Showing 141 - 160 results of 175 for search '"computer virus"', query time: 0.23s Refine Results
  1. 141

    Information technology (IT) security. The Impact of malicious software : role of software characteristics and security response of developers/ anti-virus vendors by Bah, Shee Shee, Chua, Hui Jin, Lim, Hui Qing

    Published 2008
    “…This research takes a multiple-case study approach to examine damage caused by seven prominent computer viruses, including mass mailing worms as well as exploits that target software vulnerabilities. …”
    Get full text
    Final Year Project (FYP)
  2. 142

    Information diffusion in social networks by Al Taie, M. Z., Kadry, S.

    Published 2017
    “…We are interested in knowing how a piece of information (knowledge) is spread through a network. These may be computer viruses spreading on the Internet or a network of computers, diseases through a social network, or rumors and ideas through a social network. …”
    Book Section
  3. 143

    Attacking cryptosystems by means of virus machines by Mario J. Pérez-Jiménez, Antonio Ramírez-de-Arellano, David Orellana-Martín

    Published 2023-12-01
    “…The paper focuses on the computing paradigm of virus machines within the area of Unconventional Computing and Natural Computing. Virus machines, which incorporate concepts of virology and computer science, are considered as number computing devices with the environment. …”
    Get full text
    Article
  4. 144

    A New Class of “Growth Functions” with Polynomial Variable Transfer Generated by Real Reaction Networks by Kyurkchiev Nikolay

    Published 2020-12-01
    “…The consideration of such a dynamic model in the present article is dictated by our passionate desire to offer an adequate model with which to well approximate specific data in the field of computer viruses propagation, characterized by rapid growth in the initial time interval. …”
    Get full text
    Article
  5. 145

    Malware phylogeny oriented to libraries analysis by Juan Manuel Gutiérrez-Cárdenas, Leopoldo Lenin Orihuela

    Published 2016-03-01
    “…The use of these phylogeny techniques with a focus on computer viruses has allowed the finding of similarities between different malware families. …”
    Get full text
    Article
  6. 146

    Percolation centrality: quantifying graph-theoretic impact of nodes during percolation in networks. by Mahendra Piraveenan, Mikhail Prokopenko, Liaquat Hossain

    Published 2013-01-01
    “…However, the existing centrality measures are not adequate in network percolation scenarios (such as during infection transmission in a social network of individuals, spreading of computer viruses on computer networks, or transmission of disease over a network of towns) because they do not account for the changing percolation states of individual nodes. …”
    Get full text
    Article
  7. 147

    Transient Phenomena in Information Technology for Branching Processes with an Infinite Set of Types by Sergii Degtyar, Oleh Kopiika, Yurii Shusharin

    Published 2024-03-01
    “…In information technology, branching processes can be used to model and analyze various scenarios, such as the propagation of data or information in a network, the growth of computer viruses, the spread of software bugs, and more. …”
    Get full text
    Article
  8. 148

    Gender Differences in Computer Ethics among Business Administration Students by Ali ACILAR, Durmus YORUK

    Published 2010-12-01
    “…Even though the pervasive use of computers and the Internet has many benefits for almost everyone, but it has also increased the use of these technologies for illegal purposes or unethical activities such as spamming, making illegal copies of software, violations of privacy, hacking and computer viruses. The main purpose of this study is to explore gender differences in computer ethics among Business Administration students and examine their attitudes towards ethical use of computers. …”
    Get full text
    Article
  9. 149

    On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus by Imran Edzereiq, Kamarudin, Syahrizal Azmir, Md Sharif, Tutut, Herawan

    Published 2013
    “…Computer viruses and other forms of malware have viewed as a threat to any software system. …”
    Get full text
    Article
  10. 150

    Dynamic properties of the multimalware attacks in wireless sensor networks: Fractional derivative analysis of wireless sensor networks by Tahir Hassan, Din Anwarud, Shah Kamal, Aphane Maggie, Abdeljawad Thabet

    Published 2024-02-01
    “…This problem is caused by worms entering the networks, which can spread uncontrollably to nearby nodes from a single node infected with computer viruses, worms, trojans, and other malicious software, which can compromise the network’s integrity and functionality. …”
    Get full text
    Article
  11. 151

