Types of malware and malware distribution strategies
A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.
Подобные документы
Allocation and Sizing of Distribution Transformers and Feeders. Planning of Distribution Networks under Load Growth. Optimization Methods for Power System Problems. List of Tables, Principle Symbols and Acronyms. Statement of Original Authorship.
реферат, добавлен 05.01.2014The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
статья, добавлен 24.03.2016Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.
реферат, добавлен 26.12.2014Theoretical aspects of the development of digital platform for engineering controlling business. Digital platform as part of the global economy. Conceptual apparatus for the research. Problems of product exchange between the city and the rural settlement.
дипломная работа, добавлен 14.12.2019A wireless sensor network of distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network. The analysis of models of wireless sensor network with random access is presented.
статья, добавлен 26.08.2016Three types of Italian social networkers through the analysis of latent class conglomerates are shown in this study, based mainly on the level of use of the tools, as well as different covariates which determine the personal profile of social networkers.
статья, добавлен 28.09.2016Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.
методичка, добавлен 11.10.2014- 9. Вирусы
История и описание вредоносного программного обеспечения, к которому относятся сетевые черви, классические файловые вирусы, троянские программы, хакерские утилиты и прочие программы, наносящие заведомый вред компьютеру. Trojan-PSW - воровство паролей.
презентация, добавлен 17.09.2012 In primary order to satisfy the users' requirements for the productivity and efficiency of tasks implementation the grid-system should implement the effective algorithm of tasks distribution between the computing resources accessible at the moment.
статья, добавлен 07.12.2016Pattern discovery in biosequences. Social network mining from the web. Discovering spatio-textual association rules in document images. Discovery of latent patterns with hierarchical bayesian mixed-membership models and the issue of model choice.
книга, добавлен 19.03.2014The definition of Green-orientation of modern CAD systems to optimize FPGA-projects on energy consumption based on the activity signals of the scheme. Method of estimation of FPGA-project in the distribution of the dynamic component of power consumption.
статья, добавлен 23.02.2016Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
статья, добавлен 09.09.2021Types of groupware: computer-mediated communication, meeting and decisions support systems, shared applications, artefacts. Implementation issues. Cooperative work involves: participants, artefacts. Email and bulletin boards. Structured message systems.
презентация, добавлен 28.12.2013Standard Formalisms - software engineering notations used to specify the required behaviour of specific interactive systems. Types of system model: dialogue, full state definition, abstract interaction. Computers are inherently mathematical machines.
презентация, добавлен 28.12.2013A network protocol as a specification for the format and relative timing of the messages exchanged. Formalizing why and how vulnerabilities occur in protocols. Previous models. Automated tools. Terminology relationships. A network time protocol exploit.
статья, добавлен 15.09.2012The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
презентация, добавлен 13.09.2015Exploring different ways of assessing the value of hard currency. Calculating the hard currency exchange rate using a stack of technologies already used in the company. Distribution of income for game content. Improved dashboards for game producers.
курсовая работа, добавлен 17.07.2020Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
книга, добавлен 04.10.2014Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.
презентация, добавлен 06.02.2019Stages of treatment of phonology, morphology and syntax. The semantic structure of the disambiguation of ambiguous words in context. The distribution of vector representations in modern computer linguistics to simulate the semantic relationships of words.
магистерская работа, добавлен 27.08.2016The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016Exploring the world of covert communication. Hiding the goods with steganography. The hidden realm of steganography. Products that implement steganography. Sending stego files across a network. Ways by developing your secure communications strategy.
книга, добавлен 08.03.2014The key problems of the use of digital technologies in the financing of social protection mechanisms for military personnel. Special software for automatization of the processes of financing the mechanisms of social protection of military personnel.
статья, добавлен 04.12.2023The main types of noise and filters that remove them from the image and analyze the apparent differences in the distribution of the image (using the watershed algorithm). Choosing the best filter to use when working with the watershed algorithm.
статья, добавлен 14.01.2017