Journal articles on the topic 'COMPUTERS / Security / Viruses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'COMPUTERS / Security / Viruses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textAL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.
Full textAsaad, Renas Rajab. "Implementation of a Virus with Treatment and Protection Methods." ICONTECH INTERNATIONAL JOURNAL 4, no. 2 (September 16, 2020): 28–34. http://dx.doi.org/10.46291/icontechvol4iss2pp28-34.
Full textDARAJAT, PANGESTUTI PRIMA, and TYAS HUSADANINGSIH. "KONTROL OPTIMAL PADA MODEL PENYEBARAN VIRUS KOMPUTER DENGAN KLASIFIKASI PENGAMANAN." E-Jurnal Matematika 8, no. 4 (November 29, 2019): 253. http://dx.doi.org/10.24843/mtk.2019.v08.i04.p261.
Full textTang, Tian, Mu-Chuan Zhou, Yi Quan, Jun-Liang Guo, V. S. Balaji, V. Gomathi, and V. Elamaran. "Penetration Testing and Security Assessment of Healthcare Records on Hospital Websites." Journal of Medical Imaging and Health Informatics 10, no. 9 (August 1, 2020): 2242–46. http://dx.doi.org/10.1166/jmihi.2020.3138.
Full textXu, Zhao. "Study on Strategies of Campus Network Security." Applied Mechanics and Materials 303-306 (February 2013): 1956–59. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.1956.
Full textWidarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (March 2, 2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.
Full textScott, Ralph L. "Wired to the World: Anti-virus Software." North Carolina Libraries 62, no. 1 (January 20, 2009): 63. http://dx.doi.org/10.3776/ncl.v62i1.157.
Full textShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (September 1, 2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textHulak, Hennadii, Volodymyr Buriachok, Pavlo Skladannyi, and Lydia Kuzmenko. "CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 6–28. http://dx.doi.org/10.28925/2663-4023.2020.10.628.
Full textŻmigrodzka, Małgorzata. "Cybersecurity – One of the Greatest Challenges for Civil Aviation in the 21st Century." Safety & Defense 6, no. 2 (August 7, 2020): 33–41. http://dx.doi.org/10.37105/sd.73.
Full textO. E., Rubtsov, Norkina A. N., and Chicherov K.A. "Information Protection Tools for Android-based Mobile Devices." KnE Social Sciences 3, no. 2 (February 15, 2018): 235. http://dx.doi.org/10.18502/kss.v3i2.1548.
Full textAji, Ranggi Praharaningtyas, Muhamad Awiet Wiedanto Prasetyo, Argiyan Dwi Pritama, Ika Ayu Pratiwi, and Resti Nur Azizah. "Peningkatan pemahaman guru tentang pengamanan data ajar melalui pelatihan online di SMPN I Karangwelas." ABSYARA: Jurnal Pengabdian Pada Masyarakat 2, no. 1 (July 31, 2021): 62–71. http://dx.doi.org/10.29408/ab.v2i1.3549.
Full textDal Moro, Eric. "Towards an Economic Cyber Loss Index for Parametric Cover Based on IT Security Indicator: A Preliminary Analysis." Risks 8, no. 2 (May 8, 2020): 45. http://dx.doi.org/10.3390/risks8020045.
Full textShulga, Olga. "Confidentiality and scam in the internet." University Economic Bulletin, no. 48 (March 30, 2021): 76–91. http://dx.doi.org/10.31470/2306-546x-2021-48-76-91.
Full textHighland, Esther H. "Security expert gives advice on computer viruses." Computers & Security 7, no. 4 (August 1988): 425–26. http://dx.doi.org/10.1016/0167-4048(88)90605-0.
Full textSpafford, Eugene H. "Computer Viruses as Artificial Life." Artificial Life 1, no. 3 (April 1994): 249–65. http://dx.doi.org/10.1162/artl.1994.1.3.249.
