Computer virus

Results: 2414



#Item
1Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1  Department of Computer Science, Georgia Institute of Technology, At

Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1 Department of Computer Science, Georgia Institute of Technology, At

Add to Reading List

Source URL: web.cs.ucla.edu

Language: English - Date: 2017-11-29 01:25:51
    2AttachmentComputer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the yearsee Figure 1-1).

    AttachmentComputer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the yearsee Figure 1-1).

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2018-08-07 23:06:23
      3Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

      Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

      Add to Reading List

      Source URL: selabs.uk

        4Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

        Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

        Add to Reading List

        Source URL: selabs.uk

          5Need a  Computer? Pro Anti-Virus

          Need a Computer? Pro Anti-Virus

          Add to Reading List

          Source URL: interconnection.org

          - Date: 2015-04-07 15:21:32
            6ISSNMAY 1999 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL

            ISSNMAY 1999 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL

            Add to Reading List

            Source URL: www.virusbulletin.com

            - Date: 2010-10-25 05:18:17
              7C A S E S T U DY  Food for the Hungry stops malware in its tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission

              C A S E S T U DY Food for the Hungry stops malware in its tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission

              Add to Reading List

              Source URL: pt.malwarebytes.com

              Language: English - Date: 2016-07-07 18:41:23
              8C A S E S T U DY  Agência Espacial Brasileira prevents malware from launching on its endpoints Malwarebytes Endpoint Security stops infections and improves productivity Business profile

              C A S E S T U DY Agência Espacial Brasileira prevents malware from launching on its endpoints Malwarebytes Endpoint Security stops infections and improves productivity Business profile

              Add to Reading List

              Source URL: fr.malwarebytes.com

              Language: English - Date: 2016-07-06 12:34:39
              9C A S E S T U DY  Florida Gulf Coast University teaches malware a lesson Malwarebytes Anti-Malware for Business enables the Library Computing and Technology department to eliminate malware from staff systems

              C A S E S T U DY Florida Gulf Coast University teaches malware a lesson Malwarebytes Anti-Malware for Business enables the Library Computing and Technology department to eliminate malware from staff systems

              Add to Reading List

              Source URL: nl.malwarebytes.com

              Language: English - Date: 2016-07-07 18:38:56
              10JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 13, NO. 2, APRILSplitScreen: Enabling Efficient, Distributed Malware Detection

              JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 13, NO. 2, APRILSplitScreen: Enabling Efficient, Distributed Malware Detection

              Add to Reading List

              Source URL: users.ece.cmu.edu

              Language: English - Date: 2014-05-29 15:38:01