DC Field | Value | Language |
dc.contributor.author | Bazylevych, Roman | - |
dc.contributor.author | Andriyenko, Volodymyr | - |
dc.contributor.author | Karioti, Mikael | - |
dc.date.accessioned | 2014-02-28T12:36:27Z | - |
dc.date.available | 2014-02-28T12:36:27Z | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | Bazylevych R. Software tool designed to detect characteristics of the malware objects / Roman Bazylevych, Volodymyr Andriyenko, Mikael Karioti // Комп'ютерні науки та інженерія : матеріали VІ Міжнародної конференції молодих вчених CSE-2013, 21–23 листопада 2013 року, Україна, Львів / Міністерство освіти і науки України, Національний університет "Львівська політехніка". – Львів : Видавництво Львівської політехніки, 2013. – С. 78-79. – (4-й Міжнародний молодіжний фестиваль науки "Litteris et Artibus"). – Bibliography: 4 titles. | uk_UA |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/23757 | - |
dc.description.abstract | Computer virus is the kind of phenomenon that emerged in the operation of the evolution of computers and information technology. Its essence lies in the fact that
programs - viruses, endowed with a such of properties that are present in living organisms - they born, reproduce and die. In order to ensure information security, both, individuals and entire organizations, it is necessary to raise awareness about
potential threats from malicious software such as computer viruses. Simulation of operation of malicious software allows user to understand a virus and choose the possible methods of fighting it. In this research, major features of the algorithms
against the security threats from malicious software are simulated. | uk_UA |
dc.language.iso | en | uk_UA |
dc.publisher | Видавництво Львівської політехніки | uk_UA |
dc.subject | scenario imitation | uk_UA |
dc.subject | malware | uk_UA |
dc.subject | information security | uk_UA |
dc.subject | virus | uk_UA |
dc.subject | antivirus | uk_UA |
dc.subject | imitation | uk_UA |
dc.title | Software tool designed to detect characteristics of the malware objects | uk_UA |
dc.type | Article | uk_UA |
Appears in Collections: | Комп'ютерні науки та інженерія (CSE-2013 ). – 2013 р.
|