نتایج جستجو برای: antivirus

تعداد نتایج: 7698  

Journal: :The Journal of Experimental Medicine 1937
Erich Traub

A strain of choriomeningitis virus which was highly virulent for guinea pigs, as isolated from a naturally infected white mouse, has been markedly attenuated for guinea pigs by serial intracerebral passage through white mice. The change of virulence occurred before the 8th serial passage. The modified virus as a rule produces fever in guinea pigs but no other symptoms, and the infection is foll...

2015
Xavier de Carné Mohammad Mannan

To filter SSL/TLS-protected traffic, some antivirus and parental-control applications interpose a TLS proxy in the middle of the host’s communications. We set out to analyze such proxies as there are known problems in other (more matured) TLS processing engines, such as browsers and common TLS libraries. Compared to regular proxies, client-end TLS proxies impose several unique constraints, and ...

2008
Muhammad Zubair Shafiq Syed Ali Khayam Muddassar Farooq

Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commercial antivirus software even when the malware signature is present in the antivirus database. In this paper, we present a novel anomaly detection scheme to detect embedded malware. We first analyze byte sequences in ben...

2012
Niedja Maristone Barreto Queiroz Divaldo de Almeida Sampaio Eufrázio de Souza Santos Ana Cristina de Souza Bezerra

OBJECTIVE To determine factors associated with HIV infection in blood donor candidates in Recife, Brazil. METHODS A transversal study was performed of 106,203 blood donor candidates found eligible by the routine clinical screening process in the blood bank in Recife of the Fundação de Hematologia e Hemoterapia de Pernambuco (HEMOPE) in the period from January 1998 to November 2003. Additional...

2016
Xavier de Carné de Carnavalet Mohammad Mannan

To filter SSL/TLS-protected traffic, some antivirus and parental-control applications interpose a TLS proxy in the middle of the host’s communications. We set out to analyze such proxies as there are known problems in other (more matured) TLS processing engines, such as browsers and common TLS libraries. Compared to regular proxies, client-end TLS proxies impose several unique constraints, and ...

Journal: :Okayama Igakkai Zasshi (Journal of Okayama Medical Association) 1932

Journal: :Computers & Security 2023

Model stealing attacks have been successfully used in many machine learning domains, but there is little understanding of how these work against models that perform malware detection. Malware detection and, general, security domains unique conditions. In particular, are very strong requirements for low false positive rates (FPR). Antivirus products (AVs) use complex systems to steal, binaries c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید