نتایج جستجو برای: antivirus

تعداد نتایج: 7698  

2011
Mohammed I. Al-Saleh Jedidiah R. Crandall

Remote attackers use network reconnaissance techniques, such as port scanning, to gain information about a victim machine and then use this information to launch an attack. Current network reconnaissance techniques, that are typically below the application layer, are limited in the sense that they can only give basic information, such as what services a victim is running. Furthermore, modern re...

2016
Lili Yu Yongtao Xu Fangchao Wang Can Yang Guoyan Liu Xiangfeng Song

Human adipose-derived mesenchymal stem cells (hAD-MSCs) are mesenchymal stem cells with the capability to modulate immune responses. Evidence showing that hAD-MSCs could mediate innate immune responses through pattern recognition receptors (PRRs) is increasing. However, the roles of PRRs in regulating the innate sensing of virus nucleic acids (RNA and DNA) in hAD-MSCs have not yet been investig...

Journal: :Zeitschrift fur Naturforschung. C, Journal of biosciences 2010
Xiaoyong Liu Keping Chen Qin Yao Hengchuan Xia

To investigate the mechanism of nucleopolyhedrovirus resistance of silkworm, we bred a near-isogenic silkworm line, designated BC9, from the parental resistant strain NB and the susceptible strain 306, that is resistant to infection by nucleopolyhedrovirus. Proteomic techniques were employed to search for candidate genes playing a role in the antivirus response, based on differential protein ex...

2014
Heqing Huang Kai Chen Peng Liu Sencun Zhu Dinghao Wu

With the rapid increase in Android device popularity, a new evolving arms-race is happening between the malware writers and AntiVirus Detectors (AVDs) on the popular mobile system. In its latest comparison of AVDs, independent test lab AV-TEST reported that AVDs have around 95% malware recognition rate. However, as mobile systems are specially designed, we consider that the power of AVDs’ shoul...

2010
Igor Santos Felix Brezo Javier Nieves Yoseba K. Penya Borja Sanz Carlos Laorden Pablo García Bringas

Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. Hence, malware detection has become a critical topic in computer security. Currently, signature-based detection is the most extended method within commercial antivirus. Although this method is still used on most popula...

2015
Yudi Prayudi Imam Riadi

Malware analysis is a process to perform analysis of malware and how to study the components and behavior of malware. On this paper it will use two methods of malware analysis, static analysis and dynamic analysis. Static analysis is a method of malware analysis which done without running the malware. While dynamic analysis is a method of malware analysis which the malware is running in a secur...

2000
Sarah Gordon

The nature of technology is changing rapidly; likewise, the nature of viral threats to the data dependent upon the technology is evolving. Thus, the technologies we rely upon to provide protection from these threats must adapt. In the last twelve months, several anti-virus software vendors have announced exciting new technologies which claim to provide “faster, better, cheaper” response to comp...

2005
Thomas M. Chen

1. Introduction The communal nature of the Internet exposes organizations and home computer users to a multitude of worms, viruses, and other malicious software (malware) threats such as spyware and Trojan horses. Viruses are program fragments attached to normal programs or files that hijack the execution control of the host program to reproduce copies of the virus. Worms are automated self-rep...

2013
Ankita K Tiwari

In recent years, the number of malware families/variants has exploded dramatically. Automatic malware classification is becoming an important research area. Using data mining, we identify seven key features within the Microsoft PE file format that can be fed to machine learning algorithms to classify malware. In this paper, resting on the analysis of Windows API execution sequences called by PE...

2018
Jichao Bi Lu-Xing Yang Xiaofan Yang Yingbo Wu Yuan Yan Tang

This article addresses the tradeoff between the losses caused by a new virus and the size of the team for developing an antivirus against the virus. First, an individual-level virus spreading model is proposed to capture the spreading process of the virus before the appearance of its natural enemy. On this basis, the tradeoff problem is modeled as a discrete optimization problem. Next, the infl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید