An In-Depth Study on Privacy Law, Computer Viruses and Their Prevention

Authors

  • John Aghaei
  • Morgan Beren

DOI:

https://doi.org/10.54097/dva59m48

Keywords:

Computer viruses; characterization; prevention of.

Abstract

With the wide application of computer networks, global informatization is accelerating, computer networks as a platform for information technology and applications have touched all corners of social life, but network viruses have become an important problem plaguing the security of computer systems. This paper initially analyzes the characteristics and hazards of computer network viruses, and puts forward some effective preventive measures, in order to minimize the harm caused by computer viruses.

References

Li, X., Wang, X., Chen, X., Lu, Y., Fu, H., & Wu, Y. C. (2024). Unlabeled data selection for active learning in image classification. Scientific Reports, 14(1), 424.

Liang, Y., Wang, X., Wu, Y. C., Fu, H., & Zhou, M. (2023). A Study on Blockchain Sandwich Attack Strategies Based on Mechanism Design Game Theory. Electronics, 12(21), 4417.

Lee, Zhitong, Ying Cheng Wu, and Xukang Wang. "Automated Machine Learning in Waste Classification: A Revolutionary Approach to Efficiency and Accuracy." Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition. 2023.

Guo, H., Ma, Z., Chen, X., Wang, X., Xu, J., & Zheng, Y. (2024). Generating Artistic Portraits from Face Photos with Feature Disentanglement and Reconstruction. Electronics, 13(5), 955.

Wang, X., Wu, Y. C., Ma, Z. (2024). Blockchain in the courtroom: exploring its evidentiary significance and procedural implications in U.S. judicial processes. Frontiers in Blockchain, 7, 1306058.

Strahilevitz, L. J. (2010). Reunifying Privacy Law. Calif. L. Rev., 98, 2007.

Solove, D. J., & Schwartz, P. M. (2020). Information privacy law. Aspen Publishing.

Richards, N. M., & Solove, D. J. (2010). Prosser's privacy law: A mixed legacy. Calif. L. Rev., 98, 1887.

Kephart, J. O., & White, S. R. (1993, May). Measuring and modeling computer virus prevalence. In Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy (pp. 2-15). IEEE.

Downloads

Published

08-05-2024

Issue

Section

Articles

How to Cite

Aghaei, J., & Beren, M. (2024). An In-Depth Study on Privacy Law, Computer Viruses and Their Prevention. Mathematical Modeling and Algorithm Application, 2(1), 20-22. https://doi.org/10.54097/dva59m48