Methods of repairing virus infected files, a triz based analysis

U Mishra - arXiv preprint arXiv:1306.4666, 2013 - arxiv.org
… After a trusted connection is established the anti-virus fix is automatically installed without
requiring any end-user action. After the anti-virus fix is installed and the client computer is …

Filtering automated polling traffic in computer network flow data

N Heard, P Rubin-Delanchy… - 2014 ieee joint …, 2014 - ieeexplore.ieee.org
polling behaviour needs to be understood. This article presents a simple Fourier analysis
technique for identifying regular polling… this article is on detecting automated polling behaviour. …

Anti-Virus Techniques

J Aycock - Computer Viruses and Malware, 2006 - Springer
… odically poll the anti-virus vendor for updates. The polling is done automatically by the
anti-virus … This may be necessary to fix bugs, or add functionality required to detect new viruses. …

[PDF][PDF] Secure input handling

E Poll - 2022 - cs.ru.nl
Most security vulnerabilities are caused by insecure input handling. These lecture notes discuss
the patterns and anti-patterns for secure input handling, and also for output handling, as …

The benefits of a notification process in addressing the worsening computer virus problem: Results of a survey and a simulation model

JL Aron, M O'leary, RA Gove, S Azadegan… - Computers & …, 2002 - Elsevier
… is fixed at a moderately high level. … is polled to see if it will clean its machine, based on
input data. If it does, it will use the anti-virus software to remove all viruses that the anti-virus

Towards a robust distributed framework for election-day voter check-in

AA Schwarzmann - Stabilization, Safety, and Security of Distributed …, 2021 - Springer
… aspects of electronic poll book solutions … poll book systems, we discuss selected important
results from distributed computing research that the commercial developers of electronic poll

Are your votes really counted? testing the security of real-world electronic voting systems

D Balzarotti, G Banks, M Cova, V Felmetsger… - Proceedings of the …, 2008 - dl.acm.org
polling places, separate from the DREs and scanners. Paper ballots for each of the polling
… information at the polling site, using the DTDs that were sent to the polling place separate …

On the effectiveness of automatic patching

M VojnoviĆ, A Ganesh - Proceedings of the 2005 ACM workshop on …, 2005 - dl.acm.org
… all hosts poll a server (superhost) to check for patches. We can either think of µ as the per host
polling rate, or of … To capture this, we vary as input parameter a fixed delay at each routing …

A cooperative immunization system for an untrusting internet

KG Anagnostakis, MB Greenwald… - The 11th IEEE …, 2003 - ieeexplore.ieee.org
… attempts to infect other nodes; it may attempt to only infect a (small) fixed number of other …
We avoid changing the state or behavior of the polled agent to reduce the risks associated …

Security analysis of the Diebold AccuVote-TS voting machine

AJ Feldman, JA Halderman, EW Felten - 2006 - usenix.org
… We have constructed a demonstration virus that spreads in … demonstration virus spreads via
the memory cards that poll … to steal a fixed fraction of votes rather than trying to ensure a fixed