Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/1278
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ponmalar S | - |
dc.contributor.author | Anupriya A | - |
dc.contributor.author | Nithya V | - |
dc.date.accessioned | 2020-09-03T07:22:16Z | - |
dc.date.available | 2020-09-03T07:22:16Z | - |
dc.date.issued | 2018-03 | - |
dc.identifier.issn | 2320-9801 | - |
dc.identifier.uri | http://www.ijircce.com/upload/2018/march/122_A_Survey.pdf | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/1278 | - |
dc.description.abstract | In latest years the detection of computer viruses has become general place. Computer viruses stay behind a significant threat to computer networks. Through the study of the model, bug-free and common stability points are calculated. To show our abstract analysis, some numerical simulations are also included. The results provide a theoretical basis to control the widen of computer virus. The usual antivirus approach consists of waiting for a number of computers to be infected, detecting the virus, scheming a solution, and delivering and deploying the clarification, in such situation, it is very hard to prevent every machine from being compromised by virus. In this paper we discussed analysis of virus algorithm. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE). | en_US |
dc.subject | Virus | en_US |
dc.subject | Virus Detection | en_US |
dc.subject | Virus Analysis | en_US |
dc.subject | Virus Algorithm | en_US |
dc.title | A SURVEY: ANALYSIS OF VIRUS AND MALWARE DETECTION | en_US |
dc.type | Article | en_US |
Appears in Collections: | International Journals |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A SURVEY ANALYSIS OF VIRUS AND MALWARE DETECTION.docx | 10.29 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.