Analysis of Virus Algorithms (Report) Analysis of Virus Algorithms (Report)

Analysis of Virus Algorithms (Report‪)‬

Journal of Computer Science 2006, Oct, 2, 10

    • £2.99
    • £2.99

Publisher Description

Abstract: Security of wired and wireless networks is the most challengeable in today's computer world. The aim of this study was to give brief introduction about viruses and worms, their creators and characteristics of algorithms used by viruses. Here wired and wireless network viruses are elaborated. Also viruses are compared with human immune system. On the basis of this comparison four guidelines are given to detect viruses so that more secure systems are made. While concluding this study it is found that the security is most challengeable, thus it is required to make more secure models which automatically detect viruses and prevent the system from its affect. Key words: TSR, viruses, worms, malware

GENRE
Computing & Internet
RELEASED
2006
1 October
LANGUAGE
EN
English
LENGTH
13
Pages
PUBLISHER
Science Publications
SIZE
153.9
KB
Computer Viruses: from theory to applications Computer Viruses: from theory to applications
2006
Computer Viruses and Malware Computer Viruses and Malware
2006
Malware Intrusion Detection Malware Intrusion Detection
2011
Essay: Computer Viruses Essay: Computer Viruses
2012
Computer Viruses. History, Reasons and Effects on Society Computer Viruses. History, Reasons and Effects on Society
2006
Foundations of Computer Security Foundations of Computer Security
2006
A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf) A Study of the Contracting and Procurement Process for COTS Software Projects (Commercial Off-The-Shelf)
2007
An Exact Algorithm for the Unbounded Knapsack Problem with Minimizing Maximum Processing Time. An Exact Algorithm for the Unbounded Knapsack Problem with Minimizing Maximum Processing Time.
2007
E-Government Readiness Assessment Model. E-Government Readiness Assessment Model.
2006
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011
Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report) Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report)
2011