نتایج جستجو برای: antivirus
تعداد نتایج: 7698 فیلتر نتایج به سال:
A strain of choriomeningitis virus which was highly virulent for guinea pigs, as isolated from a naturally infected white mouse, has been markedly attenuated for guinea pigs by serial intracerebral passage through white mice. The change of virulence occurred before the 8th serial passage. The modified virus as a rule produces fever in guinea pigs but no other symptoms, and the infection is foll...
To filter SSL/TLS-protected traffic, some antivirus and parental-control applications interpose a TLS proxy in the middle of the host’s communications. We set out to analyze such proxies as there are known problems in other (more matured) TLS processing engines, such as browsers and common TLS libraries. Compared to regular proxies, client-end TLS proxies impose several unique constraints, and ...
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commercial antivirus software even when the malware signature is present in the antivirus database. In this paper, we present a novel anomaly detection scheme to detect embedded malware. We first analyze byte sequences in ben...
OBJECTIVE To determine factors associated with HIV infection in blood donor candidates in Recife, Brazil. METHODS A transversal study was performed of 106,203 blood donor candidates found eligible by the routine clinical screening process in the blood bank in Recife of the Fundação de Hematologia e Hemoterapia de Pernambuco (HEMOPE) in the period from January 1998 to November 2003. Additional...
To filter SSL/TLS-protected traffic, some antivirus and parental-control applications interpose a TLS proxy in the middle of the host’s communications. We set out to analyze such proxies as there are known problems in other (more matured) TLS processing engines, such as browsers and common TLS libraries. Compared to regular proxies, client-end TLS proxies impose several unique constraints, and ...
Model stealing attacks have been successfully used in many machine learning domains, but there is little understanding of how these work against models that perform malware detection. Malware detection and, general, security domains unique conditions. In particular, are very strong requirements for low false positive rates (FPR). Antivirus products (AVs) use complex systems to steal, binaries c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید