Antivirus software

Known as: Virus scan, Anti-virus product, A.V. Software 
Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1956-2019
05001000150019562018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
In the last several decades, the arms race between malware writers and antivirus programmers has become more and more severe. The… (More)
  • table I
  • table III
  • figure 2
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Fake antivirus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Despite the widespread use of antivirus software, malware remains pervasive. A new study compares the effectiveness of six… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of… (More)
  • figure 2
  • figure 3
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
In this paper we present an application of the MATINE method for investigating dependencies in antivirus (AV) software and some… (More)
Is this relevant?
2007
2007
Traditionally, antivirus products stop malicious software by recognizing code signatures unique to different types of malware… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
A S RECENTLY AS SIX YEARS AGO, COMPUTER viruses were considered an urban myth by many. At the time, only a handful of PC viruses… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We argue that the random oracle model—where all parties have access to a public random oracle—provides a bridge between… (More)
Is this relevant?
Highly Cited
1981
Highly Cited
1981
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant… (More)
Is this relevant?