Today's enterprise networks are distributed to different geographical locations and applications are more centrally located, information represents the most important asset. With the growing number of data communication services, channels and available software applications, data are processed in large quantities and in a more efficient manner. This technological enhancement offers new flexible opportunities also measure security threats poses in the networks. These threats can external or Internal, external threats divided as hacking, virus attack, Trojans, worms etc. There are thousands and thousands of different viruses these days which improve every day. Although the wild spread of new and strong viruses, it still infects and spread only with user's permission. This research paper highlights the phases of computer virus, computer virus, history of worst computer attack, type of computer virus with effect on computer & few examples of virus on their types, working of computer virus, and problem occur due to virus in computers.
An overview of the Internet of Things (IoT) is given in this paper, with a focus on supporting technology, protocols, and application-specific challenges. The most recent advancements in RFID, smart sensors, communication technologies, and Internet protocols enable the Internet of Things. The fundamental idea is to create a new class of applications by having smart sensors work together directly without human intervention. The present Internet, mobile, and machine-to-machine (M2M) technology boom can be viewed as the beginning of the Internet of Things. The Internet of Things (IoT) is anticipated to connect physical things to enhance intelligent decision-making in the next years, bridging various technologies to open up new applications. This article begins by giving a broad overview of the IoT. Then, we provide a high-level review of a few technical aspects relating to the IoT enabling technologies, protocols, and applications. Our goal is to provide a more thorough summary of the most important protocols and application issues compared to other survey papers in the field so that researchers and application developers can quickly understand how the various protocols work together to deliver desired functionalities without having to read through RFCs and the standards specifications. We also give a brief review of some of the most important IoT challenges that have been discussed recently in the literature and a description of related research. We also investigate the connections between the IoT and other cutting-edge technologies, such as big data analytics, cloud computing, and fog computing. We also discuss how IoT services need to be more horizontally integrated. To show how the various protocols discussed in the paperwork together to deliver desired IoT services, we then present thorough service use-cases.
A computer virus is software intentionally written to copy itself without the computer owner’s permission and then perform some other action on any system where it resides. Now a days, viruses are being written for almost every computing platform Antivirus protection is, or should be, an integral part of any Information Systems operation, be it personal or professional. There are number of computer virus are created and these computer virus are affected in day today life. The large number of Antivirus software available in the market and some are being launched, each one of them offers new features for detecting and eradicating viruses and malware. People frequently change their Antivirus software according to their liking and needs without evaluating the performance and capabilities of the various Antivirus software available. This research paper highlights the basic concepts of computer viruses and antivirus software. And also suggest the benchmarking model for ideal antivirus software for all types of user.
The World Wide Web, which has started as a document repository, is rapidly transforming to a full fledged virtual environment that facilitates services, interaction, and communication. Under this light, the Semantic Web and Web 2.0 movements can be seen as intermediate steps of a natural evolution towards a new paradigm, the 3D Internet. We provide an overview of the concept 3D Internet and discuss why it is a goal worth pursuing, what it does entail, and how one can realize it. Our goal in this paper is to discuss a research agenda and raise interest in networking, security, distributed computing, and machine learning communities. We explore first the motivation for the 3D Internet and the possibilities it brings. Subsequently, we investigate the specific system level and research challenges that need to be addressed in order to make the 3D Internet a reality.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.