Limpar
14 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo

Yanfang Ye, Tao Li, Qingshan Jiang, Youyu Wang,

... antivirus software tools, such as McAfee VirusScan and Norton Antivirus, as well as previous data-mining-based detection ...

Tópico(s): Anomaly Detection Techniques and Applications

2010 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)

Jornais Acesso aberto

John Coleman, Barbara Hall, Joan Bakewell, Chris Stephen, Jon Swain, Alexandra Frean, Frank Sinatra's, Andrew Garner, Rob Hughes, Jomsborg Elag, John Peter, Mark Reason, Eric Dymock, Fiona Walsh, Tony Francis, Susan d'Arcy, Carolyn Wigoder, Robert Breckman, Danby Bloch, Graham Rose, Roy Porter, Norman Howell, Diana Wright Personal Finance Editor, E Ernest Goldstein, Dr Fred Bridgham, Frank Lowe, Victor Ostrovsky, David Smith, Sally Payne, Lucy Hughes-Hallett, Frederic Raphael, Martin Whittaker, Michael Maconochie, Clarke Peters, Edward Welsh, Tony Gearing, Richard Eaton, Geordie Greig, Tony Allen-Mills, Lioutenunt Francis Holinaty, Patrick Stoddart, Robert Sandall, Susan Marling, Iain Johnstone, Renate Kohler, Philip Hoare, David Brierley, Nilgin Yusuf, Irwin Stelzer, Ivan Fallon, Deryk Brown, Tim Ware, Michael Rewald, Geordie Greig Arts Correspondent, Dymphna Byrne, R Cruse, Ernie Wise, Mark Grant, Jane Bird, Dirk Bogarde, Cynthia Reavell, Maria Laura Avignolo, George Blake, Saddam Hussein, Mr & Mrs E Plowman, J D H, Harvey Porlock, Hugh Canning, Colin Dryden, Susan Crosland, David Cairns, Marina Warner, Peter Kemp, Nicky Maitlis, Andrew Morton, Robert Harris, P James Artistic Director, Caroline Lees, Damned Nadir, Paddy Ashdown, F Copperman, C Morahan, John Cassidy, George Perry, Robin Marlar, Mark Skipworth, Rose Shepherd, Torvill, Paul Golding, Bernard Cafferty, John Peters, Peter Parker, Stuart Wavell, Roger Eglin, Boris Scbapiro, Paul Donovan, Jeff Randall, Stafford Taylor Managing Director, Salman Rushdie, James Adams, David Hughes, Jon Thorn, Brian Jackman, Joanne Whalley-Kilmer, Rufus Olins, David Rogers, Anne Williams, Tony Hroband, David Lawrenson, John Hopkins, Joan Collins, David Jewell, Helen Fielding, Michael Randle, Brian Reading, A Legard, Christopher Ward, John Karter, Kate Saunders, Malcolm Winton, Thomas Kempner, Marie Colvin, Craig Brown, Peter Bryan, Audrey Willsher, Angie Pedley, Chris Partridge, Sean Wood, Stephen Jones, Stephen Thorpe, Jeffrey Ferry, Paul Sullivan, Harry Mullan, Norman Lebrecht, Richard Palmer, Andrew Wheatcroft, Andrew Grice, Digby Anderson, Jean Stringfellow, Jeremy Lewis, Martin Searby, Ian Birrell, Patrick Rowley, Graham Rose's, Polly Samson, Peter Plani, Chris Jones, Dusal Powell, Andrew Hogg, Tim Willis, Ed McHENRY, Bruce Johnston, Alison Beckett, Norman Stone, Phil Burthem, Richard Woods, Anwer Bati, Marion Hume, Maurice Chittenden, R D West, Iola Smith, Ian Dunning, Mitchell Symons, David Hughes Chief Political Correspondent, Aileen Ballantyne Medical Correspondent, Brian MacArthur, Mel Webb, Michael Jones Political Editor, Andrew Yates, James Blitz, Geoffrey Hobbs, Tim Desmond, Mihir Bose, Godfrey Smith, Michael Austin, Richard Burnell, Bryan Appleyard's, Michael Julien, Paul Barker, Gillian Sandford, Brian Glanville, Stan Levenson, Norman Macrae, Chris Dighton, Carrie Segrave, Alison Clements, Gerald Howarth, Godfrey Golzen, John Mein, Alexanden Dubtek, Andrew Lorenz, John Furbisher, Liam Clarke, H Evers Headmaster, Colin Greenland, Ian Weekley, David Harounoff, Simon Wallace, Marina Vaizey, Hugh Pearman, Chris Lightbown, Jeff Randall City Editor, Andrew Davidson, Paul Pickering, Angela Long, Dorothy Wade, David Smith Economics Editor, Penny Perrick, Kamran Fazel, Tony Hetherington, Anthony Howard, Charles Kennedy, J A Holland, Walter Ellis, Joanna Simon, McDonnell, Iain Jenkins, Peter Knight,

... messages about PLO plans to buy arms The Norton Antivirus from Symantec Apaches that strike by night Arms ...

1990 - Gale Group | Sunday Times HA GDA

Artigo Acesso aberto

M. A. Bhagyaveni, S. Shanmugavel,

... IE หากพบวามเวบไซตทเปดตรงกบฐานขอมลของโปรแกรม โปรแกรมจะปดเวบไซตนนทนทและเปดเวบไซตทกำหนดไวขนมาแทน ขณะทำงานโปรแกรมจะซอนอยใน Task Bar เหมอนกบโปรแกรมตรวจสอบและปองกนไวรส เชน Norton Antivirus เปนตน

Tópico(s): Opportunistic and Delay-Tolerant Networks

2004 - Asian Network for Scientific Information | Information Technology Journal

Revisão Acesso aberto

Et. al. Dr. Ronak Panchal,

... attacks that are being provided by the system. Antivirus is being developed by Norton, Kaspersky and VMware that provides protection against the ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2021 - Karadeniz Technical University | Türk bilgisayar ve matematik eğitimi dergisi

Artigo

Stephen R. Heller,

ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTSymantec Norton AntiVirus 5.0 for WindowsStephen R. HellerView Author Information NIST/SRD, Gaithersburg, Maryland 20899-2310 Cite this: J. Chem. Inf. Comput. ...

Tópico(s): Advanced Malware Detection Techniques

1999 - American Chemical Society | Journal of Chemical Information and Computer Sciences

Artigo

Stephen R. Heller,

ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTSymantec Norton Antivirus 2.0 for Windows 95Stephen R. HellerView Author Information USDA, ARS, Beltsville, Maryland 20705Cite this: J. Chem. Inf. Comput. Sci. ...

Tópico(s): Respiratory viral infections research

1996 - American Chemical Society | Journal of Chemical Information and Computer Sciences

Artigo Revisado por pares

NULL AUTHOR_ID,

Tópico(s): Hepatitis C virus research

1995 - Lippincott Williams & Wilkins | Dimensions of Critical Care Nursing

Artigo

Luis Armas Montesino,

... most powerful and used in the reviewed literature: Norton Antivirus, McAfee VirusScan, Sophos, Norman Virus Control 5.0, ... Antivirus to work in networks. For independent users, Norton Antivirus, McAfee VirusScan, AVP and Panda are the best ...

Tópico(s): Network Security and Intrusion Detection

2003 - Editorial Ciencias Médicas | Acimed

Artigo Acesso aberto

Remya Thomas, M Nachamai,

... specifies the performance of (McAFee, Avast, Avira, Bitdefender, Norton) antivirus and its effectiveness on the computer. The performance ...

Tópico(s): Spam and Phishing Detection

2017 - | Oriental journal of computer science and technology

Artigo Acesso aberto

Emmanuel P Laabes, DD Nyango, MM Ayedima, Nimzing G. Ladep,

... program (95%CI: 27, 45). The top-three antivirus software were: McAfee 40(33.9%), AVG 37(31.4%) and Norton 17(14.4%). Common infections were: Trojan horse ...

Tópico(s): Mobile Health and mHealth Applications

2010 - Medknow | Nigerian Journal of Medicine

Artigo

Stanley Zarowin,

... begin by running a full scan with an antivirus and repair utility software such as Norton Utilities. If that doesn't help, I suggest ...

Tópico(s): Spreadsheets and End-User Computing

2005 - American Institute of Certified Public Accountants | Journal of accountancy online/Journal of accountancy

Artigo Revisado por pares

Lansheng Han, Man Zhou, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu,

... could not be identified by Kaspersky, McAfee, Symantec Norton, or Kingsoft Antivirus.

Tópico(s): Software Engineering Research

2018 - Wiley | Concurrency and Computation Practice and Experience

Artigo Revisado por pares

Jeffrey R. Yost,

... computer software industry. In 1990 Symantec acquired Peter Norton Computing, which soon led it to focus on antivirus software as well as other areas of computer ...

Tópico(s): Intelligence, Security, War Strategy

2016 - Institute of Electrical and Electronics Engineers | IEEE Annals of the History of Computing

Capítulo de livro Revisado por pares

Noel Moses Dogonyaro, Waziri Onomza Victor, Abdulhamid Muhammad Shafii, Salisu Lukman Obada,

... selected Anti-Virus software (Avast, Kaspersky, Bitdefender and Norton) using a VMware. Quick, full and custom scans and other parameters were used. Based on the analysis of the selected anti-virus software, the parameters that offers the utmost performance considering malware detection, removal rate, memory usage of the installed antivirus, and the interface launch time is considered the ...

Tópico(s): Spam and Phishing Detection

2021 - Springer Science+Business Media | Communications in computer and information science