نتایج جستجو برای: antivirus

تعداد نتایج: 7698  

Journal: :CoRR 2014
Monire Norouzi Saeed Parsa Ali Mahjur

Formal method techniques provides a suitable platform for the software development in software systems. Formal methods and formal verification is necessary to prove the correctness and improve performance of software systems in various levels of design and implementation, too. Security Discussion is an important issue in computer systems. Since the antivirus applications have very important rol...

Journal: :CoRR 2011
Wajeb Gharibi Abdulrahman Mirza

market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is...

2015

With the various and increasingly malicious attacks on networks and wireless systems, traditional security tools such as anti-virus programs. The service Intrusion Detection System Renon Web Technologies is beyond the Sostaziale the difference between a firewall and an IDS it is that the latter. trained and certified in firewall and IPS/IDS technologies but not the core body of security knowled...

Journal: :Symmetry 2017
Igor Forain Robson de Oliveira Albuquerque Ana Lucila Sandoval Orozco L. Javier García-Villalba Tai-Hoon Kim

Increasingly sophisticated antivirus (AV) software and the growing amount and complexity of malware demand more processing power from personal computers, specifically from the central processor unit (CPU). This paper conducted performance tests with Clam AntiVirus (ClamAV) and improved its performance through parallel processing on multiple cores using the Open Multi-Processing (OpenMP) library...

Journal: :CoRR 2017
Jichao Bi Luxing Yang Xiaofan Yang Yingbo Wu Yuan Yan Tang

This paper addressed the issue of estimating the damage caused by a computer virus. First, an individual-level delayed SIR model capturing the spreading process of a digital virus is derived. Second, the damage inflicted by the virus is modeled as the sum of the economic losses and the cost for developing the antivirus. Next, the impact of different factors, including the delay and the network ...

2010
Marco Cova Corrado Leita Olivier Thonnard Angelos D. Keromytis Marc Dacier

Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of the rogue antivirus threat ecosystem, focusing on the structure and dynamics of this threat and its economics. To that end, we compiled and mined a large dataset of characteristics of rogue antivirus domains and of the se...

Journal: :IOSR Journal of Computer Engineering 2013

2012
Murali Krishna

Negative aspects of networking lately became one of the most crucial problems in the information world. Protection against malware and malicious code must balance between being capable of fast detection of malware and being light on resources Since modern antivirus systems are not optimized in the terms of speed, this is one of the reasons why optimization towards performance and not only effic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید