نتایج جستجو برای: antivirus

تعداد نتایج: 7698  

2012
Hossein Jahankhani Branko Antonijevic Terry Walcott Hossein Jahankani

The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are mar...

2016
Binay Kumar Mishra

To curb the impact and transmission of worms and virus for simple mass action incidence rate in computer networks, SI1I2RS (Susceptible, Infectious due to worm, Infectious due to virus, Recovered and Susceptible) model have been formed. Basic reproduction number, endemic equilibrium state and their stability are discussed for the simple mass action incidence. For locally and globally asymptotic...

2014
Ge Meng Mei Wang Kejie Zhang Zengjun Guo Juan Shi

An exhaustive literature survey on the secondary metabolites of widely distributed Prunella vulgaris L. species has been carried out. Triterpenoids, sterols, phenylpropanoids, flavonoids, coumarins, fatty acids, volatile oils and carbohydrates along with some other compounds, have been reported from this species. Many of these compounds have been found to possess significant biological properti...

Journal: :E3S web of conferences 2021

As an important physiological active factor in the body, lysozyme has a variety of functions, such as bacteriostasis, antivirus and immunity enhancement. This paper describes detail application food processing fields storing meats, prevention deterioration alcoholic drinks, fruits vegetables, treatment microbial infectious diseases, cancer, virus infection other medical fields. At same time, pr...

2014
Zizhen Zhang Huizhong Yang

By incorporating the time delay due to the period that computers use antivirus software to clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed in this paper. The dynamical behaviors which include local stability and Hopf bifurcation are investigated by regarding the delay as bifurcating parameter. Specially, direction and stability of the Hopf bifurcation are d...

2012
Smriti Jain Maya Ingle

Attacks against networked system are common and increasing, therefore, IT practitioners need to secure the system. Hence, security is recognized as a key feature for sharing data among enterprises and the semantic web. Sharing increases the risk like viruses, fraud, and misuse of data. Data can be secured internally by a secured product and secure settings, as well as externally by using encryp...

2004
Greg Hoglund Gary McGraw

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید