Security Measures Against Malware Penetration and Spreading
Journal Title: TEM JOURNAL - Year 2013, Vol 2, Issue 1
Abstract
As the title implies the article describes the problems of protection against malicious programs. The widely used method of protection, which is currently the signature analysis, is described. Also the article considers the causes of low efficiency of this method/ A method of protection against malicious programs that would guarantee to prevent the recording and execution of unauthorized programs is offered.
Authors and Affiliations
Markina Tatiana, Ogolyuk A.
Android OS: A Review
Due to the technological development, mobile terminals have evolved into functionally sophisticated devices such as smartphones and tablets. The Android platform has become one of the most popular operating system...
A survey on academic teachers’ perceptions about ICT in education
In this paper we present the analysis, conclusions derived from a universities/faculties survey, concerning the use and perception of ICT in education. It has been conducted during the third year of implementation of the...
Predicting Bidding Price in Construction using Support Vector Machine
The bidding price can directly affect the construction firm business, so the decision what price to bid for a new project in order to sign a contract is a difficult and responsible decision. Data for fifty four ten...
Fuzzy Clustering Using C-Means Method
The cluster analysis of fuzzy clustering according to the fuzzy c-means algorithm has been described in this paper: the problem about the fuzzy clustering has been discussed and the general formal concept of the pr...