Showing 21 - 40 results of 45 for search '"antivirus software"', query time: 0.46s Refine Results
  1. 21

    BootBandit: A macOS bootloader attack by Armen Boursalian, Mark Stamp

    Published 2019-08-01
    “…Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. …”
    Get full text
    Article
  2. 22

    Hybrid Optimization Enabled Robust CNN-LSTM Technique for Network Intrusion Detection by Bhushan Deore, Surendra Bhosale

    Published 2022-01-01
    “…An intrusion detection system (IDS) is a security device similar to other measures, including firewalls, antivirus software, and access control models devised to strengthen communication and information security. …”
    Get full text
    Article
  3. 23

    An Analysis of Conti Ransomware Leaked Source Codes by Saleh Alzahrani, Yang Xiao, Wei Sun

    Published 2022-01-01
    “…These kinds of ransomware differ in their implementation and techniques, starting from how they spread, vulnerabilities they leverage, methods to hide their behaviors from antivirus software, encryption methods, and performance. …”
    Get full text
    Article
  4. 24

    Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls by TUDOSI, A.-D., GRAUR, A., BALAN, D. G., POTORAC, A. D., TARABUTA, R.-C.

    Published 2023-08-01
    “…Zero-day vulnerabilities are undisclosed security flaws exploited by attackers to gain unauthorized access to vulnerable systems. Firewalls and antivirus software are essential for preventing intrusions. …”
    Get full text
    Article
  5. 25
  6. 26

    Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method by Abdul Razak, Aina Nabila

    Published 2019
    “…Nowadays, antivirus software is one of the ways to measure the increasing number of malware not only on the computer but also on the information system as well as the software that needs to be protected from any attacks. …”
    Get full text
    Thesis
  7. 27

    An algorithm based on artificial intelligence for solving information security tasks by Purchina Оlga, Poluyan Аnna, Fugarov Dmitry

    Published 2023-01-01
    “…The development of antivirus software, intrusion detection and prevention systems does not fundamentally change the statistics on the number of attacks on enterprises. …”
    Get full text
    Article
  8. 28

    Dynamical Propagation Model of Malware for Cloud Computing Security by Chenquan Gan, Qingdong Feng, Xulong Zhang, Zufan Zhang, Qingyi Zhu

    Published 2020-01-01
    “…Firstly, a dynamical propagation model is proposed to explore the important factors affecting the spread of malware, especially the impact of installing antivirus software in VMs. On this basis, a theoretical analysis for this model is investigated by means of differential dynamics, from which it is able to understand the dissemination behavior of malware under an infected cloud environment. …”
    Get full text
    Article
  9. 29

    Applying Bayesian probability for Android malware detection using permission features by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif, Azlee, Zabidi

    Published 2021
    “…Various approaches have been applied to prevent malware spread, including firewalls, antivirus software and many more methods. Google has provided permission features as the main security to filter out the possibility of malware-infected Android mobile. …”
    Get full text
    Conference or Workshop Item
  10. 30
  11. 31

    Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees by Mohammad Hijji, Gulzar Alam

    Published 2022-11-01
    “…For software and hardware systems protection, organizations tend to spend an excessive amount of money procuring intrusion detection systems, antivirus software, antispyware software, and encryption mechanisms. …”
    Get full text
    Article
  12. 32
  13. 33

    N/A and signature analysis for malwares detection and removal by Jawad, Ahmad Ridha, Sharif, Khaironi Yatim, Abdulsada, Ammar Khalel

    Published 2019
    “…Methods/Statistical analysis: The rapid growth in the number and types of malware poses high security risks despite the numerous antivirus softwares with Signature-Based Detection (SBD) method. …”
    Get full text
    Article
  14. 34

    Patient Data Sharing and Confidentiality Practices of Researchers in Jordan by Karasneh RA, Al-Azzam SI, Alzoubi KH, Hawamdeh SS, Muflih SM

    Published 2019-11-01
    “…The prevalence of researchers who “Always” used antivirus software and preserved patient’s information was 75.5% and 92.2%, respectively. …”
    Get full text
    Article
  15. 35

    Efficient Malware Analysis Using Subspace-Based Methods on Representative Image Patterns by Djafer Yahia M Benchadi, Bojan Batalo, Kazuhiro Fukui

    Published 2023-01-01
    “…As signature-based detection is limited to known threats, sophisticated methods are needed to detect and classify emerging malware that can bypass traditional antivirus software. Using representative image patterns to analyze malware features can provide a more detailed and precise approach by revealing detailed patterns that may be missed otherwise. …”
    Get full text
    Article
  16. 36

    Bio-inspired framework for security in IoT devices by Mariyanayagam, Dion, Shukla, Pancham, Virdee, Bal Singh

    Published 2021
    “…DNA or proteins). In computing, antivirus software systems are adapted to detect and remove constantly changing software viruses. …”
    Get full text
    Conference or Workshop Item
  17. 37

    A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions by Ömer Aslan, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, Erdal Akin

    Published 2023-03-01
    “…Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. …”
    Get full text
    Article
  18. 38

    Novel Network Intrusion Detection Based on Feature Filtering Using FLAME and New Cuckoo Selection in a Genetic Algorithm by Kawthar Alzboon, Jehad Al-Nihoud, Wafa Alsharafat

    Published 2023-11-01
    “…To enhance network security, there are various approaches that can be employed, including the utilization of firewalls, encryption, and antivirus software. Among these methods, one type of system that can be implemented is an intrusion detection system (IDS), which actively monitors the network to identify any intrusions. …”
    Get full text
    Article
  19. 39

    Exploring Synergy of Blockchain and 6G Network for Industrial Automation by Mano Yadav, Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Suman Kumar, Fayez Alqahtani, Amr Tolba

    Published 2023-01-01
    “…Numerous established security measures, such as antivirus software, access control systems, intrusion detection systems (IDS), and intrusion prevention systems (IPS), have been identified in the literature as facing issues like centralized vulnerabilities, latency challenges, reliability issues, and single points of failure. …”
    Get full text
    Article
  20. 40

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. …”
    Get full text
    Article