Works matching DE "ANTIVIRUS software"
Results: 212
Staying Safe Online: A Guide to Cyber Security.
- Published in:
- British Dental Nurses Journal, 2025, v. 88, n. 1, p. 28
- Publication type:
- Article
АНАЛІЗ КОМП’ЮТЕРНИХ ВІРУСІВ, СТВОРЕНИХ ЗА ДОПОМОГОЮ ШТУЧНОГО ІНТЕЛЕКТУ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 256, doi. 10.18372/2225-5036.30.19237
- By:
- Publication type:
- Article
Technology Literacy Collections: A Self-Help Solution That Creates a Culture of Helpers.
- Published in:
- Alki: The Washington Library Association Journal, 2019, v. 35, n. 3, p. 17
- By:
- Publication type:
- Article
OpcA and PorB are novel bactericidal antigens of the 4CMenB vaccine in mice and humans.
- Published in:
- NPJ Vaccines, 2023, v. 8, n. 1, p. 1, doi. 10.1038/s41541-023-00651-9
- By:
- Publication type:
- Article
Generative/LLM Bio.
- Published in:
- ISSA Journal, 2024, v. 22, n. 6, p. 15
- By:
- Publication type:
- Article
Reinforcing zero trust architectures for the modern era.
- Published in:
- ISSA Journal, 2023, v. 21, n. 1, p. 8
- By:
- Publication type:
- Article
Mindlessly Following "Best Practices".
- Published in:
- ISSA Journal, 2020, v. 18, n. 6, p. 7
- By:
- Publication type:
- Article
Optimal Control Strategy for SLBRS with Two Control Inputs.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 19, p. 4036, doi. 10.3390/math11194036
- By:
- Publication type:
- Article
Dynamic Connectedness among Vaccine Companies' Stock Prices: Before and after Vaccines Released.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 15, p. 2812, doi. 10.3390/math10152812
- By:
- Publication type:
- Article
ANALYSIS OF THE FREQUENCY AND TYPE OF CYBER ATTACKS ON VIBER: STATISTICAL CORRELATION AND TRENDS IN THE LAST THREE YEARS.
- Published in:
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2024, v. 24, n. 47, p. 1
- By:
- Publication type:
- Article
Security Measures Against Malware Penetration and Spreading.
- Published in:
- TEM Journal, 2013, v. 2, n. 1, p. 83, doi. 10.18421/tem21-12
- By:
- Publication type:
- Article
Genotype VII.1.1-Based Newcastle Disease Virus Vaccines Afford Better Protection against Field Isolates in Commercial Broiler Chickens.
- Published in:
- Animals (2076-2615), 2022, v. 12, n. 13, p. N.PAG, doi. 10.3390/ani12131696
- By:
- Publication type:
- Article
Integrating attacker behavior in IT security analysis: a discrete-event simulation approach.
- Published in:
- Information Technology & Management, 2015, v. 16, n. 3, p. 221, doi. 10.1007/s10799-015-0232-6
- By:
- Publication type:
- Article
An Update on the Pharmacological Aspects of Vaccines and Antivirals for the Management of Monkeypox.
- Published in:
- Journal of Pharmacology & Pharmacotherapeutics, 2022, v. 13, n. 4, p. 341, doi. 10.1177/0976500X231156733
- By:
- Publication type:
- Article
Secure the IoT Networks as Epidemic Containment Game.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 2, p. 156, doi. 10.3390/sym13020156
- By:
- Publication type:
- Article
Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 1, p. 87, doi. 10.3390/su15010087
- By:
- Publication type:
- Article
A Decision-Making Approach to the Spam Problem.
- Published in:
- INFOR, 2011, v. 49, n. 1, p. 1, doi. 10.3138/infor.49.1.001
- By:
- Publication type:
- Article
Interview with Jim Astbury, IT Manager of Infinity Global.
- Published in:
- Journal of Global Information Technology Management, 2021, v. 24, n. 2, p. 149, doi. 10.1080/1097198X.2021.1914501
- By:
- Publication type:
- Article
ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system.
- Published in:
- BenchCouncil Transactions on Benchmarks, Standards & Evaluations, 2023, v. 3, n. 1, p. 1, doi. 10.1016/j.tbench.2023.100106
- By:
- Publication type:
- Article
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00157-w
- By:
- Publication type:
- Article
HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics.
- Published in:
- Ingénierie des Systèmes d'Information, 2021, v. 26, n. 3, p. 319, doi. 10.18280/isi.260309
- By:
- Publication type:
- Article
AUTOMATED SOFTWARE AND HARDWARE SELECTION SYSTEMS FOR ENTERPRISE COMPUTERS' CYBERSECURITY.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2023, v. 13, n. 1/2, p. 87, doi. 10.15276/imms.v13.no1-2.87
- By:
- Publication type:
- Article
Validación de una escala de conciencia sobre ciberdelito en estudiantes universitarios de Perú.
- Published in:
- Revista Científica General José María Córdova, 2022, v. 20, n. 37, p. 209, doi. 10.21830/19006586.791
- By:
- Publication type:
- Article
Emerging evidence on Monkeypox: resurgence, global burden, molecular insights, genomics and possible management.
