2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) 2019
DOI: 10.1109/atit49449.2019.9030431
|View full text |Cite
|
Sign up to set email alerts
|

Data Compression Based on Coding Methods With a Controlled Level of Quality Loss

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Also relatively new is the "SandBox" methods implemented in most well-known antivirus software, for example, Check Point for ESET and AvastSandbox for AVAST systems. This technology is a set of two key components: Sand-Blast and Threat Emulation -components that are a new kind of SandBox organization [14,15] that make it possible to emulate probable attacks and predict system protection accordingly.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…Also relatively new is the "SandBox" methods implemented in most well-known antivirus software, for example, Check Point for ESET and AvastSandbox for AVAST systems. This technology is a set of two key components: Sand-Blast and Threat Emulation -components that are a new kind of SandBox organization [14,15] that make it possible to emulate probable attacks and predict system protection accordingly.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…For example, ESET Dynamic Threat Defense (EDTD) [17] provides another level of security, using ESET transitional technologies to detect new threats [14]. If the antivirus software recognizes malicious code, it prevents further threat activity, thereby keeping it in the quarantine zone.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11,12], studies are presented on the development of remote sensing systems for the earth's surface based on UAVs. This area provides ample opportunities for obtaining large volumes of data and management decisions in crisis situations.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%