computer viruses Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

A Study on Hazards of Computer Viruses

Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure, suddenly restarting machines, deleting or modifying data and in some cases mild effects such as slowing down machines or producing irritating sounds. Viruses have been a major cause for worry especially with the advances in data processing, storage and movement of information technologically. Many computer users and organizations especially the computer intensive organizations have had to invest heavily in dealing with viruses particularly those organizations running the windows platform. These computer viruses have been defined by their characteristics of entry and multiplication without the user’s notice as well as diverting the normal functioning of the computer. This paper seeks to define a virus and explain its related terms such as malicious software, worms, and Trojan horses. It explains vulnerabilities of operating systems in relation to viruses, it makes an observation on strengths of Linux versus Windows, outline the present state of affairs, apart from using anti-virus software, there are other procedures which can help protect against viruses which are also mentioned, the future of computer viruses and the conclusion that the Internet is serving its purpose of interconnecting computer and hence promoting distribution of viruses then makes some recommendations on viruses.

Comparison, Analysis and Analogy of Biological and Computer Viruses

Correlation of biological and computer viruses through evolutionary game theory, pemodelan matematika terhadap penyebaran virus komputer dengan probabilitas kekebalan.

The increase in the number of computer viruses can be modeled with a mathematical model of the spread of SEIR type of diseases with immunity probability. This study aims to model the pattern of the spread of computer viruses. The method used in this research is the analytical method with the probability of mathematical immunity. Based on the analysis of the model, two equilibrium points free from disease E1 and endemic equilibrium points E2 were obtained. The existence and local stability of the equilibrium point depends on the basic reproduction number R0. Equilibrium points E1 and E2 tend to be locally stable because R0<1 which means there is no spread of disease. While the numerical simulation results shown that the size of the probability of immunity will affect compartment R and the minimum size of a new computer and the spread of computer viruses will affect compartments S and E on the graph of the simulation results. The conclusion obtained by the immune model SEIR successfully shows that increasing the probability of immunity significantly affects the increase in the number of computer hygiene after being exposed to a virus.

Predicting Spread Probability of Learning-Effect Computer Virus

With the rapid development of network technology, computer viruses have developed at a fast pace. The threat of computer viruses persists because of the constant demand for computers and networks. When a computer virus infects a facility, the virus seeks to invade other facilities in the network by exploiting the convenience of the network protocol and the high connectivity of the network. Hence, there is an increasing need for accurate calculation of the probability of computer-virus-infected areas for developing corresponding strategies, for example, based on the possible virus-infected areas, to interrupt the relevant connections between the uninfected and infected computers in time. The spread of the computer virus forms a scale-free network whose node degree follows the power rule. A novel algorithm based on the binary-addition tree algorithm (BAT) is proposed to effectively predict the spread of computer viruses. The proposed BAT utilizes the probability derived from PageRank from the scale-free network together with the consideration of state vectors with both the temporal and learning effects. The performance of the proposed algorithm was verified via numerous experiments.

EVOLUTION OF COMPUTER VIRUSES

The dynamical analysis of computer viruses model with age structure and delay.

This paper deals with the dynamical behaviors for a computer viruses model with age structure, where the loss of the acquired immunity and delay are incorporated. Through some rigorous analyses, an explicit formula for the basic reproduction number of the model is calculated, and some results about stability and instability of equilibria for the model are established. These findings show that the age structure and delay can produce Hopf bifurcation for the computer viruses model. The numerical examples are executed to validate the theoretical results.

A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative

It is possible to produce mobile phone worms, which are computer viruses with the ability to command the running of cell phones by taking advantage of their flaws, to be transmitted from one device to the other with increasing numbers. In our day, one of the services to gain currency for circulating these malignant worms is SMS. The distinctions of computers from mobile devices render the existing propagation models of computer worms unable to start operating instantaneously in the mobile network, and this is particularly valid for the SMS framework. The susceptible–affected–infectious–suspended–recovered model with a classical derivative (abbreviated as SAIDR) was coined by Xiao et al., (2017) in order to correctly estimate the spread of worms by means of SMS. This study is the first to implement an Atangana–Baleanu (AB) derivative in association with the fractional SAIDR model, depending upon the SAIDR model. The existence and uniqueness of the drinking model solutions together with the stability analysis are shown through the Banach fixed point theorem. The special solution of the model is investigated using the Laplace transformation and then we present a set of numeric graphics by varying the fractional-order θ with the intention of showing the effectiveness of the fractional derivative.

