Dissertations / Theses on the topic 'Computer viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Luke, James Steven. "Detecting previously unseen computer viruses." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274015.
Full textSzeto, Wai-chi. "Computer virus prevention and control in Hong Kong /." [Hong Kong] : University of Hong Kong, 1993. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302371.
Full textPosluszny, Frank S. "Overcoming limitations in computer worm models." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-01315-115046.
Full textWeideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.
Full textComputer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in industry was measured by sending a questionnaire to 388 companies country-wide. &~ average of 2l,5% of the respondents claimed detrimental effects to information stored on disk due to computer viruses. This and other data was used to guide laboratory experiments on the actual damage done by computer viruses to stored information. A set of test disks was prepared to represent programs and data of a typical PC user in industry. Fifteen different virus programs were used individually to infect the test disks. After each infection, all the test disks were inspected to ascertain damage to data, system and program files as well as to separate disk sectors. The research established that: The damage done by computer viruses to stored information is generally limited to one file or disk area. Where damage to stored information did occur, it was often reversible. Irrational user responses to virus symptoms provide a large potential source for damage to stored information. The availability of master program disks (for program file restoration) and recent, validated data backup is essential to recovery from a computer virus infection. A user can solve most problems caused by virus infections if he has a basic understanding of disk structure, i.e. tracks, sectors, sides, the FAT, etc, and of the use of disk utility programs like Norton Utilities or PCTools. The fact that some of the findings of prominent virus researchers could not be verified, suggests that virus programs could be unstable. Claims regarding the damage inflicted by viruses must be considered to be valid only for a specific copy of the virus under discussion. The importance of using original application software (to minimize the transfer of viruses and to enable program file restoration) , regular back-ups (to enable data file restoration) and basic user awareness (infection prevention, symptoms, the use of anti-viral and utility programs, etc.) was emphasized. The average PC user should be able to clear up a virus infection without assistance by following the given disinfection procedure. Suggestions for further study include virus origins, generations, mutations, multiple infections, and the effect of viruses on computer networks.
Schultz, John S. "Offline forensic analysis of Microsoft Windows XP physical memory." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FSchultz.pdf.
Full textThesis Advisor(s): Chris Eagle. "September 2006." Includes bibliographical references (p. 73-74). Also available in print.
Li, Xin. "Computer viruses: The threat today and the expected future." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1998.
Full textThis Master’s Thesis within the area computer security concerns ”Computer viruses: The threat today and the expected future”.
Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today’s influencing factors for near future computer virus epidemics are explained, then it further predicts new possible types of computer viruses in the near future; Furthermore, currently available anti-virus technologies are analyzed concerning both advantages and disadvantages; Finally, new promising trends in computer virus defence are explored in details.
Posluszny, III Frank S. "Overcoming Limitations in Computer Worm Models." Digital WPI, 2005. https://digitalcommons.wpi.edu/etd-theses/151.
Full textWebster, Matthew Paul. "Formal models of reproduction : from computer viruses to artificial life." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501590.
Full text林衛華 and Wai-wa Lam. "Multi-agent based human immune system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31221117.
Full textLam, Wai-wa. "Multi-agent based human immune system /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2093337X.
Full textSzeto, Wai-chi, and 司徒偉慈. "Computer virus prevention and control in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1992. http://hub.hku.hk/bib/B31265479.
Full textLin, Meng-jang. "The impact of population mixing rules on epidemic communication /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textSaw, Tee Huu. "Evaluation of a multi-agent system for simulation and analysis of distributed denial-of-service attacks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FSaw.pdf.
Full textThesis advisor(s): James B. Michael, Mikhail Auguston. Includes bibliographical references (p. 52-54). Also available online.
Pande, Rishikesh A. "Using Plant Epidemiological Methods to Track Computer Network Worms." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/9943.
Full textMaster of Science
Yelimeli, Guruprasad Arun. "Computer Virus Spread Containment Using Feedback Control." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4675/.
Full textTwardus, Jesse. "The use of heuristics in identifying self-propagating malicious mobile code." Morgantown, W. Va. : [West Virginia University Libraries], 2005. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4195.
Full textTitle from document title page. Document formatted into pages; contains viii, 104 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 89-92).
Dai, Jianyong. "Detecting malicious software by dynamic execution." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002798.
