Academic literature on the topic 'Anti-virus information protection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-virus information protection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anti-virus information protection system"
Марценюк, В., І. Дідманідзе, I. Андрущак, Т. Крадінова, and К. Рудь. "Information security: anti-virus protection technologies." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 38 (March 13, 2020): 79–84. http://dx.doi.org/10.36910/6775-2524-0560-2020-38-07.
Full textWidarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (March 2, 2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.
Full textZaporotskov, Pavel. "Development of a Method for Conducting an Audit of the Information Security System." NBI Technologies, no. 4 (March 2021): 18–27. http://dx.doi.org/10.15688/nbit.jvolsu.2020.4.3.
Full textShevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.
Full textTolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Full textGrin, S. A., N. M. Pukhova, I. N. Matveyeva, A. Ya Samuylenko, and R. N. Melnik. "IMMUNOGENESIS IN THE DESTRUCTION OF CELLS OF THE NERVOUS SYSTEM UNDER THE INFLUENCE OF THE RABIES VIRUS." Medical academic journal 19, no. 1S (December 15, 2019): 139–41. http://dx.doi.org/10.17816/maj191s1139-141.
Full textGao, Xiang, Yiqiang Zhao, and Haocheng Ma. "Fringing Electric Field Sensors for Anti-Attack at System-Level Protection." Sensors 18, no. 9 (September 11, 2018): 3034. http://dx.doi.org/10.3390/s18093034.
Full textDong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Full textXu, Yan Wen, and Feng Dong. "Research on Multi-Core Network Equipment Virus Defense System." Applied Mechanics and Materials 738-739 (March 2015): 1197–200. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1197.
Full textWang, Jian, Xiaolin Qin, and Hongying Fang. "Virus-Information Coevolution Spreading Dynamics on Multiplex Networks." Complexity 2021 (March 5, 2021): 1–9. http://dx.doi.org/10.1155/2021/6624612.
Full textDissertations / Theses on the topic "Anti-virus information protection system"
Semyonov, S. G., Svitlana Gavrylenko, and Viktor Chelak. "Processing information on the state of a computer system using probabilistic automata." Thesis, Institute of Electrical and Electronics Engineers, 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40752.
Full textОстровський, О. О. "Система захисту комп’ютерної інформації від вірусів-шифрувальників." Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66881.
Full textJonsson, Karl. "Machine learning and system administration : A structured literature review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18975.
Full textThis literature review discusses two different systems within IT-security and how they work within machine learning to a relatively surface-level degree.The purpose of this paper is to be able to summarize these systems and see how they can help a system administrator’s assignments. how it can be used for automation and the positives and negatives.Machine learning can be a powerful tool for system administrators to alleviate the workload which can exist within an organization, which is why it is important to discuss when and where to deploy a solution.
Tladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.
Full textMercantile Law
LL. D.
Books on the topic "Anti-virus information protection system"
Rhodes, Keith A. Information security: The Melissa computer virus demonstrates urgent need for stronger protection over systems and sensitive data : statement of Keith A. Rhodes, Technical Director for Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.
Find full textA, Adey R., ed. Modelling of cathodic protection systems. Southampton: WIT, 2006.
Find full textAdey, R. A. Modelling of Cathodic Protection Systems (Advances in Boundary Elements). WIT Press (UK), 2005.
Find full textAnti-Spam Measures: Analysis and Design. Springer, 2007.
Find full textMarson, James, and Katy Ferris. Business Law Concentrate. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198840602.001.0001.
Full textBook chapters on the topic "Anti-virus information protection system"
Kurizki, G., A. G. Kofman, V. M. Akulin, E. Brion, and J. Clausen. "Zeno and Anti-Zeno Dynamics." In Decoherence, Entanglement and Information Protection in Complex Quantum Systems, 223–32. Dordrecht: Springer Netherlands, 2005. http://dx.doi.org/10.1007/1-4020-3283-8_16.
Full textYoshikai, Noriaki, Kana Shimbo, John Stavrakakis, and Toshio Takahashi. "Study on Persuasion Effect of Computer Virus Measures Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems, 518–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65521-5_45.
Full textShimbo, Kana, Shun-ichi Kurino, and Noriaki Yoshikai. "Verification of Persuasion Effect to Cope with Virus Infection Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems, 763–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_67.
Full textPanda, Bijaya Kumar, Manoranjan Pradhan, and Sateesh Kumar Pradhan. "Intrusion Prevention System." In Securing the Internet of Things, 1285–98. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch058.
Full textPanda, Bijaya Kumar, Manoranjan Pradhan, and Sateesh Kumar Pradhan. "Intrusion Prevention System." In Network Security Attacks and Countermeasures, 245–58. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch010.
Full textK. Al Sarkhi, Awaad. "The Link between Electrical Properties of COVID-19 and Electromagnetic Radiation." In Biotechnology to Combat COVID-19 [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.96815.
Full textFolarin, Sheriff, and Oluwatobi Njoaguani. "Global Health Governance, Human Rights, and the Control of Infectious Diseases." In Advances in Healthcare Information Systems and Administration, 1–21. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6133-0.ch001.
Full textMostipan, Oleksandr. "PERSPECTIVES OF MODERNIZATION OF THE COMMUNICATION STRATEGY OF THE VERKHOVNA RADA OF UKRAINE FOR 2017-2021 YEARS." In Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-9.