    Cyberspace and Cybersecurity: Problems, Perspectives, Technologies by Oleksandr Tkachenko, Kostiantyn Tkachenko

    Published 2018-06-01
    “…It is indicated that computer viruses are one of the aspects of cyber threats. …”
    Get full text
    Article
  12. 152

    A Differential Game Approach to Patch Injection by Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Wanlei Zhou

    Published 2018-01-01
    “…To fight against the evolving computer viruses, we must constantly inject new virus patches into the computer networks. …”
    Get full text
    Article
  13. 153

    Optimal Resource Allocation to Reduce an Epidemic Spread and Its Complication by Paolo Di Giamberardino, Daniela Iacoviello

    Published 2019-06-01
    “…Moreover, the same representation could efficiently describe different epidemic scenarios, involving, for example, computer viruses spreading in the network. In this paper, a new model describing an infectious disease and a possible complication is proposed; after deep-model analysis discussing the role of the reproduction number, an optimal control problem is formulated and solved to reduce the number of dead patients, minimizing the control effort. …”
    Get full text
    Article
  14. 154

    Discerning Influential Spreaders in Complex Networks by Accounting the Spreading Heterogeneity of the Nodes by Yingchu Xin, Chao Gao, Zhen Wang, Xiyuan Zhen, Xianghua Li

    Published 2019-01-01
    “…Centrality is driven immunization is one of the best ways to prevent massive outbreaks (e.g., rumors and computer viruses) on complex networks, for it can effectively block the important diffusion paths to delay the propagation process. …”
    Get full text
    Article
  15. 155

    A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative by Esmehan Uçar, Sümeyra Uçar, Fırat Evirgen, Necati Özdemir

    Published 2021-04-01
    “…It is possible to produce mobile phone worms, which are computer viruses with the ability to command the running of cell phones by taking advantage of their flaws, to be transmitted from one device to the other with increasing numbers. …”
    Get full text
    Article
  16. 156

    Lexical sorting centrality to distinguish spreading abilities of nodes in complex networks under the Susceptible-Infectious-Recovered (SIR) model by Aybike Şimşek

    Published 2022-09-01
    “…The spreading of a virus (such as SARS-CoV-2) in a community, spreading computer viruses in communication networks, or spreading gossip on a social network is the subject of epidemic modeling. …”
    Get full text
    Article
  17. 157

    Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network by Anna Kurtukova, Aleksandr Romanov, Alexander Shelupanov, Anastasia Fedotova

    Published 2022-09-01
    “…Another application field is information security—in particular, identifying the author of computer viruses. We apply our technique based on a hybrid of Inception-v1 and Bidirectional Gated Recurrent Units architectures on heterogeneous source codes and consider the most common commercial development complex cases that negatively affect the authorship identification process. …”
    Get full text
    Article
  18. 158

    EMERGENCY ONLINE TEACHING: EARLY CHILDHOOD EDUCATION LECTURERS' PERCEPTION OF BARRIER AND PEDAGOGICAL COMPETENCY by Syaiputra Wahyuda Meisa Diningrat, Meyga Agustia Nindya, Salwa Salwa

    Published 2020-10-01
    “…Then, third barriers are computer viruses, the quality of course content, and reliability of the online assessment instrument. …”
    Get full text
    Article
  19. 159

    Malware data collection and analysis by Low, Song Chuan.

    Published 2013
    “…Millions of hosts on the Internet are infected with malware, ranging from classic computer viruses to Internet worms and bot networks. A huge increase in the number of malware samples are collected by anti-virus vendors. …”
    Get full text
    Final Year Project (FYP)
  20. 160

    Cloud Computing: a tool for effective records and information management system in Nigerian academic libraries by Nosakhare Okuonghae, Oluwabunmi Dorcas Bakare-Fatungase

    Published 2023-11-01
    “…It argued that information stored in this format is susceptible to loss by theft, fire or computer viruses, hard drive collapse as well as the destruction of local library internet server due to poor maintenance culture on the part of the personnel. …”
    Get full text
    Article