Full textWhite, Dominic Stjohn Dolin. "Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006510.
Full textTeX output 2007.02.08:2212
Adobe Acrobat 9.51 Paper Capture Plug-in
Khayam, Syed Ali. "Wireless channel modeling and malware detection using statistical and information-theoretic tools." Diss., Connect to online resource - MSU authorized users, 2006.
Find full textTitle from PDF t.p. (viewed on June 19, 2009) Includes bibliographic references. Also issued in print.
Volynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.
Find full textLobo, Desmond. "Rapid identification of rootkit infections using data mining." Thesis, University of Ballarat, 2010. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44308.
Full textDoctor of Philsophy
Al, Amro Sulaiman. "Behaviour-based virus analysis and detection." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9488.
Full textSchoeman, Adam. "Amber : a aero-interaction honeypot with distributed intelligence." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017938.
Full textIrwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Full textBoardman, Anelda Philine. "Assessment of genome visualization tools relevant to HIV genome research: development of a genome browser prototype." Thesis, University of the Western Cape, 2004. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_3632_1185446929.
Full textOver the past two decades of HIV research, effective vaccine candidates have been elusive. Traditionally viral research has been characterized by a gene -by-gene approach, but in the light of the availability of complete genome sequences and the tractable size of the HIV genome, a genomic approach may improve insight into the biology and epidemiology of this virus. A genomic approach to finding HIV vaccine candidates can be facilitated by the use of genome sequence visualization. Genome browsers have been used extensively by various groups to shed light on the biology and evolution of several organisms including human, mouse, rat, Drosophila and C.elegans. Application of a genome browser to HIV genomes and related annotations can yield insight into forces that drive evolution, identify highly conserved regions as well as regions that yields a strong immune response in patients, and track mutations that appear over the course of infection. Access to graphical representations of such information is bound to support the search for effective HIV vaccine candidates. This study aimed to answer the question of whether a tool or application exists that can be modified to be used as a platform for development of an HIV visualization application and to assess the viability of such an implementation. Existing applications can only be assessed for their suitability as a basis for development of an HIV genome browser once a well-defined set of assessment criteria has been compiled.
Atkison, Travis Levestis. "Using random projections for dimensionality reduction in identifying rogue applications." Diss., Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-133701.
Full textProcházka, Ivo. "Analýza ransomwaru GlobeImposter." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400883.
Full textSharif, Monirul Islam. "Robust and efficient malware analysis and host-based monitoring." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/37220.
Full textLibuschewski, Pascal [Verfasser], Peter [Akademischer Betreuer] Marwedel, and Heinrich [Gutachter] Müller. "Exploration of cyber-physical systems for GPGPU computer vision-based detection of biological viruses / Pascal Libuschewski ; Gutachter: Heinrich Müller ; Betreuer: Peter Marwedel." Dortmund : Universitätsbibliothek Dortmund, 2017. http://d-nb.info/1129956806/34.
Full textLibuschewski, Pascal [Verfasser], Peter Akademischer Betreuer] Marwedel, and Heinrich [Gutachter] [Müller. "Exploration of cyber-physical systems for GPGPU computer vision-based detection of biological viruses / Pascal Libuschewski ; Gutachter: Heinrich Müller ; Betreuer: Peter Marwedel." Dortmund : Universitätsbibliothek Dortmund, 2017. http://nbn-resolving.de/urn:nbn:de:101:1-20170414167.
Full textBlaauw, Pieter. "Search engine poisoning and its prevalence in modern search engines." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002037.
Full textCowie, Bradley. "An exploratory study of techniques in passive network telescope data analysis." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002038.
Full textRebiha, Rachid 1977. "Métodos formais algébricos para geração de invariantes." [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275741.
Full textTese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-19T00:11:05Z (GMT). No. of bitstreams: 1 Rebiha_Rachid_D.pdf: 1451665 bytes, checksum: abe6fc4e72cf43113c7c93064ab11ed8 (MD5) Previous issue date: 2011
Resumo: É bem sabido que a automação e a eficácia de métodos de verificação formal de softwares, sistemas embarcados ou sistemas híbridos, depende da facilidade com que invariantes precisas possam ser geradas automaticamente a partir do código fonte. Uma invariante é uma propriedade, especificada sobre um local específico do código fonte, e que sempre se verifica a cada execução de um sistema. Apesar dos progressos enormes ao longo dos anos, o problema da geração de invariantes ainda está em aberto para tanto programas não-lineares discretos, como para sistemas não-lineares híbridos. Nesta tese, primeiramente, apresentamos novos métodos computacionais que podem automatizar a descoberta e o fortalecimento de relações não-lineares entre as variáveis de um programa que contém laços não-lineares, ou seja, programas que exibem relações polinomiais multivariadas e manipulações fracionarias. Além disso, a maioria dos sistemas de segurança críticos, tais como aviões, automóveis, produtos químicos, usinas de energia e sistemas biológicos, operam semanticamente como sistemas híbridos não-lineares. Nesse trabalho, apresentamos poderosos métodos computacionais que são capazes de gerar bases de ideais polinomiais de invariantes não-lineares para sistemas híbridos não-lineares. Em segundo lugar, apresentamos métodos pioneiros de verificação que automaticamente gerem bases de invariantes expressas por séries de potências multi-variáveis e por funções transcendentais. Discutimos, também, a sua convergência em sistemas híbridos que exibem modelos não lineares. Verificamos que as séries de potência geradas para invariantes são, muitas vezes, compostas pela expansão de algumas funções transcendentais bem conhecidas, tais como "log" e "exp". Assim, apresentam uma forma analisável fechada que facilita o uso de invariantes na verificação de propriedades de segurança. Para cada problema de geração de invariantes estabelecemos condições suficientes, muito gerais, que garantem a existência e permitem o cálculo dos ideais polinomiais para situações que não podem ser tratadas pelas abordagens de geração invariantes hoje conhecidas. Finalmente, estendemos o domínio de aplicações, acessíveis através de métodos de geração de invariantes, para a área de segurança. Mais precisamente, fornecemos uma plataforma extensível baseada em invariantes pré-computadas que seriam usadas como assinaturas semânticas para análise de intrusos ("malwares") e deteção dos ataques de intrusões mais virulentos. Seguindo a concepção de tais plataformas, propomos sistemas de detecção de intrusão, usando modelos gerados automaticamente, onde as chamadas de sistema e de funções são vigiados pela avaliação de invariantes, pré-calculadas para denunciar qualquer desvio observado durante a execução da aplicação. De modo abrangente, nesta tese, propomos a redução de problemas de geração de invariantes para problemas algébricos lineares. Ao reduzir os problemas de geração de invariante não-triviais de sistemas híbridos não-lineares para problemas algébricos lineares relacionados, somos capazes de ultrapassar as deficiências dos mais modernos métodos de geração de invariante hoje conhecidos permitindo, assim, a geração automática e eficiente de invariantes para programas e sistemas híbridos não lineares complexos. Tais métodos algébricos lineares apresentam complexidades computacionais significativamente inferiores àquelas exigidas pelos os fundamentos matemáticos das abordagens usadas hoje, tais como a computação de bases de Gröbner, a eliminação de quantificadores e decomposições cilíndricas algébricas
Abstract: It is well-known that the automation and effectiveness of formal software verification of embedded or hybrid systems depends to the ease with which precise invariants can be automatically generated from source specifications. An invariant is a property that holds true at a specific location in the specification code, whenever an execution reaches that location. Despite tremendous progress over the years, the problem of invariant generation remains very challenging for both non-linear discrete programs, as well as for non-linear hybrid systems. In this thesis, we first present new computational methods that can automate the discovery and can strengthen interrelationships among the variables of a program that contains non-linear loops, that is, programs that display multivariate polynomial and fractional manipulations. Moreover, most of safety-critical systems such as aircraft, cars, chemicals, power plants and biological systems operate semantically as non-linear hybrid systems. In this work, we demonstrate powerful computational methods that can generate basis for non-linear invariant ideals of non-linear hybrid systems. Secondly, we present the first verification methods that automatically generate basis for invariants expressed by multivariate formal power series and transcendental functions. We