A Study on Computer Threats and Virus Prevention
Abstract
Keywords
Full Text:
PDFReferences
S. Natarajan and S. Rajarajesware, "Computer Virus: A Major Network Security Threat," International Journal of Innovative Research & Development, vol.3, no. 7, pp. 229-302, 2014.
S. Chakraborty, "A Comparison study of ComputerVirus and Detection Techniques," International Journal of Scientific Research in Computer Science,Engineering and Information Technology, vol. 2, no.1, pp. 236-240, 2017.
M. Khari and C. Bajaj, "Detecting Computer Viruses," International Journal of Advanced Research in Computer Engineering & Technology, vol. 3, no. 7, pp. 2357-2364, 2014
S. Ramadhani, Y. M. Saragih, R. Rahim and A. P. U. Siahaan, "Post-Genesis Digital Forensics Investigation," International Journal of Scientific Research in Science and Technology, vol. 3, no. 6, pp. 164-166, 2017.
Auerbach Publishers (a division of Warren Gorham & Lamont). Data Security Management.Boston, MA. 1995.
British Standards Institute. A Code of Practice for Information Security Management, 1993.
Caelli, William, Dennis Longley, and Michael Shain Information Security Handbook. New York, NY: Stockton Press, 1991.
Hariyanto and A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and Investigation," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 115-121, 2016.
M. Rahgozar. “Computer networks”. Book of the Month Science and Technology, pp. 98-99, 2010.
F. Hohaji, "providing a framework of security for services in next generation networks," the Third National Conference on Information and Communication Technology, Tehran, 2008.
A. Vizandan, A. Mir Ghadri, J. Sheykh Zadegan, "passive defense in infrastructure communications networks with an emphasis on the security assessment of flow encryption algorithms," Journal of passive defense, pp. 47-52, summer and fall of 2011.
M. Azar Poor, A. Dahar, M. Jahani Mir, “the assessment of computer network security by Honey Pot technique in IDS & IPS systems”," journal of information technology era, pp. 78-84, 2012.
L. Peterson and B. Davie, Computer Networks: A Systems Approach, USA: Elsevier, Inc., 2012.
A. Tanenbaum and. D. Wetherall, Computer Networks, New Jersey: Pearson Prentice Hall, 2011.
Tutorials Point (I) Pvt. Ltd., Data Communication and Computer Network, INDIA: www.tutorialspoint.com, 2014.
K. Mansfield and J. Antonakos, Computer Networking for LANS to WANS: Hardware, Software and Security, USA: Course Technology, Cengage Learning, 2010.
Computer Virus: Their Problems & Major attacks in Real Life, International Journal of P2P Network Trends and Technology (IJPTT), Vol. 3, Issue 4, May 2013
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.