نتایج جستجو برای: antivirus

تعداد نتایج: 7698  

2012
Yao Meng Shuangfeng Liu Juan Li Yanfa Meng Xiaojun Zhao

BACKGROUND Alpha-momorcharin (α-MMC) and momordica anti-HIV protein (MAP30) derived from Momordica charantia L. have been confirmed to possess antitumor and antivirus activities due to their RNA-N-glycosidase activity. However, strong immunogenicity and short plasma half-life limit their clinical application. To solve this problem, the two proteins were modified with (mPEG)(2)-Lys-NHS (20 kDa)....

2012
R. T. Goswami Avijit Mondal

Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gatetranslator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets. KeywordsPolymorphic worm; Honeypot; Honeynet; Sticky h...

2012
Kevin P. Dalton Inés Nicieza Ana Balseiro María A. Muguerza Joan M. Rosell Rosa Casais Ángel L. Álvarez Francisco Parra

Outbreaks of rabbit hemorrhagic disease have occurred recently in young rabbits on farms on the Iberian Peninsula where rabbits were previously vaccinated. Investigation identified a rabbit hemorrhagic disease virus variant genetically related to apathogenic rabbit caliciviruses. Improved antivirus strategies are needed to slow the spread of this pathogen.

Journal: :CoRR 2004
Julie Greensmith Uwe Aickelin Jamie Twycross

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves ...

2015

Genetic Algorithm technique try to improve the rates for better detection. The proposed firewalls, antivirus, and intrusion detection systems. (IDSs), cybercriminal activity automatically use these groups to train a new RBF classifier to detect. Abstract— Intrusion Detection Systems (IDSs) detects the network attacks by For this purpose Genetic Algorithm uses a function called. “Fitness Function”.

2011
Brett Stone-Gross Ryan Abman Richard A. Kemmerer Christopher Krügel Douglas G. Steigerwald

Fake antivirus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operations on the Internet. In this paper, we examine the operations of three large-scale fake AV businesses, lasting from three months to more than two yea...

2015

This includes checking server and firewall logs, scrutinizing network traffic, firewalls, intrusion detection systems, cryptography systems and antivirus software. tutorials, software listings and reviews for information security professionals covering topics such as firewalls, viruses, intrusion detection and other security topics. WindowSecurity.com Readers' Choice Award Winner Email Anti Vir...

2000

InterScan, VirusW all, eManager, MacroTrap and SoftMice are trademarks or registered trademarks of Trend Micro, Inc. StoneBeat, FullCluster and SecurityCluster are trademarks or registered trademarks of Stonesoft Inc. Any other trademarks or registered trademarks referenced in this document are the property of their respective owners.

2011
Chris Greamo

botnet infections every month, 60,000 new pieces of malware per day, and 60 percent of top Google search terms returning links to malicious sites within the first 100 results (www. mca fee.com/us/about/news/ 2010/q4/20101117-01.aspx). In fact, Cisco has reported that 10 percent of all Web malware is encountered through search engine traffic, with Google being the largest search engine provider ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید