network Management 16, no. 5 (2006): 375–79. http://dx.doi.org/10.1002/nem.623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Zizhen, Ranjit Kumar Upadhyay, Dianjie Bi, and Ruibin Wei. "Stability and Hopf Bifurcation of a Delayed Epidemic Model of Computer Virus with Impact of Antivirus Software." Discrete Dynamics in Nature and Society 2018 (November 4, 2018): 1–18. http://dx.doi.org/10.1155/2018/8239823.

Full text
Abstract:
In this paper, we investigate an SLBRS computer virus model with time delay and impact of antivirus software. The proposed model considers the entering rates of all computers since every computer can enter or leave the Internet easily. It has been observed that there is a stability switch and the system becomes unstable due to the effect of the time delay. Conditions under which the system remains locally stable and Hopf bifurcation occurs are found. Sufficient conditions for global stability of endemic equilibrium are derived by constructing a Lyapunov function. Formulae for the direction, st
APA, Harvard, Vancouver, ISO, and other styles
34

Amiroch, Siti, Mohammad Isa Irawan, Imam Mukhlash, Mohammad Hamim Zajuli Al Faroby, and Chairul Anwar Nidom. "Machine Learning for the Prediction of Antiviral Compounds Targeting Avian Influenza A/H9N2 Viral Proteins." Symmetry 14, no. 6 (2022): 1114. http://dx.doi.org/10.3390/sym14061114.

Full text
Abstract:
Avian influenza subtype A/H9N2—which infects chickens, reducing egg production by up to 80%—may be transmissible to humans. In humans, this virus is very harmful since it attacks the respiratory system and reproductive tract, replicating in both. Previous attempts to find antiviral candidates capable of inhibiting influenza A/H9N2 transmission were unsuccessful. This study aims to better characterize A/H9N2 to facilitate the discovery of antiviral compounds capable of inhibiting its transmission. The Symmetry of this study is to apply several machine learning methods to perform virtual screeni
APA, Harvard, Vancouver, ISO, and other styles
35

Shang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.

Full text
Abstract:
Abstract.In this paper, we study the spread of virus/worm in computer networks with a view to addressing cyber security problems. Epidemic models have been applied extensively to model the propagation of computer viruses, which characterize the fact that infected machines may spread malware to other hosts connected to the network. In our framework, the dynamics of hosts evolves according to a modified inhomogeneous Susceptible-Infectious-Susceptible (SIS) epidemic model with time-varying transmission rate and recovery rate. The infection of computers is subject to direct attack as well as prop
APA, Harvard, Vancouver, ISO, and other styles
36

Suryanti, Etik, Abdul Rahem, and Anita Purnamayanti. "PROFIL PENGGUNAAN OBAT ANTIVIRUS COVID-19 DI RSUD dr. MURJANI-SAMPIT." Jurnal Ilmiah Ibnu Sina (JIIS): Ilmu Farmasi dan Kesehatan 7, no. 1 (2022): 116–23. http://dx.doi.org/10.36387/jiis.v7i1.842.

Full text
Abstract:
Coronavirus Disease 2019 (Covid-19) is an infectious disease caused by Severe Acute Respiratory Syndrome Coronavirus 2 (SARSCoV-2). The World Health Organization (WHO) until now still defines Covid-19 as a global pandemic where this pandemic is the cause of the biggest public health crisis in this century. RSUD dr. Murjani-Sampit uses several antivirals, including Oseltamivir 75 mg, Favipiravir 200 mg, Remdesivir 200 mg. The purpose of this study was to determine the antiviral profile given to covid-19 patients at dr. Murjani-Sampit. This study used a total sample of hospitalized patients who
APA, Harvard, Vancouver, ISO, and other styles
37

Scott, Ralph L. "Wired to the World: Firewalls." North Carolina Libraries 61, no. 3 (2009): 109. http://dx.doi.org/10.3776/ncl.v61i3.168.

Full text
Abstract:
An antivirus program continuously monitors your computer to detect a virus, which is automatically deleted and/or quarantined. Firewall programs, on the other hand, block access to your computer from the Internet and prevent hackers from planting a worm or other type of malicious software in your computer. Firewalls protect your data, your computer, and your name from corruption. Stories are legion about the Internet being used to seize control of a computer identity to do things such as send out fake e-mails in your name canceling final exams, insulting your boss, and ordering merchandise suc
APA, Harvard, Vancouver, ISO, and other styles
38

Al-Saleh, Mohammed Ibrahim, Antonio M. Espinoza, and Jedediah R. Crandall. "Antivirus performance characterisation: system-wide view." IET Information Security 7, no. 2 (2013): 126–33. http://dx.doi.org/10.1049/iet-ifs.2012.0192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ramesh, G., J. Logeshwaran, and V. Aravindarajan. "The Performance Evolution of Antivirus Security Systems in Ultradense Cloud Server Using Intelligent Deep Learning." BOHR International Journal of Computational Intelligence and Communication Network 1, no. 1 (2022): 15–19. http://dx.doi.org/10.54646/bijcicn.003.

Full text
Abstract:
When creating an antivirus, not only the latest security mechanisms are taken into account, but also the needs of users. That’s why this antivirus works together at high speed. The program interface allows it to choose the most optimal function. Free delivery allows a large number of users to rate this product. With the help of an intelligent deep learning model, a smart solution was proposed in this article to identify the security threats. It enables rapid detection and efficient treatment of polymorphic and encrypted viruses. Infected archives can now be detected when opened. This helps pre
APA, Harvard, Vancouver, ISO, and other styles
40

G., Ramesh, Logeshwaran J., and Aravindarajan V. "The performance evolution of antivirus security systems in ultradense cloud server using intelligent deep learning." BOHR Journal of Computational Intelligence and Communication Network 1, no. 1 (2023): 21–25. http://dx.doi.org/10.54646/bjcicn.2023.04.

Full text
Abstract:
When creating an antivirus, not only the latest security mechanisms are taken into account, but also the needs of users. That’s why this antivirus works together at high speed. The program interface allows it to choose the most optimal function. Free delivery allows a large number of users to rate this product. With the help of an intelligent deep learning model, a smart solution was proposed in this article to identify the security threats. It enables rapid detection and efficient treatment of polymorphic and encrypted viruses. Infected archives can now be detected when opened. This helps pre
APA, Harvard, Vancouver, ISO, and other styles
41

Weera, Wajaree, Thongchai Botmart, Teerapong La-inchua, et al. "A stochastic computational scheme for the computer epidemic virus with delay effects." AIMS Mathematics 8, no. 1 (2023): 148–63. http://dx.doi.org/10.3934/math.2023007.

Full text
Abstract:
&lt;abstract&gt; &lt;p&gt;This work aims to provide the numerical performances of the computer epidemic virus model with the time delay effects using the stochastic Levenberg-Marquardt backpropagation neural networks (LMBP-NNs). The computer epidemic virus model with the time delay effects is categorized into four dynamics, the uninfected &lt;italic&gt;S&lt;/italic&gt;(&lt;italic&gt;x&lt;/italic&gt;) computers, the latently infected &lt;italic&gt;L&lt;/italic&gt;(&lt;italic&gt;x&lt;/italic&gt;) computers, the breaking-out &lt;italic&gt;B&lt;/italic&gt;(&lt;italic&gt;x&lt;/italic&gt;) computers
APA, Harvard, Vancouver, ISO, and other styles
42

Kumar, Munna, Bimal Kumar Mishra, and T. C. Panda. "Predator-Prey Models on Interaction between Computer Worms, Trojan Horse and Antivirus Software Inside a Computer System." International Journal of Security and Its Applications 10, no. 1 (2016): 173–90. http://dx.doi.org/10.14257/ijsia.2016.10.1.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Quist, Daniel, Lorie Liebrock, and Joshua Neil. "Improving antivirus accuracy with hypervisor assisted analysis." Journal in Computer Virology 7, no. 2 (2010): 121–31. http://dx.doi.org/10.1007/s11416-010-0142-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Samociuk, Dominik. "Antivirus Evasion Methods in Modern Operating Systems." Applied Sciences 13, no. 8 (2023): 5083. http://dx.doi.org/10.3390/app13085083.

Full text
Abstract:
In order to safeguard one’s privacy while accessing the internet, it is crucial to have an antivirus program installed on the device. Despite their usefulness in protecting against malware, these programs are not foolproof. Cybercriminals have access to numerous techniques and tools for circumventing antivirus software, which can greatly aid them in their illicit activities. The objective of this research was to examine the most prevalent methods and tools for bypassing antivirus software and to demonstrate how readily accessible and simple they are to use. The aim of this paper is to raise aw
APA, Harvard, Vancouver, ISO, and other styles
45

Huang, Linus. "Book Review: Technological Turf Wars: A Case Study of the Computer Antivirus Industry." Contemporary Sociology: A Journal of Reviews 38, no. 6 (2009): 594–95. http://dx.doi.org/10.1177/009430610903800658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wu, Min-Hao, Fu-Hau Hsu, Jian-Hung Huang, et al. "Enhancing Linux System Security: A Kernel-Based Approach to Fileless Malware Detection and Mitigation." Electronics 13, no. 17 (2024): 3569. http://dx.doi.org/10.3390/electronics13173569.

Full text
Abstract:
In the late 20th century, computer viruses emerged as powerful malware that resides permanently in target hosts. For a virus to function, it must load into memory from persistent storage, such as a file on a hard drive. Due to the significant destructive potential of viruses, numerous defense measures have been developed to protect computer systems. Among these, antivirus software is one of the most recognized and widely used. Typically, antivirus solutions rely on static analysis (signature-based) technologies to detect infections in files stored on permanent storage devices, such as hard dri
APA, Harvard, Vancouver, ISO, and other styles
47

Andrushchak, І. Ye, Y. Y. Matviiv, and V. A. Koshelyuk. "Components of viruses and antivirus software in modern information security." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 48 (October 1, 2022): 26–30. http://dx.doi.org/10.36910/6775-2524-0560-2022-48-04.

Full text
Abstract:
In fact, in today's conditions of continuous innovative development of technologies, in the field of programming, computer networks and the Internet, the dark side of progress continues to grow at great rates: virus software. As a result, in this article we will try to focus on all aspects of the fight against viruses: prevention of infection, methods of detecting malicious programs, their destruction, as well as elimination of consequences. To do this, we conducted research and study of the main scientific sources on this topic and statistical data. As a result, this article focuses on differ
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Zizhen, and Huizhong Yang. "Dynamical Analysis of a Viral Infection Model with Delays in Computer Networks." Mathematical Problems in Engineering 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/280856.

Full text
Abstract:
This paper is devoted to the study of an SIRS computer virus propagation model with two delays and multistate antivirus measures. We demonstrate that the system loses its stability and a Hopf bifurcation occurs when the delay passes through the corresponding critical value by choosing the possible combination of the two delays as the bifurcation parameter. Moreover, the direction of the Hopf bifurcation and the stability of the bifurcating periodic solutions are determined by means of the center manifold theorem and the normal form theory. Finally, some numerical simulations are performed to i
APA, Harvard, Vancouver, ISO, and other styles
49

Zelinka, Ivan, Swagatam Das, Lubomir Sikora, and Roman Šenkeřík. "Swarm virus - Next-generation virus and antivirus paradigm?" Swarm and Evolutionary Computation 43 (December 2018): 207–24. http://dx.doi.org/10.1016/j.swevo.2018.05.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Pérez-Sánchez, Antonio, and Rafael Palacios. "Evaluation of Local Security Event Management System vs. Standard Antivirus Software." Applied Sciences 12, no. 3 (2022): 1076. http://dx.doi.org/10.3390/app12031076.

Full text
Abstract:
The detection and classification of threats in computer systems has been one of the main problems researched in Cybersecurity. As technology evolves, the tactics employed by adversaries have also become more sophisticated to evade detection systems. In consequence, systems that previously detected and classified those threats are now outdated. This paper proposes a detection system based on the analysis of events and matching the risk level with the MITRE ATT&amp;CK matrix and Cyber Kill Chain. Extensive testing of attacks, using nine malware codes and applying three different obfuscation tech
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!