Information Technology Act 2000 and the Potential Use of Data Analytics in Reducing Cybercrime in India

Cybercrime is increasing rapidly in this digitized world. Be it business, education, shopping, or banking transactions, everything is on cyberspace. Cybercrime covers a wide range of different attacks such as financial cybercrime, spreading computer viruses or malware, internet fraud, pornography cybercrime, intellectual property rights violation, etc. Due to increased cyber-attacks these days, the online users must be aware of these kinds of attacks and need to be cautious with their data online. Each country has their own laws for dealing with cybercrime. The different measures taken by the government of India to combat cybercrime are explained in this chapter. How the potential use of data analytics can help in reducing cybercrime in India is also explained.

Export Citation Format

Share document.

To read this content please select one of the options below:

Please note you do not have access to teaching notes, an introduction to computer viruses: problems and solutions.

Library Hi Tech News

ISSN : 0741-9058

Article publication date: 14 September 2012

The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention.

Design/methodology/approach

The author undertook an extensive study and review of the literature available online and on relevant web sites on the present topic.

A large number of viruses were found during the study, which are causing serious damages to computer systems. The author suggests ways to detect and prevent the different computer viruses.

Research limitations/implications

The research is based on and limited to the study of the relevant literature available on different relevant web sites.

Practical implications

The research will benefit business organizations, business houses, educational institutions and libraries working in fully computerized environments, in detection of viruses and preventing infection of their computer systems.

Social implications

The society will also benefit by attaining knowledge about the different types of computer viruses and the measures of prevention of infection.

Originality/value

There are a number of studies and articles available on the topic but almost all of them appear to be incomplete in the sense that either they discuss only a limited number of known viruses or suggest only limited ways of prevention. The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them.

  • Computer viruses
  • Data security
  • Computer security
  • Information security
  • Security measures

Khan, I. (2012), "An introduction to computer viruses: problems and solutions", Library Hi Tech News , Vol. 29 No. 7, pp. 8-12. https://doi.org/10.1108/07419051211280036

Emerald Group Publishing Limited

Copyright © 2012, Emerald Group Publishing Limited

Related articles

All feedback is valuable.

Please share your general feedback

Report an issue or find answers to frequently asked questions

Contact Customer Support

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Computer Viruses – from an Annoyance to a Serious Threat

Profile image of murugan paramasivam

Related Papers

Malicious codes are serious threat to our society. The presented work discusses various aspects of technological level, detection, mitigation , identification and Classification of malicious codes. Detection method depicts how various antivirus technologies get used to fight with complex encrypting , decrypting and nature changing virus activities. Antivirus approach consists of waiting for a number of computers to be infected, detecting the virus, designing a solution, delivering and deploying a solution.

research paper for computer virus

Vishrut Sharma

In this paper, I will present a broad overview of recent worm attacks starting from the year 2000 through 2011. Some of the most ‘notorious’ worms were discovered during this period including code red, slammer, and conficker. Though this paper does not contain any original research, it is meant to provide malware researchers with well-documented information of some worms that caused havoc during the said period. After sifting through thousands of entries on virus information repositories, I present, in this paper, only those that I considered novel in their approach, primarily from a technical perspective. As a summary to the paper, I have presented a broad overview of trends that I extracted from this raw data and also focussed on the ever increasing destructive potential of worms.

joey maravillas

Eugene H Spafford

International Journals for Researchers [ER Publication, WOAR Journals, IJEAS and IJEART]

Abstract— The computers viruses have been become a challenge for computer architecture and self organizing system. There has been considerable interest in computer viruses since they first appeared in 1981 and increasing day by day as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of computer architecture- a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of “vandalware” as a form of life. This research paper starts with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of computer architecture and self organizing systems. The paper concludes with some comments directed towards the definition of artificially “alive” systems and experimentation.

Chris Moses

Ozone layer depletion, is simply the wearing out (reduction) of the amount of ozone in the stratosphere. Unlike pollution, which has many types and causes, Ozone depletion has been pinned down to one major human activity. Causes of Ozone Layer Depletion? Natural causes of depletion of ozone layer: Ozone layer has been found to be affected by certain natural phenomena such as Sunspots and stratospheric winds. But this has been found to cause not more than 1-2% depletion of the ozone layer and the effects are also thought to be only temporary. It is also believed that the major volcanic eruptions (mainly El Chichon in 1983 and and Mt. Pinatubo in 1991) has also contributed towards ozone depletion. Man-made causes of depletion of ozone layer: The main cause for the depletion of ozone is determined as excessive release of chlorine and bromine from man-made compounds such as chlorofluorocarbons (CFCs). CFCs (chlorofluorocarbons), halons, CH 3 CCl 3 (Methyl chloroform), CCl 4 (Carbon tetrachloride), HCFCs (hydro-chlorofluorocarbons), hydrobromofluorocarbons and methyl bromide are found to have direct impact on the depletion of the ozone layer. These are categorized as ozone-depleting substances (ODS). Chlorofluorocarbons are released into the atmosphere due to:

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Computer Viruses: Principles of Exertion, Occurrence and Awareness

International Journal of Creative Research Thoughts (IJCRT) 2017, ISSN:2320-2882, Volume.5, Issue 4, pp.648-651

4 Pages Posted: 15 Mar 2021

Manishaben Jaiswal

University of the Cumberlands

Date Written: Dece 24, 2017

Computer users, including students, home and corporate users, system administrators, corporate managers, and even the antivirus manufacturers. People with malefic intentions write the viruses to bother innocent users. Many sorts of viruses are boot sector viruses, file viruses, worms, Trojan horses, macro viruses, etc. Each of those has many various variants. Some viruses transmit through floppies, and boot sector viruses are rare, but nowadays, nobody boots from floppies. Today, viruses transmit more through networks and emails. Macro viruses are most prevalent within the current days. The viruses generally attempt to exploit the OS's ambiguities, application programs, windows sockets, and even anti-virus programs. Some viruses are so dangerous that they will make the system completely unusable and irreparable. Nowadays, the detection of computer viruses has become commonplace. In this paper, I will like to represent how the virus works, spreads from one machine to another, and its awareness.

Keywords: Virus, computer, e-mail, virus risk, awareness of virus

Suggested Citation: Suggested Citation

Manishaben Jaiswal (Contact Author)

University of the cumberlands ( email ).

6178 College Station Drive Williamsburg, KY 40769 United States

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, social sciences education ejournal.

Subscribe to this fee journal for more curated articles on this topic

Cybersecurity, Privacy, & Networks eJournal

Information systems & ebusiness negative results ejournal.

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • PMC10537806

Logo of viruses

Navigating the Landscape: A Comprehensive Review of Current Virus Databases

Muriel ritsch.

1 RNA Bioinformatics and High-Throughput Analysis, Friedrich Schiller University Jena, 07743 Jena, Germany; ed.anej-inu@cbve

2 European Virus Bioinformatics Center, 07743 Jena, Germany

Noriko A. Cassman

Shahram saghaei.

3 German Centre for Integrative Biodiversity Research (iDiv) Halle-Jena-Leipzig, 04103 Leipzig, Germany

4 FLI Leibniz Institute for Age Research, 07745 Jena, Germany

Associated Data

Data are contained within the article or Supplementary Materials . The data presented in this study are available in the Supplementary Materials .

Viruses are abundant and diverse entities that have important roles in public health, ecology, and agriculture. The identification and surveillance of viruses rely on an understanding of their genome organization, sequences, and replication strategy. Despite technological advancements in sequencing methods, our current understanding of virus diversity remains incomplete, highlighting the need to explore undiscovered viruses. Virus databases play a crucial role in providing access to sequences, annotations and other metadata, and analysis tools for studying viruses. However, there has not been a comprehensive review of virus databases in the last five years. This study aimed to fill this gap by identifying 24 active virus databases and included an extensive evaluation of their content, functionality and compliance with the FAIR principles. In this study, we thoroughly assessed the search capabilities of five database catalogs, which serve as comprehensive repositories housing a diverse array of databases and offering essential metadata. Moreover, we conducted a comprehensive review of different types of errors, encompassing taxonomy, names, missing information, sequences, sequence orientation, and chimeric sequences, with the intention of empowering users to effectively tackle these challenges. We expect this review to aid users in selecting suitable virus databases and other resources, and to help databases in error management and improve their adherence to the FAIR principles. The databases listed here represent the current knowledge of viruses and will help aid users find databases of interest based on content, functionality, and scope. The use of virus databases is integral to gaining new insights into the biology, evolution, and transmission of viruses, and developing new strategies to manage virus outbreaks and preserve global health.

