نتایج جستجو برای: antivirus
تعداد نتایج: 7698 فیلتر نتایج به سال:
BACKGROUND Alpha-momorcharin (α-MMC) and momordica anti-HIV protein (MAP30) derived from Momordica charantia L. have been confirmed to possess antitumor and antivirus activities due to their RNA-N-glycosidase activity. However, strong immunogenicity and short plasma half-life limit their clinical application. To solve this problem, the two proteins were modified with (mPEG)(2)-Lys-NHS (20 kDa)....
Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gatetranslator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. KeywordsPolymorphic worm; Honeypot; Honeynet; Sticky h...
Outbreaks of rabbit hemorrhagic disease have occurred recently in young rabbits on farms on the Iberian Peninsula where rabbits were previously vaccinated. Investigation identified a rabbit hemorrhagic disease virus variant genetically related to apathogenic rabbit caliciviruses. Improved antivirus strategies are needed to slow the spread of this pathogen.
In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves ...
Genetic Algorithm technique try to improve the rates for better detection. The proposed firewalls, antivirus, and intrusion detection systems. (IDSs), cybercriminal activity automatically use these groups to train a new RBF classifier to detect. Abstract— Intrusion Detection Systems (IDSs) detects the network attacks by For this purpose Genetic Algorithm uses a function called. “Fitness Function”.
Fake antivirus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operations on the Internet. In this paper, we examine the operations of three large-scale fake AV businesses, lasting from three months to more than two yea...
This includes checking server and firewall logs, scrutinizing network traffic, firewalls, intrusion detection systems, cryptography systems and antivirus software. tutorials, software listings and reviews for information security professionals covering topics such as firewalls, viruses, intrusion detection and other security topics. WindowSecurity.com Readers' Choice Award Winner Email Anti Vir...
InterScan, VirusW all, eManager, MacroTrap and SoftMice are trademarks or registered trademarks of Trend Micro, Inc. StoneBeat, FullCluster and SecurityCluster are trademarks or registered trademarks of Stonesoft Inc. Any other trademarks or registered trademarks referenced in this document are the property of their respective owners.
botnet infections every month, 60,000 new pieces of malware per day, and 60 percent of top Google search terms returning links to malicious sites within the first 100 results (www. mca fee.com/us/about/news/ 2010/q4/20101117-01.aspx). In fact, Cisco has reported that 10 percent of all Web malware is encountered through search engine traffic, with Google being the largest search engine provider ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید