scholarly journals EVOLUTION OF COMPUTER VIRUSES

Keyword(s):  
IEE Review ◽  
1989 ◽  
Vol 35 (6) ◽  
pp. 219
Author(s):  
John De Rivaz
Keyword(s):  

Author(s):  
Ali Shirzad ◽  
Shaban Mohammadi ◽  
Hamedesmaeili Oghaz

Dependence on information and rapidly changing technology can be seen in many organizations, with proper security and intelligence systems to protect themselves. But success in providing security depends on the awareness of managers and employees. The accounting information systems in organizations are the most important element. One of the factors threatening their system is virus. Malware are computer viruses that can cause a variety of disorders, including loss of data and accounting information systems are impaired in such case. On the other hand, one of the main objectives of the viruses is to steal financial information. In this paper, one of the main factors threatening the security of accounting information systems, the viruses are described.


2021 ◽  
Vol 5 (2) ◽  
pp. 32
Author(s):  
Esmehan Uçar ◽  
Sümeyra Uçar ◽  
Fırat Evirgen ◽  
Necati Özdemir

It is possible to produce mobile phone worms, which are computer viruses with the ability to command the running of cell phones by taking advantage of their flaws, to be transmitted from one device to the other with increasing numbers. In our day, one of the services to gain currency for circulating these malignant worms is SMS. The distinctions of computers from mobile devices render the existing propagation models of computer worms unable to start operating instantaneously in the mobile network, and this is particularly valid for the SMS framework. The susceptible–affected–infectious–suspended–recovered model with a classical derivative (abbreviated as SAIDR) was coined by Xiao et al., (2017) in order to correctly estimate the spread of worms by means of SMS. This study is the first to implement an Atangana–Baleanu (AB) derivative in association with the fractional SAIDR model, depending upon the SAIDR model. The existence and uniqueness of the drinking model solutions together with the stability analysis are shown through the Banach fixed point theorem. The special solution of the model is investigated using the Laplace transformation and then we present a set of numeric graphics by varying the fractional-order θ with the intention of showing the effectiveness of the fractional derivative.


1992 ◽  
Vol 8 (1) ◽  
pp. 30-31
Author(s):  
Derrick Grover
Keyword(s):  

EDPACS ◽  
1988 ◽  
Vol 15 (12) ◽  
pp. 1-6
Author(s):  
Harold Joseph Highland
Keyword(s):  

Author(s):  
Silviu-Elian MITRĂ

The objective of this portfolio is to ensure a good understanding of the topic of the complex and unique mode of action of cyber attacks, as well as the study of the ways in which they occur. The content of this portfolio includes from the beginning of computer viruses to the specific modern mechanisms of cyber attack undertaken by cybercriminals in order to cause detriment, but also theft or damage to certain information. Furthermore, this paper also provides essential aspects regarding the protection methods that users must undertake so that they can prevent and at the same time face these dangers specific to our age. In the elaboration of this study, there were used both personal methods, by applying my own knowledge accumulated through the study, and accessing external sources containing information necessary to complete the insufficiently analyzed problems. In essence, the elaboration of this study ensured the coverage of all relevant domains and aspects that are based on the structure and conception of cyber attacks, as well as in the manner provided by their action and manifestation.


BMJ ◽  
1988 ◽  
Vol 297 (6659) ◽  
pp. 1332-1332 ◽  
Author(s):  
V. Nanjundiah
Keyword(s):  

2006 ◽  
Vol 25 (6) ◽  
pp. 469-473
Author(s):  
Zhi-hong Zuo ◽  
Qing-xin Zhu ◽  
Ming-tian Zhou
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document