Yanfang Ye, Tao Li, Qingshan Jiang, Youyu Wang,
... antivirus software tools, such as McAfee VirusScan and Norton Antivirus, as well as previous data-mining-based detection ...
Tópico(s): Anomaly Detection Techniques and Applications
2010 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)
John Coleman, Barbara Hall, Joan Bakewell, Chris Stephen, Jon Swain, Alexandra Frean, Frank Sinatra's, Andrew Garner, Rob Hughes, Jomsborg Elag, John Peter, Mark Reason, Eric Dymock, Fiona Walsh, Tony Francis, Susan d'Arcy, Carolyn Wigoder, Robert Breckman, Danby Bloch, Graham Rose, Roy Porter, Norman Howell, Diana Wright Personal Finance Editor, E Ernest Goldstein, Dr Fred Bridgham, Frank Lowe, Victor Ostrovsky, David Smith, Sally Payne, Lucy Hughes-Hallett, Frederic Raphael, Martin Whittaker, Michael Maconochie, Clarke Peters, Edward Welsh, Tony Gearing, Richard Eaton, Geordie Greig, Tony Allen-Mills, Lioutenunt Francis Holinaty, Patrick Stoddart, Robert Sandall, Susan Marling, Iain Johnstone, Renate Kohler, Philip Hoare, David Brierley, Nilgin Yusuf, Irwin Stelzer, Ivan Fallon, Deryk Brown, Tim Ware, Michael Rewald, Geordie Greig Arts Correspondent, Dymphna Byrne, R Cruse, Ernie Wise, Mark Grant, Jane Bird, Dirk Bogarde, Cynthia Reavell, Maria Laura Avignolo, George Blake, Saddam Hussein, Mr & Mrs E Plowman, J D H, Harvey Porlock, Hugh Canning, Colin Dryden, Susan Crosland, David Cairns, Marina Warner, Peter Kemp, Nicky Maitlis, Andrew Morton, Robert Harris, P James Artistic Director, Caroline Lees, Damned Nadir, Paddy Ashdown, F Copperman, C Morahan, John Cassidy, George Perry, Robin Marlar, Mark Skipworth, Rose Shepherd, Torvill, Paul Golding, Bernard Cafferty, John Peters, Peter Parker, Stuart Wavell, Roger Eglin, Boris Scbapiro, Paul Donovan, Jeff Randall, Stafford Taylor Managing Director, Salman Rushdie, James Adams, David Hughes, Jon Thorn, Brian Jackman, Joanne Whalley-Kilmer, Rufus Olins, David Rogers, Anne Williams, Tony Hroband, David Lawrenson, John Hopkins, Joan Collins, David Jewell, Helen Fielding, Michael Randle, Brian Reading, A Legard, Christopher Ward, John Karter, Kate Saunders, Malcolm Winton, Thomas Kempner, Marie Colvin, Craig Brown, Peter Bryan, Audrey Willsher, Angie Pedley, Chris Partridge, Sean Wood, Stephen Jones, Stephen Thorpe, Jeffrey Ferry, Paul Sullivan, Harry Mullan, Norman Lebrecht, Richard Palmer, Andrew Wheatcroft, Andrew Grice, Digby Anderson, Jean Stringfellow, Jeremy Lewis, Martin Searby, Ian Birrell, Patrick Rowley, Graham Rose's, Polly Samson, Peter Plani, Chris Jones, Dusal Powell, Andrew Hogg, Tim Willis, Ed McHENRY, Bruce Johnston, Alison Beckett, Norman Stone, Phil Burthem, Richard Woods, Anwer Bati, Marion Hume, Maurice Chittenden, R D West, Iola Smith, Ian Dunning, Mitchell Symons, David Hughes Chief Political Correspondent, Aileen Ballantyne Medical Correspondent, Brian MacArthur, Mel Webb, Michael Jones Political Editor, Andrew Yates, James Blitz, Geoffrey Hobbs, Tim Desmond, Mihir Bose, Godfrey Smith, Michael Austin, Richard Burnell, Bryan Appleyard's, Michael Julien, Paul Barker, Gillian Sandford, Brian Glanville, Stan Levenson, Norman Macrae, Chris Dighton, Carrie Segrave, Alison Clements, Gerald Howarth, Godfrey Golzen, John Mein, Alexanden Dubtek, Andrew Lorenz, John Furbisher, Liam Clarke, H Evers Headmaster, Colin Greenland, Ian Weekley, David Harounoff, Simon Wallace, Marina Vaizey, Hugh Pearman, Chris Lightbown, Jeff Randall City Editor, Andrew Davidson, Paul Pickering, Angela Long, Dorothy Wade, David Smith Economics Editor, Penny Perrick, Kamran Fazel, Tony Hetherington, Anthony Howard, Charles Kennedy, J A Holland, Walter Ellis, Joanna Simon, McDonnell, Iain Jenkins, Peter Knight,
... messages about PLO plans to buy arms The Norton Antivirus from Symantec Apaches that strike by night Arms ...
1990 - Gale Group | Sunday Times HA GDA
M. A. Bhagyaveni, S. Shanmugavel,
... IE หากพบวามเวบไซตทเปดตรงกบฐานขอมลของโปรแกรม โปรแกรมจะปดเวบไซตนนทนทและเปดเวบไซตทกำหนดไวขนมาแทน ขณะทำงานโปรแกรมจะซอนอยใน Task Bar เหมอนกบโปรแกรมตรวจสอบและปองกนไวรส เชน Norton Antivirus เปนตน
Tópico(s): Opportunistic and Delay-Tolerant Networks
2004 - Asian Network for Scientific Information | Information Technology Journal
... attacks that are being provided by the system. Antivirus is being developed by Norton, Kaspersky and VMware that provides protection against the ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2021 - Karadeniz Technical University | Türk bilgisayar ve matematik eğitimi dergisi
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTSymantec Norton AntiVirus 5.0 for WindowsStephen R. HellerView Author Information NIST/SRD, Gaithersburg, Maryland 20899-2310 Cite this: J. Chem. Inf. Comput. ...
Tópico(s): Advanced Malware Detection Techniques
1999 - American Chemical Society | Journal of Chemical Information and Computer Sciences
ADVERTISEMENT RETURN TO ISSUEPREVArticleNEXTSymantec Norton Antivirus 2.0 for Windows 95Stephen R. HellerView Author Information USDA, ARS, Beltsville, Maryland 20705Cite this: J. Chem. Inf. Comput. Sci. ...
Tópico(s): Respiratory viral infections research
1996 - American Chemical Society | Journal of Chemical Information and Computer Sciences
Tópico(s): Hepatitis C virus research
1995 - Lippincott Williams & Wilkins | Dimensions of Critical Care Nursing
... most powerful and used in the reviewed literature: Norton Antivirus, McAfee VirusScan, Sophos, Norman Virus Control 5.0, ... Antivirus to work in networks. For independent users, Norton Antivirus, McAfee VirusScan, AVP and Panda are the best ...
Tópico(s): Network Security and Intrusion Detection
2003 - Editorial Ciencias Médicas | Acimed
... specifies the performance of (McAFee, Avast, Avira, Bitdefender, Norton) antivirus and its effectiveness on the computer. The performance ...
Tópico(s): Spam and Phishing Detection
2017 - | Oriental journal of computer science and technology
Emmanuel P Laabes, DD Nyango, MM Ayedima, Nimzing G. Ladep,
... program (95%CI: 27, 45). The top-three antivirus software were: McAfee 40(33.9%), AVG 37(31.4%) and Norton 17(14.4%). Common infections were: Trojan horse ...
Tópico(s): Mobile Health and mHealth Applications
2010 - Medknow | Nigerian Journal of Medicine
... begin by running a full scan with an antivirus and repair utility software such as Norton Utilities. If that doesn't help, I suggest ...
Tópico(s): Spreadsheets and End-User Computing
2005 - American Institute of Certified Public Accountants | Journal of accountancy online/Journal of accountancy
Lansheng Han, Man Zhou, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu,
... could not be identified by Kaspersky, McAfee, Symantec Norton, or Kingsoft Antivirus.
Tópico(s): Software Engineering Research
2018 - Wiley | Concurrency and Computation Practice and Experience
... computer software industry. In 1990 Symantec acquired Peter Norton Computing, which soon led it to focus on antivirus software as well as other areas of computer ...
Tópico(s): Intelligence, Security, War Strategy
2016 - Institute of Electrical and Electronics Engineers | IEEE Annals of the History of Computing
Noel Moses Dogonyaro, Waziri Onomza Victor, Abdulhamid Muhammad Shafii, Salisu Lukman Obada,
... selected Anti-Virus software (Avast, Kaspersky, Bitdefender and Norton) using a VMware. Quick, full and custom scans and other parameters were used. Based on the analysis of the selected anti-virus software, the parameters that offers the utmost performance considering malware detection, removal rate, memory usage of the installed antivirus, and the interface launch time is considered the ...
Tópico(s): Spam and Phishing Detection
2021 - Springer Science+Business Media | Communications in computer and information science