- Published in:
- Frontiers in Cellular & Infection Microbiology, 2023, p. 1, doi. 10.3389/fcimb.2023.1134712
- By:
- Publication type:
- Article
Toward a Taxonomy of Malware Behaviors.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2758, doi. 10.1093/comjnl/bxv047
- By:
- Publication type:
- Article
A Primer on Data Security.
- Published in:
- CPA Journal, 2015, v. 85, n. 5, p. 58
- By:
- Publication type:
- Article
Lessons Learned on Observed-to-Expected Analysis Using Spontaneous Reports During Mass Vaccination.
- Published in:
- Drug Safety, 2024, v. 47, n. 7, p. 607, doi. 10.1007/s40264-024-01422-8
- By:
- Publication type:
- Article
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 4, p. 1279, doi. 10.1007/s11036-018-1166-0
- By:
- Publication type:
- Article
Malware Threats: How to Protect Your Organization.
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2014, v. 33, n. 3, p. 13
- By:
- Publication type:
- Article
Overview of Real-Time Antivirus Scanning Engines.
- Published in:
- Journal of Engineering Science & Technology Review, 2012, v. 5, n. 1, p. 63
- By:
- Publication type:
- Article
Patient Data Sharing and Confidentiality Practices of Researchers in Jordan.
- Published in:
- Risk Management & Healthcare Policy, 2019, v. 12, p. 255, doi. 10.2147/RMHP.S227759
- By:
- Publication type:
- Article
Research on android infiltration technology based on the silent installation of an accessibility service.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 2, p. 1, doi. 10.1177/1550147720903628
- By:
- Publication type:
- Article
Protection Methods Specific to Information Technology Threats. Case Study.
- Published in:
- 2016
- By:
- Publication type:
- Case Study
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2023, v. 33, n. 10, p. 1599, doi. 10.1142/S0218194023500444
- By:
- Publication type:
- Article
Impact of anti-virus software on computer virus dynamical behavior.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2014, v. 25, n. 5, p. -1, doi. 10.1142/S0129183114400105
- By:
- Publication type:
- Article
A study on the implementation of a system providing reliable malware information service.
- Published in:
- International Journal of Electrical Engineering Education, 2021, v. 58, n. 2, p. 517, doi. 10.1177/0020720919828982
- By:
- Publication type:
- Article
DIFFERENTIAL EFFECTS OF PRIOR EXPERIENCE ON THE MALWARE RESOLUTION PROCESS.
- Published in:
- MIS Quarterly, 2014, v. 38, n. 3, p. 655
- By:
- Publication type:
- Article
The Online Vaccine Debate: Study of a Visual Analytics System.
- Published in:
- Informatics, 2020, v. 7, n. 1, p. 3, doi. 10.3390/informatics7010003
- By:
- Publication type:
- Article
e-Health for COVID-19 Epidemic: The Arizona Poison and Drug Information Center Experience.
- Published in:
- Telemedicine & e-Health, 2022, v. 28, n. 5, p. 747, doi. 10.1089/tmj.2021.0287
- By:
- Publication type:
- Article
Promote to protect: data-driven computational model of peer influence for vaccine perception.
- Published in:
- Scientific Reports, 2024, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-50756-3
- By:
- Publication type:
- Article
Use of a point-of-care test to rapidly assess levels of SARS-CoV-2 nasal neutralising antibodies in vaccines and breakthrough infected individuals.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-47613-8
- By:
- Publication type:
- Article
IoT platforms assessment methodology for COVID-19 vaccine logistics and transportation: a multi-methods decision making model.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-44966-y
- By:
- Publication type:
- Article
IoT platforms assessment methodology for COVID-19 vaccine logistics and transportation: a multi-methods decision making model.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-44966-y
- By:
- Publication type:
- Article
Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/3187205
- By:
- Publication type:
- Article
Android Malware Detection Based on a Hybrid Deep Learning Model.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8863617
- By:
- Publication type:
- Article
SOFTWARE FOR COMPUTER SYSTEMS TROJANS DETECTION AS A SAFETY-CASE TOOL.
- Published in:
- Information & Security, 2012, v. 28, n. 1, p. 121, doi. 10.11610/isij.2810
- By:
- Publication type:
- Article
Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 2, p. 102, doi. 10.3390/info15020102
- By:
- Publication type:
- Article
Malware Detection Based on Code Visualization and Two-Level Classification.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 3, p. 118, doi. 10.3390/info12030118
- By:
- Publication type:
- Article
Predicting Online Target Hardening Behaviors: An Extension of Routine Activity Theory for Privacy-Enhancing Technologies and Techniques.
- Published in:
- Deviant Behavior, 2021, v. 42, n. 12, p. 1532, doi. 10.1080/01639625.2020.1760418
- By:
- Publication type:
- Article
Falling for an email phishing scam at the office.
- Published in:
- Optometry Times, 2015, v. 7, n. 10, p. 20
- By:
- Publication type:
- Article