Works matching DE "ANTIVIRUS software"
Results: 211
A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification.
- Published in:
- Journal of Cybersecurity (2579-0072), 2024, v. 6, p. 1, doi. 10.32604/jcs.2023.046915
- By:
- Publication type:
- Article
АНАЛІЗ КОМП’ЮТЕРНИХ ВІРУСІВ, СТВОРЕНИХ ЗА ДОПОМОГОЮ ШТУЧНОГО ІНТЕЛЕКТУ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 256, doi. 10.18372/2225-5036.30.19237
- By:
- Publication type:
- Article
Ransomware Early Detection Techniques.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 3, p. 14497, doi. 10.48084/etasr.6915
- By:
- Publication type:
- Article
A new analytic numeric method solution for fractional modified epidemiological model for computer viruses.
- Published in:
- Applications & Applied Mathematics, 2015, v. 10, n. 2, p. 919
- By:
- Publication type:
- Article
Spread of Malicious Objects in Computer Network: A Fuzzy Approach.
- Published in:
- Applications & Applied Mathematics, 2013, v. 8, n. 2, p. 684
- By:
- Publication type:
- Article
Secret Sharing as a Defense Mechanism for Ransomware in Cloud Storage Systems.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 10, p. 1008, doi. 10.14569/ijacsa.2024.01510102
- By:
- Publication type:
- Article
DHCP-Enabled LAN Prone to Phishing Attacks.
- Published in:
- IUP Journal of Information Technology, 2013, v. 9, n. 1, p. 24
- By:
- Publication type:
- Article
Research on android infiltration technology based on the silent installation of an accessibility service.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 2, p. 1, doi. 10.1177/1550147720903628
- By:
- Publication type:
- Article
NETWORK SECURITY WITH VIRTUAL REALITY BASED ANTIVIRUS PROTECTION AND REDUCED DETECTION DELAYS.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 1, p. 35, doi. 10.12694/scpe.v25i1.2172
- By:
- Publication type:
- Article
Dental Cybersecurity: Protect Your Practice.
- Published in:
- Oklahoma Dental Association Journal, 2018, v. 109, n. 6, p. 40
- By:
- Publication type:
- Article
Technology You Can Use! The Mandy, The Handy, And The Dandy.
- Published in:
- Oklahoma Dental Association Journal, 2011, v. 102, n. 4, p. 35
- By:
- Publication type:
- Article
Technological Turf Wars: A Case Study of the Computer Antivirus Industry.
- Published in:
- 2010
- By:
- Publication type:
- Book Review
FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface.
- Published in:
- Computer Systems Science & Engineering, 2024, v. 48, n. 4, p. 969, doi. 10.32604/csse.2024.046615
- By:
- Publication type:
- Article
The Online Vaccine Debate: Study of a Visual Analytics System.
- Published in:
- Informatics, 2020, v. 7, n. 1, p. 3, doi. 10.3390/informatics7010003
- By:
- Publication type:
- Article
Vaccine Hesitancy: A Growing Concern.
- Published in:
- Pediatric Drugs, 2020, v. 22, n. 2, p. 105, doi. 10.1007/s40272-020-00385-4
- By:
- Publication type:
- Article
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 4, p. 1279, doi. 10.1007/s11036-018-1166-0
- By:
- Publication type:
- Article
Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model.
- Published in:
- Computers, Materials & Continua, 2024, v. 81, n. 3, p. 4485, doi. 10.32604/cmc.2024.059116
- By:
- Publication type:
- Article
ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks.
- Published in:
- Computers, Materials & Continua, 2024, v. 81, n. 3, p. 4049, doi. 10.32604/cmc.2024.057211
- By:
- Publication type:
- Article
An Effective Threat Detection Framework for Advanced Persistent Cyberattacks.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 4231, doi. 10.32604/cmc.2023.034287
- By:
- Publication type:
- Article
Unified Detection of Obfuscated and Native Android Malware.
- Published in:
- Computers, Materials & Continua, 2022, v. 70, n. 2, p. 3099, doi. 10.32604/cmc.2022.020202
- By:
- Publication type:
- Article
Applying fractional calculus to malware spread: A fractal-based approach to threat analysis.
- Published in:
- PLoS ONE, 2025, v. 20, n. 1, p. 1, doi. 10.1371/journal.pone.0313914
- By:
- Publication type:
- Article
Security Posture is Real Resilience to Cyberattacks.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 22
- Publication type:
- Article
Symantec scales new heights in antivirus capabilities.
- Published in:
- 2015
- By:
- Publication type:
- Product Review
McAfee hardens business against digital threats.
- Published in:
- ComputerWorld Hong Kong, 2014, p. 48
- By:
- Publication type:
- Article
AN INNER INTERRUPTION DISCOVERY AND DEFENSE SYSTEM BY USING DATA MINING.
- Published in:
- Informatologia, 2017, v. 50, n. 1/2, p. 87
- By:
- Publication type:
- Article
The last botnet.
