Journal articles on the topic 'Anti-virus information protection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Anti-virus information protection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Марценюк, В., І. Дідманідзе, I. Андрущак, Т. Крадінова, and К. Рудь. "Information security: anti-virus protection technologies." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 38 (March 13, 2020): 79–84. http://dx.doi.org/10.36910/6775-2524-0560-2020-38-07.
Full textWidarma, Adi, M. Dedi Irawan, Fajri Nurhidayahti, and Ranis Hsb. "Decision Support System Determining Computer Virus Protection Applications Using Simple Additive Weighting (SAW) Method." Journal of Computer Networks, Architecture, and High-Performance Computing 3, no. 1 (March 2, 2021): 86–79. http://dx.doi.org/10.47709/cnahpc.v3i1.936.
Full textZaporotskov, Pavel. "Development of a Method for Conducting an Audit of the Information Security System." NBI Technologies, no. 4 (March 2021): 18–27. http://dx.doi.org/10.15688/nbit.jvolsu.2020.4.3.
Full textShevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.
Full textTolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Full textGrin, S. A., N. M. Pukhova, I. N. Matveyeva, A. Ya Samuylenko, and R. N. Melnik. "IMMUNOGENESIS IN THE DESTRUCTION OF CELLS OF THE NERVOUS SYSTEM UNDER THE INFLUENCE OF THE RABIES VIRUS." Medical academic journal 19, no. 1S (December 15, 2019): 139–41. http://dx.doi.org/10.17816/maj191s1139-141.
Full textGao, Xiang, Yiqiang Zhao, and Haocheng Ma. "Fringing Electric Field Sensors for Anti-Attack at System-Level Protection." Sensors 18, no. 9 (September 11, 2018): 3034. http://dx.doi.org/10.3390/s18093034.
Full textDong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Full textXu, Yan Wen, and Feng Dong. "Research on Multi-Core Network Equipment Virus Defense System." Applied Mechanics and Materials 738-739 (March 2015): 1197–200. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1197.
Full textWang, Jian, Xiaolin Qin, and Hongying Fang. "Virus-Information Coevolution Spreading Dynamics on Multiplex Networks." Complexity 2021 (March 5, 2021): 1–9. http://dx.doi.org/10.1155/2021/6624612.
Full textToliupa, S., O. Pliushch, and I. Parhomenko. "CONSTRUCTION OF SYSTEMS OF DETECTION OF INVASIONS INTO THE INFORMATI TON AND TELECOMMUNICATIONS NETWORK ON THE BASIS OF METHODS OF INTELLECTUAL DISTRIBUTION OF DATA." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 68 (2020): 80–89. http://dx.doi.org/10.17721/2519-481x/2020/68-09.
Full textChen, Shuai, Yang Yin, Zheng Wang, and Fan Gui. "Low-altitude protection technology of anti-UAVs based on multisource detection information fusion." International Journal of Advanced Robotic Systems 17, no. 5 (September 1, 2020): 172988142096290. http://dx.doi.org/10.1177/1729881420962907.
Full textZhang, Kai, and Hang Yu. "Study on the Method of Android System Cloud Monitoring Information Based on SVM." Applied Mechanics and Materials 602-605 (August 2014): 2272–75. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2272.
Full textWang, Tianlin, Xiangyi Ji, Zhanhui Tao, Xiao Zhou, Zhe Hao, Xinke Wang, Xia Gao, Shuo Wang, and Yaqing Liu. "Dual stimuli-responsive lanthanide-based phosphors for an advanced full-color anti-counterfeiting system." RSC Advances 10, no. 26 (2020): 15573–78. http://dx.doi.org/10.1039/d0ra01594f.
Full textYazov, Yuri, Oleg Avsentev, Alexander Avsentev, and Irina Rubtsova. "Method for Assessing Effectiveness of Protection of Electronic Document Management using the Petri and Markov Nets Apparatus." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1269–300. http://dx.doi.org/10.15622/sp.2019.18.6.1269-1300.
Full textWang, Jie, Xiaomei Wang, and Na Li. "Exploration of Environmental Protection-Oriented Ecoenvironmental Performance Audit System." Security and Communication Networks 2022 (February 25, 2022): 1–10. http://dx.doi.org/10.1155/2022/2657411.
Full textСемыкина, Н. А. "MATHEMATICAL MODEL OF PROTECTION IN AN INFORMATION SYSTEM OF A HIERARCHICAL STRUCTURE." Южно-Сибирский научный вестник, no. 4(38) (August 31, 2021): 75–80. http://dx.doi.org/10.25699/sssb.2021.38.4.002.
Full textSteckelings, U. Muscha, and Colin Sumners. "Correcting the imbalanced protective RAS in COVID-19 with angiotensin AT2-receptor agonists." Clinical Science 134, no. 22 (November 2020): 2987–3006. http://dx.doi.org/10.1042/cs20200922.
Full textHe, Juan, and Zhi Yun Tan. "Design of Vehicle Anti-Theft Alarm System Based on DSP-GPS." Applied Mechanics and Materials 220-223 (November 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.1584.
Full textШагиева, Альбина, Al'bina Shagieva, Андрей Макаров, Andrey Makarov, Наталья Карпова, and Natal'ya Karpova. "INFORMATION AND INFRASTRUCTURAL COMPONENTS OF ANTI-CRISIS MANAGEMENT OF RURAL MUNICIPAL FORMATIONS." Vestnik of Kazan State Agrarian University 14, no. 1 (March 30, 2019): 157–63. http://dx.doi.org/10.12737/article_5ccedf7b3bc2a8.49830527.
Full textFu, Chuanxi, Jianhua Liang, and Ming Wang. "Matched Case-Control Study of Effectiveness of Live, Attenuated S79 Mumps Virus Vaccine against Clinical Mumps." Clinical and Vaccine Immunology 15, no. 9 (July 30, 2008): 1425–28. http://dx.doi.org/10.1128/cvi.00122-08.
Full textMasiero, Silvia, and Amit Prakash. "ICT in social protection schemes: deinstitutionalising subsidy-based welfare programmes." Information Technology & People 33, no. 4 (December 6, 2019): 1255–80. http://dx.doi.org/10.1108/itp-02-2018-0086.
Full textBuchyk, Serhii, Oleksandr Yudin, Ruslana Ziubina, Ivan Bondarenko, and Oleh Suprun. "Devising a method of protection against zero-day attacks based on an analytical model of changing the state of the network sandbox." Eastern-European Journal of Enterprise Technologies 1, no. 9 (109) (February 27, 2021): 50–57. http://dx.doi.org/10.15587/1729-4061.2021.225646.
Full textPollock, Ross D., Rachel V. Firth, Jessica A. Storey, Katherine E. Phillips, Desmond M. Connolly, Nicholas D. C. Green, and Alec T. Stevenson. "Hemodynamic Responses and G Protection Afforded by Three Different Anti-G Systems." Aerospace Medicine and Human Performance 90, no. 11 (November 1, 2019): 925–33. http://dx.doi.org/10.3357/amhp.4927.2019.
Full textEt.al, Ahmad Faiz Ghazali. "A Survey of Malware Risk Detection Techniques in Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 868–76. http://dx.doi.org/10.17762/turcomat.v12i3.797.
Full textWang, Jun Xiang, and Li Fu. "Anti-Counterfeiting Jingdezhen Ceramic Decal Manufacturing Technique Based on Digital Watermarking Method." Advanced Materials Research 503-504 (April 2012): 23–26. http://dx.doi.org/10.4028/www.scientific.net/amr.503-504.23.
Full textWANG, Feng. "China's Regulatory Framework for Dynamic and Personalized Pricing in the Digital Economy." International Journal of Social Science Studies 10, no. 1 (November 5, 2021): 1. http://dx.doi.org/10.11114/ijsss.v10i1.5370.
Full textWibowo, Wahyu Kunto, Seok-Kwon Jeong, Sam-Sang You, and Lee Jaemin. "Automatic Threshold on Current based Anti-pinch Mechanism for Power Windows." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2172. http://dx.doi.org/10.11591/ijece.v8i4.pp2172-2179.
Full textNovash, I. V. "MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME." ENERGETIKA. Proceedings of CIS higher education institutions and power engineering associations 60, no. 3 (May 17, 2017): 198–210. http://dx.doi.org/10.21122/1029-7448-2017-60-3-198-210.
Full textDolgov, O. S., and B. B. Safoklov. "Quality Management of De-Icing Liquid as an Object for Ensuring Safe Take-Off of an Aircraft." Quality and life 27, no. 3 (September 23, 2020): 84–91. http://dx.doi.org/10.34214/2312-5209-2020-27-3-84-91.
Full textJi, Hong. "Research on the Protection Strategy of Network Security." Advanced Materials Research 703 (June 2013): 236–39. http://dx.doi.org/10.4028/www.scientific.net/amr.703.236.
Full textLebedev, Alexandr, Lyubov Gileva, Alexey Danilishin, and Mikhail Sokolov. "Surge protection system development in centrifugal compressor with an indicative method using numerical simulation of unsteady processes and analysis of pressure fluctuation signals." MATEC Web of Conferences 245 (2018): 09010. http://dx.doi.org/10.1051/matecconf/201824509010.
Full textVolosova, Nonna, and Olga Zhurkina. "On the Protection Program for Whistleblowers (Informants) in Cases of Corruption." Russian Journal of Criminology 12, no. 5 (November 8, 2018): 699–710. http://dx.doi.org/10.17150/2500-4255.2018.12(5).699-710.
Full textLee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Full textLee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Full textLesko, S. A., A. S. Alyoshkin, and V. V. Filatov. "Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses." Russian Technological Journal 7, no. 3 (June 9, 2019): 7–27. http://dx.doi.org/10.32362/2500-316x-2019-7-3-7-27.
Full textDiro, Abebe, Naveen Chilamkurti, Van-Doan Nguyen, and Will Heyne. "A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms." Sensors 21, no. 24 (December 13, 2021): 8320. http://dx.doi.org/10.3390/s21248320.