1. Introduction

Viruses, the most abundant and diverse biological entities in the biosphere, play important roles in public health, ecology, and agriculture [ 1 , 2 ]. The identification, characterization, and surveillance of viruses rely heavily on knowledge of their various characteristics, including genome organization, genomic sequences, and replication strategy [ 3 , 4 , 5 ]. Until about the 1990s, virus genomes were mainly derived from isolates, came from medically and agriculturally important hosts, and were annotated with morphological and medically related metadata [ 6 ]. With the advancements in and lower costs of next-generation sequencing technologies, -omics projects have gained popularity across various fields, leading to the continuous deposition of metagenome-derived viral sequences into sequencing repositories along with computationally derived metadata. The analysis of uncultivated virus genomes derived from metagenomic sequences has accelerated the rate of discovery of new viruses [ 7 ]. However, despite these technological strides, the current understanding of virus diversity remains incomplete [ 8 , 9 ]; for example, regarding viruses with zoonotic potential, one estimate suggests that only 1% of these virus species have been discovered to date [ 10 ]. This discrepancy highlights the need to further explore and uncover the vast array of undiscovered viruses through their genomic sequences.

Web-facing databases provide the structured and indexed storage of information, which can be easily accessed through an internet browser. In the context of virus research, virus databases represent central hubs of information connecting virus genomic sequences and associated metadata, such as viral and host taxonomy, host range, transmission modes, genomic structures, and gene annotations. Researchers use these databases to gain insights into viral genetic diversity and evolutionary relationships, and to study new viruses [ 11 , 12 ]. Virus databases play a pivotal role in virus discovery, surveillance, and monitoring, allowing for the comparison of newly identified viruses with known ones [ 13 , 14 , 15 ]. Moreover, they contribute to epidemiological studies by integrating diverse information, such as clinical characteristics, virus and host genetic variation, and samplings and geographical location. Overall, virus databases are vital resources for comprehensive analyses, comparative studies, and generating innovative strategies in virus detection, prevention, and control.

The presence of multiple virus databases can be attributed to variations in specialization, data types, and aims. Some databases are created for a specific research purpose or to support a specific virus research area, e.g., virus ecology or epidemiology; alternately, some databases focus on specific viruses or cover a wide range of viruses. Further, databases have different goals, ranging from information dissemination to providing web-based tools for data analysis. Database longevity refers to the ability of a database to remain functional and accessible over a long period of time, even as technology and software evolve [ 16 ]. Ensuring longevity for virus sequence databases includes regular maintenance and updates, the usage of standardized data formats, the creation of backups and archives, the implementation of open data policies, collaboration, funding, and trust, and usage by the community [ 17 , 18 ]. The current varied landscape of virus databases largely reflects the informational needs and funding of different types of virus research.

Many virus databases feature the extra curation of a subset of virus sequences from long-term sequence repositories (e.g., NCBI Genbank ) as well as additional computed datasets based on these sequences. As such, virus databases contain vital metadata, such as the taxonomic details of hosts and viruses, location data, publications, years, processing information, morphology, and more. These metadata play a crucial role in studying virus outbreaks, tracking infection pathways, and analyzing viral distribution patterns. Another important type of data found in virus databases is gene annotations, providing valuable information about genetic elements, protein sequences, gene functions, and structural features. These annotation data allow researchers to analyze the functions of viral genes and proteins, gaining insights into their impact on virus biology. These datasets facilitate the comparative analysis of viruses and virus communities. On the other hand, incomplete or inaccurate metadata in sequence entries can adversely impact downstream analysis [ 19 , 20 ]. Virus databases also offer analysis tools and software, such as sequence comparisons, phylogenetic analyses, protein structure prediction, and the identification of evolutionary selection pressures. A comprehensive comparison of the content based on the number of sequences and species in each database has not yet been performed.

