Abstract: The growing number of computer viruses and the
detection of zero day malware have been the concern for security
researchers for a large period of time. Existing antivirus products
(AVs) rely on detecting virus signatures which do not provide a full
solution to the problems associated with these viruses. The use of
logic formulae to model the behaviour of viruses is one of the most
encouraging recent developments in virus research, which provides
alternatives to classic virus detection methods. In this paper, we
proposed a comparative study about different virus detection
techniques. This paper provides the advantages and drawbacks of
different detection techniques. Different techniques will be used in
this paper to provide a discussion about what technique is more
effective to detect computer viruses.
Abstract: Early diagnosis of infection like Hep-B virus in blood
is important for low cost medical treatment. For this purpose, it is
desirable to develop a point of care device which should be able to
detect trace quantities of the target molecule in blood. In this paper,
we report a nanoporous silicon oxide sensor which is capable of
detecting down to 1fM concentration of Hep-B surface antigen in
blood without the requirement of any centrifuge or pre-concentration.
This has been made possible by the presence of resonant peak in the
sensitivity characteristics. This peak is observed to be dependent only
on the concentration of the specific antigen and not on the interfering
species in blood serum. The occurrence of opposite impedance
change within the pores and at the bottom of the pore is responsible
for this effect. An electronic interface has also been designed to
provide a display of the virus concentration.
Abstract: String matching also known as pattern matching is
one of primary concept for network security. In this area the
effectiveness and efficiency of string matching algorithms is
important for applications in network security such as network
intrusion detection, virus detection, signature matching and web
content filtering system. This paper presents brief review on some of
string matching techniques used for network security.