Full textMcSharry, James J., Mark R. Deziel, Kris Zager, Qingmei Weng, and George L. Drusano. "Pharmacodynamics of Cidofovir for Vaccinia Virus Infection in an In Vitro Hollow-Fiber Infection Model System." Antimicrobial Agents and Chemotherapy 53, no. 1 (October 13, 2008): 129–35. http://dx.doi.org/10.1128/aac.00708-08.
Full textGazizov, A. R., E. R. Gazizov, and S. E. Gazizova. "Security threats and methods of protecting websites of paid educational services of educational institutions." SHS Web of Conferences 113 (2021): 00033. http://dx.doi.org/10.1051/shsconf/202111300033.
Full textSzücs, Veronika, Gábor Arányi, and Ákos Dávid. "Introduction of the ARDS—Anti-Ransomware Defense System Model—Based on the Systematic Review of Worldwide Ransomware Attacks." Applied Sciences 11, no. 13 (June 30, 2021): 6070. http://dx.doi.org/10.3390/app11136070.
Full textGolovko, G., M. Koltunov, and A. Samofal. "PROBLEMS OF COMPREHENSIVE PROTECTION OF INFORMATION AT PJSC "RESEARCH AND DESIGN-PROCESSING INSTITUTE OF THE ENAMELED CHEMICAL EQUIPMENT AND NEW TECHNOLOGIES KOLAN"." Системи управління, навігації та зв’язку. Збірник наукових праць 3, no. 49 (July 3, 2018): 100–102. http://dx.doi.org/10.26906/sunz.2018.3.100.
Full textDicevich, Jaroslava, Olga Belykh, and Genrietta Rusetskaya. "The Use of New Technologies in Counteracting Violations of Environmental Legislation." Russian Journal of Criminology 15, no. 3 (July 2, 2021): 295–305. http://dx.doi.org/10.17150/2500-4255.2021.15(3).295-305.
Full textSchirrmacher, Volker. "New Insights into Mechanisms of Long-term Protective Anti-tumor Immunity Induced by Cancer Vaccines Modified by Virus Infection." Biomedicines 8, no. 3 (March 6, 2020): 55. http://dx.doi.org/10.3390/biomedicines8030055.
Full textLantsov, E. V., A. V. Petrov, S. V. Moshchenko, A. A. Kuzin, G. V. Goncharov, and E. N. Kolosovskaya. "The value of laboratory monitoring of dangerous infectious diseases in the aspect of anti-epidemic protection in emergency situations of biological character." Journal Infectology 10, no. 4 (December 30, 2018): 116–23. http://dx.doi.org/10.22625/2072-6732-2018-10-4-116-123.
Full textMa, Fengying, Zhe Yang, and Peng Ji. "Sliding Mode Controller Based on the Extended State Observer for Plant-Protection Quadrotor Unmanned Aerial Vehicles." Mathematics 10, no. 8 (April 18, 2022): 1346. http://dx.doi.org/10.3390/math10081346.
Full textEreshchenko, A. A., O. A. Gusyakova, S. I. Murskiy, A. V. Khaliulin, A. I. Gabrilchak, and T. R. Nikitina. "Problem of interpreting results of determination of IgG to measles virus by enzyme immunoassay." Medical alphabet, no. 27 (November 11, 2020): 36–39. http://dx.doi.org/10.33667/2078-5631-2020-27-36-39.
Full textAlhosban, Ahmad. "GPS Characterization in Cyberspace Between Vulnerability and Geo-Encryption: Impact on GBAS Landing System (GLS)." Land Forces Academy Review 25, no. 2 (June 1, 2020): 146–58. http://dx.doi.org/10.2478/raft-2020-0018.
Full textLiu, Wen-Chun, Chia-Ying Lin, Yung-Ta Tsou, Jia-Tsrong Jan, and Suh-Chin Wu. "Cross-Reactive Neuraminidase-Inhibiting Antibodies Elicited by Immunization with Recombinant Neuraminidase Proteins of H5N1 and Pandemic H1N1 Influenza A Viruses." Journal of Virology 89, no. 14 (May 6, 2015): 7224–34. http://dx.doi.org/10.1128/jvi.00585-15.
Full textAl-Assam, Assaad, Joanne M. Langley, and Shelly Sarwal. "Respiratory Watch: Development of a Provincial System for Respiratory Syncytial Virus Surveillance in Nova Scotia, 2005–2008." Canadian Journal of Infectious Diseases and Medical Microbiology 20, no. 4 (2009): e153-e156. http://dx.doi.org/10.1155/2009/361948.
Full textLykholat, S., and A. Ryskalshuk. "MANAGEMENT OF ECONOMIC SECURITY OF ENTERPRISES SYSTEM IN THE CONDITIONS OF COVID-19." Journal of Lviv Polytechnic National University. Series of Economics and Management Issues 5, no. 1 (June 1, 2021): 158–69. http://dx.doi.org/10.23939/semi2021.01.158.
Full text