Full textMendel Nzogang, Patrice, and Martial Boris Donkeng. "Neuroprotection: The Way of Anti-Inflammatory Agents." In Neuroprotection - New Approaches and Prospects. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.90509.
Full textJihong, Mo. "CORRECTLY AND PRUDENTLY SELECTING THE POLICY OF ANTI-VIRUS IN ORDER TO SEEK MORE EFFECTIVE FREEDOM." In Critical Dialogues: Human Rights, Democracy and Pandemic Perspectives, 369–78. Grupo de Pesquisa Cultura, Direito e Sociedade - GPCDES, 2021. http://dx.doi.org/10.55658/gpcds978-65-00-40218-6.chapter18.
Full textConference papers on the topic "Anti-virus information protection system"
Yucheng, Liu, and Liu Yubin. "Design Strategy of Anti-Electromagnetic Interference for Microcomputer Relay Protection System." In 2010 International Forum on Information Technology and Applications (IFITA). IEEE, 2010. http://dx.doi.org/10.1109/ifita.2010.78.
Full textМихнева, Анастасия Ильинична, and Илья Павлович Михнев. "INFORMATION TECHNOLOGY IN ANTI-TERRORISM." In Национальная безопасность России: актуальные аспекты: сборник избранных статей Всероссийской научно-практической конференции (Санкт-Петербург, Март 2021). Crossref, 2021. http://dx.doi.org/10.37539/nb190.2021.71.46.004.
Full textChun Wei Lin and Bing Shiun Hsieh. "An anti-clipping protection system for multilevel class-D amplifier." In 2011 8th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2011). IEEE, 2011. http://dx.doi.org/10.1109/ecticon.2011.5947788.
Full textJiravanstit, Nantipat, and Surachai Chaitusaney. "Protective device placement for reliability improvement by considering anti-islanding protection of PV generation system." In 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2012). IEEE, 2012. http://dx.doi.org/10.1109/ecticon.2012.6254255.
Full textWang, Fei, Chengcheng Zhang, and Zengqiang Mi. "Notice of Retraction: Anti-islanding Detection and Protection for Grid Connected PV System Using Instantaneous Power Theory." In 2009 International Conference on Industrial and Information Systems (IIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/iis.2009.84.
Full textSharaf, A. M., M. I. Yacoub, and A. A. Elhefnawy. "Improving the Stability of a Bulletproofed Vehicle Using Modified Suspension System." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97110.
Full textLee, Shinho, Jungwoon Lee, Wonrak Lee, Seohyun Lee, Suyoung Kim, and Eui Tak Kim. "Design of Integrated Messenger Anti-virus System using Chatbot Service." In 2020 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2020. http://dx.doi.org/10.1109/ictc49870.2020.9289514.
Full textGaston, John R., W. Brian Piercy, and C. Scott Harclerode. "Integrated Turbine-Compressor Controls Retrofit for an Olefins Unit." In ASME 1995 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/95-gt-349.
Full textGoryachikh, Vadim, Fahad Alghamdi, and Abdulrahman Takrouni. "Compressor Computerized Performance Monitoring System CPMS." In SPE Middle East Oil & Gas Show and Conference. SPE, 2021. http://dx.doi.org/10.2118/204582-ms.
Full textArya, Jalaj, and Lalit Mohan Saini. "A reliable single stage single phase hybrid solar inverter with anti-islanding protection." In 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES). IEEE, 2015. http://dx.doi.org/10.1109/spices.2015.7091374.
Full textReports on the topic "Anti-virus information protection system"
Bar-Joseph, Moshe, William O. Dawson, and Munir Mawassi. Role of Defective RNAs in Citrus Tristeza Virus Diseases. United States Department of Agriculture, September 2000. http://dx.doi.org/10.32747/2000.7575279.bard.
Full textDawson, William O., and Moshe Bar-Joseph. Creating an Ally from an Adversary: Genetic Manipulation of Citrus Tristeza. United States Department of Agriculture, January 2004. http://dx.doi.org/10.32747/2004.7586540.bard.
Full textGurevitz, Michael, Michael E. Adams, and Boaz Shaanan. Structural Elements and Neuropharmacological Features Involved in the Insecticidal Properties of an Alpha Scorpion Neurotoxin: A Multidisciplinary Approach. United States Department of Agriculture, August 1995. http://dx.doi.org/10.32747/1995.7573061.bard.
Full textGurevitz, Michael, Michael E. Adams, Boaz Shaanan, Oren Froy, Dalia Gordon, Daewoo Lee, and Yong Zhao. Interacting Domains of Anti-Insect Scorpion Toxins and their Sodium Channel Binding Sites: Structure, Cooperative Interactions with Agrochemicals, and Application. United States Department of Agriculture, December 2001. http://dx.doi.org/10.32747/2001.7585190.bard.
Full textMeir, Shimon, Michael S. Reid, Cai-Zhong Jiang, Amnon Lers, and Sonia Philosoph-Hadas. Molecular Studies of Postharvest Leaf and Flower Senescence. United States Department of Agriculture, January 2011. http://dx.doi.org/10.32747/2011.7592657.bard.
Full text