نتایج جستجو برای: antivirus

تعداد نتایج: 7698  

Journal: :Neurologia medico-chirurgica 2011
Makoto Ohno Yoshitaka Narita Yasuji Miyakita Hideki Ueno Takamasa Kayama Soichiro Shibui

A 61-year-old man with glioblastoma and positive for hepatitis B surface antigen (HBsAg) developed acute hepatitis due to hepatitis B virus (HBV) reactivation after concomitant postoperative treatment with temozolomide (75 mg/m(2)/day) and radiation therapy (60 Gy in 30 fractions). Corticosteroids were not used during chemo-radiation therapy, and grade 4 lymphocytopenia was observed. The levels...

2014
Divya Singhal

One of the big challenges in India in confronting computer viruses is to educate users effectively. This paper presents the results of a questionnaire survey, carried out in India in 2014 specifically in Jodhpur(Raj),India investigating the knowledge of people and attitudes towards computer viruses and virus protection and addressing the problems faced by users. Out of 127 questionnaires distri...

Journal: :Clinical infectious diseases : an official publication of the Infectious Diseases Society of America 2016
Qian Zhang Wenqian Qi Xu Wang Yonggui Zhang Yan Xu Shaoyou Qin Ping Zhao Honghua Guo Jian Jiao Changyu Zhou Shangwei Ji Jiangbin Wang

BACKGROUND To investigate the epidemiology of hepatitis B and C infections and the benefits of programs aimed at hepatitis prevention and control in Northeastern China. METHODS Individuals receiving health examinations were recruited to complete a questionnaire and undergo laboratory tests for hepatitis infection. Data on demographic characteristics, results of hepatitis B virus (HBV) and hep...

2013
J. Aaron Pendergrass Kathleen N. McGill

509 he Linux Kernel Integrity Measurer (LKIM) is a next-generation technology for the detection of malicious modifications to a running piece of software. Unlike traditional antivirus systems, LKIM does not rely on a database of known malware signatures; instead, LKIM uses a precise model of expected program behavior to verify the consistency of critical data structures at runtime. APL and the ...

Journal: :CoRR 2012
Mousafa Saleh

No part of this dissertation has been submitted elsewhere for any other degree or qualification and it is all my own work unless referenced to the contrary in the text. The contents of this dissertation reflect my own personal views, and are not necessarily endorsed by the University. Declaration We certify that we have read the present work and that in our opinion it is fully adequate in scope...

2015
Mohammed I. Al-Saleh

Computer network is a major venue for malware to spread out and infect new victims. Many effective countermeasures against attacks are deployed at different network boundaries. Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Firewalls are among such security controls. The Antivirus (AV) software is widespread among end-users and deployed as a last line of defense agai...

Journal: :Blood 1968
S McBeath D G Harnden

N OT ALL ANIMALS carrying an oncogenic virus develop the tumor associated with this virus.1 Further, it has been shown that polyoma virus is vide1v distributed in mouse P0PUlatiO1i5 in which polyoma-induced tumors are rare or do not occur at all.2 The possibility exists, therefore, that a virus which is )otentially oncogenic in man ii a ’ be widely distributed in human populations. either as a ...

Journal: :Applied sciences 2022

This paper focuses on training machine learning models using the XGBoost and extremely randomized trees algorithms two datasets obtained static dynamic analysis of real malicious benign samples. We then compare their success rates—both mutually with other algorithms, such as random forest, decision tree, support vector machine, naïve Bayes which we compared in our previous work same datasets. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید