نتایج جستجو برای: antivirus

تعداد نتایج: 7698  

Journal: :The Journal of general virology 1973
P M Pitha J Pitha

The complex of polyinosinate with polycytidylate (poly IC) has been attached to solid carriers which can be suspended in the medium over the cell monolayer; it has also been attached to surfaces which may be overgrown by the cell monolayer. Interferon production and antivirus protection achieved by these inducer systems were measured and it was found that such anchored poly IC conveyed antiviru...

2011
Sujandharan Venkatachalam Mark Stamp

Signature-based detection provides a relatively simple and efficient method for detecting known viruses. At present, most antivirus systems rely primarily on signature

Journal: :iranian journal of basic medical sciences 0
fatemeh forouzanfar department of pharmacology, faculty of medicine, mashhad university of medical sciences, mashhad, iran bibi sedigheh fazly bazzaz biotechnology research center, school of pharmacy, mashhad university of medical sciences, mashhad, iran hossein hosseinzadeh pharmaceutical research center, pharmacodynamy and toxicology department, school of pharmacy, mashhad university of medical sciences, mashhad, iran

nigella sativa seeds have wide therapeutic effects and have been reported to have significant effects against many ailments such as skin diseases, jaundice, gastrointestinal problems, anorexia, conjunctivitis, dyspepsia, rheumatism, diabetes, hypertension, intrinsic hemorrhage, paralysis, amenorrhea, anorexia, asthma, cough, bronchitis, headache, fever, influenza and eczema. thymoquinone (tq) i...

2011
Federico Maggi Andrea Bellini Guido Salvaneschi Stefano Zanero

Abstract Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty—more for researchers than for practitioners—for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications given by different detectors. Cl...

Journal: :Journal of Information System Research (JOSH) 2023

Malware, short for “Malicious Software”, is a program specifically designed to perform an activity that can harm software on victim's device. Examples of commonly found malware include trojans, ransomware and downloaders. It important computer users recognize avoid when using devices. Therefore, overcome attacks by protection devices Antivirus prevent, find, detect, remove the types have been m...

Journal: :Oriental journal of computer science and technology 2017

Journal: :International Journal of Network Management 2006

Journal: :IET Information Security 2013
Mohammed I. Al-Saleh Antonio M. Espinoza Jedidiah R. Crandall

Cyber security threats are still big concerns of the cyber world. Even though many defense techniques have been proposed and used so far, the antivirus (AV) software is very widely used and recommended for the end-usersPC community. Most effective AV products are commercial and thus competitive and it is not obvious for security researchers or system developers how exactly the AV works or how i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید