Journal articles on the topic 'Computer Antivirus'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer Antivirus.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Manalu, Susi Yanti, and Jamaluddin Jamaluddin. "ANALISIS KEAMANAN ANTI VIRUS BERBASIS WEB." Majalah Ilmiah METHODA 12, no. 2 (2022): 143–46. http://dx.doi.org/10.46880/methoda.vol12no2.pp143-146.
Full textThomas, Remya, and M. Nachamai. "Performance Investigation of Antivirus - A Comparative Analysis." Oriental journal of computer science and technology 10, no. 1 (2017): 201–6. http://dx.doi.org/10.13005/ojcst/10.01.27.
Full textNachenberg, Carey. "Computer virus-antivirus coevolution." Communications of the ACM 40, no. 1 (1997): 46–51. http://dx.doi.org/10.1145/242857.242869.
Full textSiti Nur Athirah Mohd Zulkifly, Siti Nurul Fitriah Mohamad, Siti Aziemah Che Kob, et al. "Multi-Criteria Decision Making for Computer Antivirus Software using Fuzzy AHP Approach." Journal of Mathematics and Computing Science 8, no. 1 (2022): 12–24. https://doi.org/10.24191/jmcs.v8i1.6971.
Full textHaritsah, Ma'arij, Adityas Widjajarto, and Ahmad Almaarif. "Analisis Karakteristik Antivirus Berdasarkan Aktivitas Malware menggunakan Analisis Dinamis." Journal of Information System Research (JOSH) 4, no. 2 (2023): 693–700. http://dx.doi.org/10.47065/josh.v4i2.2908.
Full textJovanović, Ivan, Milena Cvjetković, and Milovan Cvjetković. "The impact of the application of antivirus programs on the security of computer systems." Bizinfo Blace 15, no. 2 (2024): 11–19. https://doi.org/10.5937/bizinfo2402011j.
Full textWidarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.
Full textSyarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.
Full textAbdulmalik, Usman Ismail, Nura Abubakar Anka, Shamsudeen Sani Muhammed, and Saidu Aliyu Illo. "A Survey on The Effect of Computer Virus Attacks and Its Preventive Measures Among Computer Users." Kasu Journal of Computer Science 1, no. 2 (2024): 134–50. http://dx.doi.org/10.47514/kjcs/2024.1.2.001.
Full textQin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.
Full textDARAJAT, PANGESTUTI PRIMA, and TYAS HUSADANINGSIH. "KONTROL OPTIMAL PADA MODEL PENYEBARAN VIRUS KOMPUTER DENGAN KLASIFIKASI PENGAMANAN." E-Jurnal Matematika 8, no. 4 (2019): 253. http://dx.doi.org/10.24843/mtk.2019.v08.i04.p261.
Full textMrs, A. Nalini. "Foray Spotlight System." International Journal of Trend in Scientific Research and Development 2, no. 6 (2018): 1078–80. https://doi.org/10.31142/ijtsrd18811.
Full textScott, Ralph L. "Wired to the World: Spyware." North Carolina Libraries 61, no. 4 (2009): 154. http://dx.doi.org/10.3776/ncl.v61i4.180.
Full textYang, Xiaofan, Bei Liu, and Chenquan Gan. "Global Stability of an Epidemic Model of Computer Virus." Abstract and Applied Analysis 2014 (2014): 1–5. http://dx.doi.org/10.1155/2014/456320.
Full textStoll, Barbara J., and Roger I. Glass. "Potential antitussive effects of a computer antivirus program." Lancet 349, no. 9045 (1997): 140. http://dx.doi.org/10.1016/s0140-6736(05)60933-6.
Full textAnisimov, V. G., E. G. Anisimov, T. N. Saurenko, and V. P. Los’. "Performance Evaluation of Antivirus Systems for Computer Networks." Automatic Control and Computer Sciences 56, no. 8 (2022): 883–87. http://dx.doi.org/10.3103/s0146411622080016.
Full textHsu, Fu-Hau, Chia-Hao Lee, Ting Luo, Ting-Cheng Chang, and Min-Hao Wu. "A Cloud-Based Real-Time Mechanism to Protect End Hosts against Malware." Applied Sciences 9, no. 18 (2019): 3748. http://dx.doi.org/10.3390/app9183748.
Full textMeng, Ji. "Research on Common Virus Properties in Computer Lab." Advanced Materials Research 926-930 (May 2014): 2803–6. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2803.
Full textPeng, Mei, Xing He, Junjian Huang, and Tao Dong. "Modeling Computer Virus and Its Dynamics." Mathematical Problems in Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/842614.
Full textRazi, Nausheen, Muhammad Bilal Riaz, Ambreen Bano, Tayyab Kamran, Umar Ishtiaq, and Anum Shafiq. "Applying fractional calculus to malware spread: A fractal-based approach to threat analysis." PLOS ONE 20, no. 1 (2025): e0313914. https://doi.org/10.1371/journal.pone.0313914.
Full textTerekhov, V. I., A. N. Stadnik, K. S. Skryl, I. I. Korovin, and E. R. Bashaeva. "Theoretical foundations for implementation of methodological apparatus to optimize mechanisms of resident type antivirus protection." Telecommunications, no. 1 (2024): 25–29. http://dx.doi.org/10.31044/1684-2588-2024-0-1-25-29.
Full textZhang, Zizhen, and Huizhong Yang. "Stability and Hopf Bifurcation for a Delayed SLBRS Computer Virus Model." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/373171.
Full textBogosi, Monyamane. "An Analysis of Internet Security Challenges Faced By Organisations in Botswana: The Reviewed Literature." American Based Research Journal - ISSN (2304-7151) 10, no. 03 (2021): 112–22. https://doi.org/10.5281/zenodo.4678397.
Full textDong, Tao, Xiaofeng Liao, and Huaqing Li. "Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus." Abstract and Applied Analysis 2012 (2012): 1–16. http://dx.doi.org/10.1155/2012/841987.
Full textMahmudah, Dewi Erla, Muhammad Zidny Naf’an, Muh Sofi’i, and Wika Wika. "KONTROL OPTIMAL MODEL PENYEBARAN VIRUS KOMPUTER DENGAN PENGARUH KOMPUTER EKSTERNAL YANG TERINFEKSI DAN REMOVABLE STORAGE MEDIA." Jurnal Ilmiah Matematika dan Pendidikan Matematika 9, no. 1 (2017): 113. http://dx.doi.org/10.20884/1.jmp.2017.9.1.2860.
Full textHeyman, Karen. "New Attack Tricks Antivirus Software." Computer 40, no. 5 (2007): 18–20. http://dx.doi.org/10.1109/mc.2007.179.
Full textGarba, Faisal A., Rosemary M. Dima, A. Balarabe Isa, et al. "Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System." Journal of Cybersecurity and Information Management 10, no. 1 (2022): 18–33. http://dx.doi.org/10.54216/jcim.090105.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textMiller, S. K. "Acquisition accentuates antivirus industry." IEEE Security & Privacy 1, no. 5 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1236228.
Full textManasa, R., and Jayanthila Devi A. "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 7, no. 2 (2023): 90–105. https://doi.org/10.5281/zenodo.7818522.
Full textEnsmenger, Nathan. "Technological Turf Wars: A Case Study of the Computer Antivirus Industry." Technology and Culture 51, no. 4 (2010): 1054–56. http://dx.doi.org/10.1353/tech.2010.0058.
Full textHeld, Gilbert. "Focus on the ESET NOD32 antivirus system." International Journal of Network Management 16, no. 5 (2006): 375–79. http://dx.doi.org/10.1002/nem.623.
Full textZhang, Zizhen, Ranjit Kumar Upadhyay, Dianjie Bi, and Ruibin Wei. "Stability and Hopf Bifurcation of a Delayed Epidemic Model of Computer Virus with Impact of Antivirus Software." Discrete Dynamics in Nature and Society 2018 (November 4, 2018): 1–18. http://dx.doi.org/10.1155/2018/8239823.
Full textAmiroch, Siti, Mohammad Isa Irawan, Imam Mukhlash, Mohammad Hamim Zajuli Al Faroby, and Chairul Anwar Nidom. "Machine Learning for the Prediction of Antiviral Compounds Targeting Avian Influenza A/H9N2 Viral Proteins." Symmetry 14, no. 6 (2022): 1114. http://dx.doi.org/10.3390/sym14061114.
Full textShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Full textSuryanti, Etik, Abdul Rahem, and Anita Purnamayanti. "PROFIL PENGGUNAAN OBAT ANTIVIRUS COVID-19 DI RSUD dr. MURJANI-SAMPIT." Jurnal Ilmiah Ibnu Sina (JIIS): Ilmu Farmasi dan Kesehatan 7, no. 1 (2022): 116–23. http://dx.doi.org/10.36387/jiis.v7i1.842.
Full textScott, Ralph L. "Wired to the World: Firewalls." North Carolina Libraries 61, no. 3 (2009): 109. http://dx.doi.org/10.3776/ncl.v61i3.168.
Full textAl-Saleh, Mohammed Ibrahim, Antonio M. Espinoza, and Jedediah R. Crandall. "Antivirus performance characterisation: system-wide view." IET Information Security 7, no. 2 (2013): 126–33. http://dx.doi.org/10.1049/iet-ifs.2012.0192.
Full textRamesh, G., J. Logeshwaran, and V. Aravindarajan. "The Performance Evolution of Antivirus Security Systems in Ultradense Cloud Server Using Intelligent Deep Learning." BOHR International Journal of Computational Intelligence and Communication Network 1, no. 1 (2022): 15–19. http://dx.doi.org/10.54646/bijcicn.003.
Full textG., Ramesh, Logeshwaran J., and Aravindarajan V. "The performance evolution of antivirus security systems in ultradense cloud server using intelligent deep learning." BOHR Journal of Computational Intelligence and Communication Network 1, no. 1 (2023): 21–25. http://dx.doi.org/10.54646/bjcicn.2023.04.
Full textWeera, Wajaree, Thongchai Botmart, Teerapong La-inchua, et al. "A stochastic computational scheme for the computer epidemic virus with delay effects." AIMS Mathematics 8, no. 1 (2023): 148–63. http://dx.doi.org/10.3934/math.2023007.
Full textKumar, Munna, Bimal Kumar Mishra, and T. C. Panda. "Predator-Prey Models on Interaction between Computer Worms, Trojan Horse and Antivirus Software Inside a Computer System." International Journal of Security and Its Applications 10, no. 1 (2016): 173–90. http://dx.doi.org/10.14257/ijsia.2016.10.1.17.
Full textQuist, Daniel, Lorie Liebrock, and Joshua Neil. "Improving antivirus accuracy with hypervisor assisted analysis." Journal in Computer Virology 7, no. 2 (2010): 121–31. http://dx.doi.org/10.1007/s11416-010-0142-4.
Full textSamociuk, Dominik. "Antivirus Evasion Methods in Modern Operating Systems." Applied Sciences 13, no. 8 (2023): 5083. http://dx.doi.org/10.3390/app13085083.
Full textHuang, Linus. "Book Review: Technological Turf Wars: A Case Study of the Computer Antivirus Industry." Contemporary Sociology: A Journal of Reviews 38, no. 6 (2009): 594–95. http://dx.doi.org/10.1177/009430610903800658.
Full textWu, Min-Hao, Fu-Hau Hsu, Jian-Hung Huang, et al. "Enhancing Linux System Security: A Kernel-Based Approach to Fileless Malware Detection and Mitigation." Electronics 13, no. 17 (2024): 3569. http://dx.doi.org/10.3390/electronics13173569.
Full textAndrushchak, І. Ye, Y. Y. Matviiv, and V. A. Koshelyuk. "Components of viruses and antivirus software in modern information security." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 48 (October 1, 2022): 26–30. http://dx.doi.org/10.36910/6775-2524-0560-2022-48-04.
Full textZhang, Zizhen, and Huizhong Yang. "Dynamical Analysis of a Viral Infection Model with Delays in Computer Networks." Mathematical Problems in Engineering 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/280856.
Full textZelinka, Ivan, Swagatam Das, Lubomir Sikora, and Roman Šenkeřík. "Swarm virus - Next-generation virus and antivirus paradigm?" Swarm and Evolutionary Computation 43 (December 2018): 207–24. http://dx.doi.org/10.1016/j.swevo.2018.05.003.
Full textPérez-Sánchez, Antonio, and Rafael Palacios. "Evaluation of Local Security Event Management System vs. Standard Antivirus Software." Applied Sciences 12, no. 3 (2022): 1076. http://dx.doi.org/10.3390/app12031076.
Full text