DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 13.543
1.
  • Antivirus Software Shield A... Antivirus Software Shield Against Antivirus Terminators
    Hsu, Fu-Hau; Wu, Min-Hao; Tso, Chang-Kuo ... IEEE transactions on information forensics and security, 10/2012, Letnik: 7, Številka: 5
    Journal Article
    Recenzirano

    In the last several decades, the arms race between malware writers and antivirus programmers has become more and more severe. The simplest way for a computer user to secure his computer is to install ...
Celotno besedilo
Dostopno za: UL
2.
Celotno besedilo

PDF
3.
  • Quantitative Valuation of t... Quantitative Valuation of the Effectiveness of Existing Antivirus Software
    Tatiana Markina Proceedings of the XXth Conference of Open Innovations Association FRUCT, 04/2016, Letnik: 664, Številka: 18
    Journal Article
    Recenzirano
    Odprti dostop

    The article considers the existing methods of evaluating antivirus software. The paper proposes a method and model of estimation of the effectiveness of existing anti-virus protection. We examined ...
Celotno besedilo
Dostopno za: UL
4.
  • Screening Legitimate and Fa... Screening Legitimate and Fake/Crude Antivirus Software
    Kasuya, Masaki; Kono, Kenji IPSJ Online Transactions, 2014, 2014-00-00, Letnik: 7
    Journal Article
    Odprti dostop

    Fake antivirus (AV) software, a kind of malware, pretends to be a legitimate AV product and frightens computer users by showing fake security alerts, as if their computers were infected with malware. ...
Celotno besedilo
Dostopno za: UL
5.
  • ANTIVIRUS SOFTWARE AND INDU... ANTIVIRUS SOFTWARE AND INDUSTRIAL CYBER SECURITY SYSTEM CERTIFICATION IN RUSSIA
    Nazarenko, M. A.; Gorobets, A. I.; Miskov, D. V. ... Rossijskij tehnologičeskij žurnal, 02/2019, Letnik: 7, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The article is dedicated to issues in certification of antivirus software and industrial cyber security systems. It was shown that certification time in Russia is much longer than in the USA, ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • Transforming malicious code... Transforming malicious code to ROP gadgets for antivirus evasion
    Ntantogian, Christoforos; Poulios, Georgios; Karopoulos, Georgios ... IET information security, 11/2019, Letnik: 13, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    This study advances research in offensive technology by proposing return oriented programming (ROP) as a means to achieve code obfuscation. The key inspiration is that ROP's unique structure poses ...
Celotno besedilo
Dostopno za: UL

PDF
7.
  • Differential Effects of Pri... Differential Effects of Prior Experience on the Malware Resolution Process
    Kim, Seung Hyun; Kim, Byung Cho MIS quarterly, 09/2014, Letnik: 38, Številka: 3
    Journal Article
    Recenzirano

    Despite growing interest in the economic and policy aspects of information security, little academic research has used field data to examine the development process of a security countermeasure ...
Celotno besedilo
Dostopno za: CEKLJ, UL
8.
  • Theoretical and experimenta... Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread
    Gan, Chenquan; Yang, Xiaofan Communications in nonlinear science & numerical simulation, 20/May , Letnik: 22, Številka: 1-3
    Journal Article
    Recenzirano

    •A new computer virus propagation model is proposed.•The unique equilibrium is globally asymptotically stable.•Some numerical simulations are examined to verify the model.•Some containment policies ...
Celotno besedilo
Dostopno za: UL
9.
  • Banksafe Information Steale... Banksafe Information Stealer Detection Inside the Web Browser
    Buescher, Armin; Leder, Felix; Siebert, Thomas Recent Advances in Intrusion Detection
    Book Chapter
    Recenzirano

    Information stealing and banking trojans have become the tool of choice for cyber criminals for various kinds of cyber fraud. Traditional security measures like common antivirus solutions currently ...
Celotno besedilo
10.
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 13.543

Nalaganje filtrov