- Published in:
- Nature Physics, 2008, v. 4, n. 9, p. 744, doi. 10.1038/nphys1067
- By:
- Publication type:
- Article
Complex networks: Behind enemy lines.
- Published in:
- Nature Physics, 2005, v. 1, n. 3, p. 135, doi. 10.1038/nphys183
- By:
- Publication type:
- Article
Turbo Boost Your Practice-Management Software: A checklist of third-party solutions that provide many benefits.
- Published in:
- Ontario Dentist, 2021, v. 98, n. 3, p. 44
- By:
- Publication type:
- Article
When is Cyber Defense a Crime? Evaluating Active Cyber Defense Measures Under the Budapest Convention.
- Published in:
- Chicago Journal of International Law, 2020, v. 20, n. 2, p. 350
- By:
- Publication type:
- Article
Security Measures Against Malware Penetration and Spreading.
- Published in:
- TEM Journal, 2013, v. 2, n. 1, p. 83, doi. 10.18421/tem21-12
- By:
- Publication type:
- Article
Evaluation of the zenithal total delay estimates from BeiDou/GPS combined signals in the frame of the IGS MGEX project.
- Published in:
- Acta Geodaetica et Geophysica, 2019, v. 54, n. 1, p. 71, doi. 10.1007/s40328-018-0240-1
- By:
- Publication type:
- Article
Novel Network Intrusion Detection Based on Feature Filtering Using FLAME and New Cuckoo Selection in a Genetic Algorithm.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 23, p. 12755, doi. 10.3390/app132312755
- By:
- Publication type:
- Article
RepVGG-SimAM: An Efficient Bad Image Classification Method Based on RepVGG with Simple Parameter-Free Attention Module.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 21, p. 11925, doi. 10.3390/app132111925
- By:
- Publication type:
- Article
Special Issue on Advance in Digital Signal, Image and Video Processing.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 13, p. 7642, doi. 10.3390/app13137642
- By:
- Publication type:
- Article
Antivirus Evasion Methods in Modern Operating Systems.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 8, p. 5083, doi. 10.3390/app13085083
- By:
- Publication type:
- Article
A Study on Improving M2M Network Security through Abnormal Traffic Control.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 21, p. 10836, doi. 10.3390/app122110836
- By:
- Publication type:
- Article
Evaluation of Local Security Event Management System vs. Standard Antivirus Software.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 3, p. 1076, doi. 10.3390/app12031076
- By:
- Publication type:
- Article
Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 18, p. 3680, doi. 10.3390/app9183680
- By:
- Publication type:
- Article
Genotype VII.1.1-Based Newcastle Disease Virus Vaccines Afford Better Protection against Field Isolates in Commercial Broiler Chickens.
- Published in:
- Animals (2076-2615), 2022, v. 12, n. 13, p. N.PAG, doi. 10.3390/ani12131696
- By:
- Publication type:
- Article
New Techniques for Protection of IoT Devices from Malicious Behavior Using Working Set Based System Call Whitelisting and Argument Clustering.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 1, p. 178
- By:
- Publication type:
- Article
Metamorphic Malware and Obfuscation: A Survey of Techniques, Variants, and Generation Kits.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/8227751
- By:
- Publication type:
- Article
Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 2, p. 102, doi. 10.3390/info15020102
- By:
- Publication type:
- Article
Malware Detection Based on Code Visualization and Two-Level Classification.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 3, p. 118, doi. 10.3390/info12030118
- By:
- Publication type:
- Article
Patient Data Sharing and Confidentiality Practices of Researchers in Jordan.
- Published in:
- Risk Management & Healthcare Policy, 2019, v. 12, p. 255, doi. 10.2147/RMHP.S227759
- By:
- Publication type:
- Article
Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 1, p. 87, doi. 10.3390/su15010087
- By:
- Publication type:
- Article
Aadhar Arogya: Integrated Electronic Health Record as an Aid in Bridging the Gap between Individual Health and Public Health in India - A Review.
- Published in:
- Indian Journal of Forensic Medicine & Toxicology, 2021, v. 15, n. 4, p. 2937, doi. 10.37506/ijfmt.v15i4.17145
- By:
- Publication type:
- Article
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2023, v. 33, n. 10, p. 1599, doi. 10.1142/S0218194023500444
- By:
- Publication type:
- Article
Impact of anti-virus software on computer virus dynamical behavior.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2014, v. 25, n. 5, p. -1, doi. 10.1142/S0129183114400105
- By:
- Publication type:
- Article
VirtAV: an Agentless Runtime Antivirus System for Virtual Machines.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 11, p. 5642, doi. 10.3837/tiis.2017.11.026
- By:
- Publication type:
- Article
Polymorphic malware detection using sequence classification methods and ensembles.
- Published in:
- EURASIP Journal on Information Security, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13635-017-0055-6
- By:
- Publication type:
- Article