also discuss their convergence over hybrid systems that exhibit non linear models. The formal power series invariants generated are often composed by the expansion of some well-known transcendental functions e.g. log and exp. They also have an analysable closed-form which facilitates the use of the invariants when verifying safety properties. For each invariant generation problem, we establish very general sufficient conditions that guarantee the existence and allow for the computation of invariant ideals for situations that can not be treated in the presently known invariant generation approaches. Finally, we extend the domain of applications for invariant generation methods to encompass security problems. More precisely, we provide an extensible invariant-based platform for malware analysis and show how we can detect the most virulent intrusions attacks using these invariants. We propose to automatically generate invariants directly from the specified malware code in order to use them as semantic aware signatures, i.e. malware invariant, that would remain unchanged by most obfuscated techniques. Folix lowing the design of such platforms, we propose host-based intrusion detection systems, using automatically generated models where system calls are guarded by pre-computed invariants in order to report any deviation observed during the execution of the application. In a broad sense, in this thesis, we propose to reduce the verification problem of invariant generation to algebraic problems. By reducing the problems of non-trivial nonlinear invariant generation for programs and hybrid systems to related linear algebraic problems we are able to address various deficiencies of other state-of-the-art invariant generation methods, including the efficient treatment of complicated non-linear loop programs and non-linear hybrid systems. Such linear algebraic methods have much lower computational complexities than the mathematical foundations of previous approaches know today, which use techniques such as as Gröbner basis computation, quantifier elimination and cylindrical algebraic decomposition
Doutorado
Ciência da Computação
Doutor em Ciência da Computação
Al-Salloum, Ziyad. "Topology-aware vulnerability mitigation worms." Thesis, Royal Holloway, University of London, 2011. http://repository.royalholloway.ac.uk/items/eec735f4-4649-4b31-285f-604bdaa4799c/10/.
Full textSrivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.
Full textMathuriya, Amrita. "Prediction of secondary structures for large RNA molecules." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28195.
Full textCommittee Chair: Bader, David; Committee Co-Chair: Heitsch, Christine; Committee Member: Harvey, Stephen; Committee Member: Vuduc, Richard.
Abdelhafez, Mohamed. "Modeling and Simulations of Worms and Mitigation Techniques." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19840.
Full textCastro, Diogo [UNIFESP]. "Simulação computacional e análise de um modelo fenotípico de evolução viral." Universidade Federal de São Paulo (UNIFESP), 2011. http://repositorio.unifesp.br/handle/11600/10085.
Full textUma grande quantidade dos vírus de importância médica, como o HIV, o vírus sincicial respiratório, o vírus da hepatite C, o vírus influenza A (H1N1), e o vírus da poliomielite, possui genoma RNA. Estes vírus apresentam taxas mutacionais extremamente altas, rápida cinética replicativa, população numerosa de partículas, e grande diversidade genética. Manifestas durante o processo infeccioso, tais características permitem a população viral adaptar-se rapidamente a ambientes dinâmicos, escapar ao sistema imunológico, desenvolver resistência às vacinas e drogas antivirais, e exibir dinâmica evolutiva complexa cuja compreensão representa um desafio para a genética de populações tradicional e para as estratégias de intervenção terapêutica efetiva. Para descrever biológica e matematicamente a evolução dos vírus RNA, modelos teóricos de evolução viral têm sido propostos, e muitas de suas predições foram confirmadas experimentalmente. O presente trabalho teve como objetivo simular computacionalmente e analisar um modelo de evolução viral que represente relações evolutivas existentes entre a população viral de genoma RNA e as diferentes pressões seletivas exercidas sobre ela na sua interação com o organismo hospedeiro. Também objetivou desenvolver um software de simulação computacional personalizado para o modelo de evolução viral, e demonstrar a possibilidade de descrever o modelo como um processo de ramificação de Galton-Watson. Entre os resultados e discussões delineados, encontram-se um critério analítico para estudo do tempo de recuperação e do regime crítico de um processo de ramificação de Galton-Watson aplicado à evolução viral; predições sobre a correlação entre fatores do organismo hospedeiro e a dinâmica evolutiva da população viral; predições sobre a contribuição da taxa mutacional, do tamanho e da capacidade replicativa máxima da população viral para o prognóstico e quatro fases da infecção: o tempo de recuperação, o equilíbrio mutação-seleção, o limiar da extinção, e a mutagênese letal.
A large amount of viruses of medical importance such as HIV, respiratory syncytial virus, the hepatitis C virus, influenza A (H1N1) and polio virus, has RNA genome. These viruses exhibit extremely high mutational rate, fast replicative kinetics, large population of particles and high genetic diversity. Manifested during the infectious process, these features allow the virus population to adapt quickly to dynamic environments, escape from the immune system, develop resistance to vaccines and antiviral drugs, and display complex evolutionary dynamics whose understanding represents a challenge to the traditional population genetics and for effective therapeutic intervention strategies. To describe mathematically and biological evolution of RNA viruses, theoretical models of virus evolution have been proposed, and many of their predictions were experimentally confirmed. This study aimed to simulate and analyze computationally a model of viral evolution that represents evolutionary relationships between the population of viral RNA genome and the different selective pressures on it in its interaction with the host organism. It also aimed to develop computational simulation software for the viral evolution model, and demonstrate the possibility of describing the model as a Galton-Watson branching process. Among the results and discussions outlined, there are an analytical criterion to study the recovery time and the critical regime of a Galton-Watson branching process applied to viral evolution; predictions about the correlation between factors of the host organism and the evolutionary dynamics of viral population; predictions about the contribution of mutational rate, the size and maximum replicative capacity of viral population for the prognosis and four stages of infection: recovery time, mutation-selection equilibrium, extinction threshold, and lethal mutagenesis.
TEDE
BV UNIFESP: Teses e dissertações
Arding, Petter, and Hugo Hedelin. "Computer virus : design and detection." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108484.
Full textSun, Jian. "Computer-aided drug design for influenza A virus." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B44205156.
Full textSun, Jian, and 孙健. "Computer-aided drug design for influenza A virus." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B44205156.
Full textSalters, Michael Jerome. "Computer virus security in the Department of the Navy." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23842.
Full textHenchiri, Olivier. "A feature selection and evaluation scheme for computer virus detection." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27250.
Full textPaura, Markas. "Sąvokos kompiuterių virusas semantinis laukas." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20141230_153317-55602.
Full textThe concept “computer virus” has been in existence since 1984. However despite the fact that almost 30 years have passed, it is not properly defined in Lithuanian sources and is still confused with other concepts tied to computer security, most often with concepts such as “worms” and “Trojan horses.” There has never been comprehensive linguistic research carried out on this concept and its signifier in Lithuanian. The aim of this dissertation is to describe the semantic field of the concept “computer virus,” the basis of which is the microsystem of the term “computer virus.” The following was used for the research: a total of 919 computer threat descriptions included in the Symantec computer threat bank that are tagged virus, the terminographical resources of Threat Explorer partners and computer terminology dictionaries published in Lithuania from 1984 to 2006 as well as analytical articles about computer terminology in Lithuanian scientific journals during the same period. Additional terminographical resources in Lithuanian and French are included in the research to assess and analyze the development of this concept. All of the terminological date that was collected concerning the semantic field of the concept in question (comprised of 177 concepts in this work) was analysed using the following methods: the comparative method, descriptive method, componential analysis and uplink analysis. As the research was carried out, it became clear that the semantic field of the... [to full text]
Paura, Markas. "Le champ sémantique du concept virus informatique." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20141230_153304-85220.
Full textSąvoka kompiuterių virusas gyvuoja nuo 1984 m., tačiau net ir praėjus trims dešimtmečiams lietuvių kalboje ji vis dar nėra pakankamai diferencijuota, tebėra painiojama su kitomis kompiuterių saugumui priskiriamomis sąvokomis, dažniausiai kirminu ir Trojos arkliu. Iki šiol nebuvo atlikta išsamių lingvistinių nagrinėjamos sąvokos ir jos žymiklio tyrimų lietuvių kalba. Šios disertacijos tikslas – aprašyti sąvokos kompiuterių virusas semantinį lauką, kurio pagrindas yra termino kompiuterių virusas mikrosistema. Tirta 919 Symantec kompiuterių grėsmių banke Threat Explorer paskelbtų kompiuterių grėsmių aprašų su žyma Virus, Threat Explorer partnerių terminografiniai ištekliai ir Lietuvoje nuo 1984 m. iki 2006 m. išleisti kompiuterijos terminų žodynai bei tuo pačiu laikotarpiu paskelbti analitiniai straipsniai apie kompiuterijos leksiką Lietuvos mokslo leidiniuose. Sąvokos raidai įvertinti įtraukta papildomų terminografinių išteklių lietuvių ir prancūzų kalbomis. Visi surinkti terminologiniai duomenys apie nagrinėjamos sąvokos semantinį lauką, kurį šiame darbe sudaro 177 sąvokos, tirti taikant šiuos metodus: lyginamąjį, aprašomąjį, komponentinės analizės ir aukštynkryptės analizės metodais. Tyrimo metu paaiškėjo, kad disertacijoje nagrinėjamos sąvokos semantinį lauką dėl jį sudarančių sąvokų tarpusavio hierarchinių santykių galima gana tiksliai apibrėžti. Toks semantinių laukų teorijos taikymas terminologiniams duomenims, iš kurių svarbiausiu laikoma intensinė termino apibrėžtis... [toliau žr. visą tekstą]
The concept “computer virus” has been in existence since 1984. However despite the fact that almost 30 years have passed, it is not properly defined in Lithuanian sources and is still confused with other concepts tied to computer security, most often with concepts such as “worms” and “Trojan horses.” There has never been comprehensive linguistic research carried out on this concept and its signifier in Lithuanian. The aim of this dissertation is to describe the semantic field of the concept “computer virus,” the basis of which is the microsystem of the term “computer virus.” The following was used for the research: a total of 919 computer threat descriptions included in the Symantec computer threat bank that are tagged virus, the terminographical resources of Threat Explorer partners and computer terminology dictionaries published in Lithuania from 1984 to 2006 as well as analytical articles about computer terminology in Lithuanian scientific journals during the same period. Additional terminographical resources in Lithuanian and French are included in the research to assess and analyze the development of this concept. All of the terminological date that was collected concerning the semantic field of the concept in question (comprised of 177 concepts in this work) was analysed using the following methods: the comparative method, descriptive method, componential analysis and uplink analysis. As the research was carried out, it became clear that the semantic field of the... [to full text]
Semyonov, S. G., Svitlana Gavrylenko, and Viktor Chelak. "Processing information on the state of a computer system using probabilistic automata." Thesis, Institute of Electrical and Electronics Engineers, 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40752.
Full textMartins, Duarte Lima. "Purification of complex biopharmaceuticals with new processes, advanced analytics and computer-aided process design tools." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/11105.
Full textViruses are highly efficient vectors that have been used for vaccination and gene therapy applications. However, their complexity renders downstream process particularly challenging since devices and strategies especially designed for virus purification are still lacking or need further optimization. After an introduction to the challenges of virus purification and the current strategies being employed, this dissertation presents the study of three different stages of the downstream process: clarification, ultrafiltration and chromatography. A novel clarification procedure based on diatomaceous earth was evaluated. Small-scale batch incubations led to the identification of Divergan RS – a synthetic non-charged material – as the most promising candidate for integration in a scalable filtration set-up. Ultrafiltration was addressed with the evaluation of cassette and hollow fiber modules. The results obtained show that cassette module with cut-offs in the 500 kDa range and highly hydrophilic materials enable complete recovery of infective Adenovirus while reducing process time in half when compared with the best hollow fibers. Despite the encouraging results with Adenovirus, the experiments using Retrovirus resulted in low yields and possible optimization strategies were identified. Membrane technology was also evaluated as an alternative to the packed-bed chromatography columns. By using a scale-down 96-well device, the impact of ligand density, membrane structure and feed conductivity were evaluated for the purification of Adenovirus by ion exchange chromatography. The hydrogel-grafted membrane with ligand density of 2.4 μmol cm-2 operated in bind/elute mode shown the best compromise between yield and purity. Overall, this thesis contributed to the advancement of virus purification field by exploiting innovative technologies.
Fundação para a Ciência e a Tecnologia - (PTDC/EBBBIO/119501/2010)
Rüfenacht, Jürg. "Epidemiology of infection with bovine viral diarrhea virus in Switzerland : a study designed by computer modeling /." [S.l.] : [s.n.], 1999. http://www.stub.unibe.ch/html/haupt/datenbanken/diss/bestell.html.
Full textMuppalla, RoopTeja. "A Twitter-based Study for Understanding Public Reaction on Zika Virus." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright151994467953523.
Full textVon, Kirchbach Johann Carlo. "In silico analysis of RNA signals and evolutionary constraints in influenza A virus." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609825.
Full text