Full textAnggrawan, Anthony, Raisul Azhar, Bambang Krismono Triwijoyo, and Mayadi Mayadi. "Developing Application in Anticipating DDoS Attacks on Server Computer Machines." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 30, 2021): 427–34. http://dx.doi.org/10.30812/matrik.v20i2.410.
Full textSUSANTO, YULIUS KURNIA, and RATIH HANDAYANI. "INTENSITAS ANCAMAN KEAMANAN SISTEM INFORMASI AKUNTANSI KOMPUTERISASIAN." Jurnal Bisnis dan Akuntansi 10, no. 3 (April 19, 2018): 113–26. http://dx.doi.org/10.34208/jba.v10i3.223.
Full textJi, Hong. "Research on the Protection Strategy of Network Security." Advanced Materials Research 703 (June 2013): 236–39. http://dx.doi.org/10.4028/www.scientific.net/amr.703.236.
Full textDu, Yu Lin. "Research on the Information Security of Internet Bank." Applied Mechanics and Materials 687-691 (November 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.
Full textSung, Pei-Chen, Cheng-Yuan Ku, and Chien-Yuan Su. "Understanding the propagation dynamics of multipartite computer virus." Industrial Management & Data Systems 114, no. 1 (January 28, 2014): 86–106. http://dx.doi.org/10.1108/imds-04-2013-0197.
Full textGong, Song Jie, and Xue Mei Zhang. "An Anti-Spam Electronic Commerce Security System in Cloud Computing Environment." Applied Mechanics and Materials 556-562 (May 2014): 5797–800. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5797.
Full textAbu-Musa, Ahmad A. "Perceived Security Threats of Computerized Accounting Information Systems in the Egyptian Banking Industry." Journal of Information Systems 20, no. 1 (March 1, 2006): 187–203. http://dx.doi.org/10.2308/jis.2006.20.1.187.
Full textLiu, Chang Ming, and Yan Jun Sun. "The Application of Data Encryption in Network Security." Applied Mechanics and Materials 513-517 (February 2014): 549–51. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.549.
Full textRaj, Dr Shaji N. "A Flexible Vulnerability Reduction System Using Machine Learning." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3784–91. http://dx.doi.org/10.47059/revistageintec.v11i4.2407.
Full textWhitson, Roger. "Review: Jussi Parikka, Digital Contagions: A Media Archaeology of Computer Viruses." Theory, Culture & Society 34, no. 7-8 (October 27, 2017): 293–98. http://dx.doi.org/10.1177/0263276417736593.
Full textXu, Wen Jie, Fang Qin Xu, and Hai Feng Lu. "Network Security Management System Based on Digital China." Applied Mechanics and Materials 568-570 (June 2014): 1384–88. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1384.
Full textSastry, K. Narasimha, B. Thirumala Rao, and T. Gunasekhar. "Novel Approach for Control Data Theft Attack in Cloud Computing." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 6 (September 11, 2015): 1545. http://dx.doi.org/10.11591/ijece.v5i6.pp1545-1552.
Full textObiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (April 2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.
Full textBelaissaoui, Mustapha, and József Jurassec. "A Deep Convolutional Neural Network for Image Malware Classification." International Journal of Smart Security Technologies 6, no. 1 (January 2019): 49–60. http://dx.doi.org/10.4018/ijsst.2019010104.
Full textNurdin, Rizki. "ANALISA KEAMANAN INTERNET MENGGUNAKAN NESSUS DAN ETHEREAL UNIVERSITAS PUTRA INDONESIA “YPTK” PADANG." Jurnal Teknologi Informasi dan Pendidikan 10, no. 3 (April 10, 2018): 11–25. http://dx.doi.org/10.24036/tip.v10i3.9.
Full textFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Full textEssouifi, Mohamed, and Abdelfattah Achahbar. "A mixed SIR-SIS model to contain a virus spreading through networks with two degrees." International Journal of Modern Physics C 28, no. 09 (September 2017): 1750114. http://dx.doi.org/10.1142/s0129183117501145.
Full textAlimboyong, Catherine R. "Modeling virus spread on a network using NetLogo for optimum network management." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (July 1, 2021): 370. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp370-377.
Full textAl-Marghilani, A. "Comprehensive Analysis of IoT Malware Evasion Techniques." Engineering, Technology & Applied Science Research 11, no. 4 (August 21, 2021): 7495–500. http://dx.doi.org/10.48084/etasr.4296.
Full textKlebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.
Full textHunter, Philip. "Microsoft tackles viruses and spyware at last, but will it be trusted on security?" Network Security 2005, no. 2 (February 2005): 16–17. http://dx.doi.org/10.1016/s1353-4858(05)00201-1.
Full textLi, Pengdeng, Lu-Xing Yang, Xiaofan Yang, Xiang Zhong, Junhao Wen, and Qingyu Xiong. "Energy-Efficient Patching Strategy for Wireless Sensor Networks." Sensors 19, no. 2 (January 10, 2019): 262. http://dx.doi.org/10.3390/s19020262.
Full textLiu, Lan, Ryan K. L. Ko, Guangming Ren, and Xiaoping Xu. "Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks." Security and Communication Networks 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/2910310.
Full textBavishi, Ujaliben Kalpesh, and Bhavesh Madanlal Jain. "Malware Analysis." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (January 3, 2018): 27. http://dx.doi.org/10.23956/ijarcsse.v7i12.507.
Full textKamarudin, Nur Khairani, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, and Iman Hazwam Abd Halim. "Performance Analysis of Malware Attack." Journal of Computing Research and Innovation 3, no. 4 (November 18, 2018): 19–24. http://dx.doi.org/10.24191/jcrinn.v3i4.72.
Full textDiningrat, Syaiputra Wahyuda Meisa, Meyga Agustia Nindya, and Salwa Salwa. "EMERGENCY ONLINE TEACHING: EARLY CHILDHOOD EDUCATION LECTURERS' PERCEPTION OF BARRIER AND PEDAGOGICAL COMPETENCY." Jurnal Cakrawala Pendidikan 39, no. 3 (October 19, 2020): 705–19. http://dx.doi.org/10.21831/cp.v39i3.32304.
Full textLiu, Guiyun, Junqiang Li, Zhongwei Liang, and Zhimin Peng. "Analysis of Time-Delay Epidemic Model in Rechargeable Wireless Sensor Networks." Mathematics 9, no. 9 (April 27, 2021): 978. http://dx.doi.org/10.3390/math9090978.
Full textAzeez, Nureni Ayofe, Oluwanifise Ebunoluwa Odufuwa, Sanjay Misra, Jonathan Oluranti, and Robertas Damaševičius. "Windows PE Malware Detection Using Ensemble Learning." Informatics 8, no. 1 (February 10, 2021): 10. http://dx.doi.org/10.3390/informatics8010010.
Full textKalyaev, I. A., and E. V. Melnik. "Trusted Control Systems." Mekhatronika, Avtomatizatsiya, Upravlenie 22, no. 5 (May 17, 2021): 227–36. http://dx.doi.org/10.17587/mau.22.227-236.
Full textKaddoura, Sanaa, Ramzi A. Haraty, Karam Al Kontar, and Omar Alfandi. "A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems." Future Internet 13, no. 4 (March 31, 2021): 90. http://dx.doi.org/10.3390/fi13040090.
Full textJung, Dong-Seob, Sang-Joon Lee, and Ieck-Chae Euom. "ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files." Symmetry 12, no. 10 (September 30, 2020): 1621. http://dx.doi.org/10.3390/sym12101621.
Full textCHEN, ZHONGQIANG, ALEX DELIS, and PETER WEI. "IDENTIFICATION AND MANAGEMENT OF SESSIONS GENERATED BY INSTANT MESSAGING AND PEER-TO-PEER SYSTEMS." International Journal of Cooperative Information Systems 17, no. 01 (March 2008): 1–51. http://dx.doi.org/10.1142/s0218843008001750.
Full text