A challenge encountered by all databases—not limited to virus-specific ones—is the handling of errors. Errors are almost unavoidable and can significantly impact subsequent analyses. Many questions arise when considering error management, such as whether users should be allowed to upload their own data, which can lead to a more complete dataset but also carries the potential for more errors. Another important aspect is how quickly and effectively errors can be addressed and supported. One solution to address this issue is to provide a curated subset of data, allowing users to decide which dataset to utilize. However, this presents difficulties, as users may not be aware of the cascading nature of existing errors. As far as we know, there is currently no comprehensive review systematically describing different types of errors to provide users with an overview of potential pitfalls so that users can better address them.

To the best of our knowledge, the last two comprehensive reviews of virus databases were conducted by Sharma et al. in 2015 and Mcleod et al. in 2017 [ 21 , 22 ]. Sharma et al. reviewed 60 tools and 50 databases, but 39 of the databases are no longer accessible or have not been updated recently; see Table S1 . In the Mcleod et al. review, they listed 149 entries, including 48 sequence databases. However, only 11 sequence databases met our criteria of being up to date for our study; see Table S2 . Comparing the two reviews, we found eight databases that were considered up to date in both. Surprisingly, despite the rapid advancements and numerous changes in the field, there has been a notable absence of comprehensive reviews on virus databases in the past 5 years.

In addition to database review articles, several catalogs of databases have been developed that aggregate databases in a clear and well-structured manner. Five such catalogs of databases are (1) re3data.org , (2) FAIRsharing [ 23 ], (3) The Database Commons [ 24 ], (4) ELIXIR bio.tools [ 25 ], and (5) NAR database list [ 26 ]. These catalogs may serve as valuable resources for users who are uncertain about which database to utilize, by providing them with a convenient starting point. In these database lists, users can find database descriptions and searchable metadata, as well as static properties, such as the year of establishment, links, and country information. There is currently a lack of comparisons of catalogs of databases evaluating their use for searching virus databases.

When using a virus database, users have diverse requirements beyond accessing relevant content. The usability of the database is crucial, with easy navigation and efficient information retrieval being key factors. Features like keyword search and phrase suggestions enable efficient entry retrieval. Presenting results in meaningful formats, such as tables, enhances usability, particularly when multiple matching entries are involved. Accessibility is important, providing options like one-click downloads and availability through various channels (website, FTP, or API), considering the need for user login. Establishing links to other databases enables comprehensive and integrated research, while integration with workbenches and the availability of associated tools empower users to work with their data and utilize additional resources for analysis. The easy sharing of URLs promotes collaboration and efficient communication. Trust and transparency are fostered by the availability of source code, enabling users to comprehend underlying processes. To the best of our knowledge, there are currently no existing reviews that attempt to describe the functionality of databases. This lack of information hinders users in making informed decisions about which database is the most suitable for their needs.

The FAIR data principles encompass the findability, accessibility, interoperability, and reusability of research data objects [ 27 ]. The principles emphasize making these objects FAIR (whether database entries or databases) by following the criteria within each principle described at the FAIR principles website . The FAIR principles can be applied to evaluate three key entities: data (or any digital object), metadata (information about the digital object), and infrastructure. Adhering to the FAIR principles is meant to enhance machine-driven discovery and the utilization of data in parallel to facilitating human collaboration and data reuse in scientific research. Evaluating virus databases based on FAIR principles would reveal their potential to advance scientific knowledge and enable data-driven discoveries. As far as our knowledge extends, this is the initial evaluation of virus databases in terms of FAIRness.

In this study, we provide a comprehensive overview of the most up-to-date virus databases, covering five key aspects: (1) content, (2) functionality, (3) FAIRness, (4) comparison of the catalogs of databases, and (5) an analysis of potential errors within the databases. In terms of content, we compare the key features already present in other reviews, such as name, link, last update, short description, and citations. Additionally, we delve deeper into the content of the databases by evaluating the number of sequences and species available, suggesting use cases for each database. Regarding functionality, we compare features such as general usage, presence of a workbench, tool availability, database complexity, download options and ease of use, and the need for user login. Additionally, we analyze whether keyword search functionality is available, whether there are phrase suggestions, the presentation format of the output, the presence of links to other databases, the ability to share URLs, and the availability of source code. Furthermore, we evaluate the FAIRness (findable, accessible, interoperable, and reusable) of the databases, as it is of paramount importance for their usability and long-term value. In our review, we include an up-to-date assessment of the webpages hosting virus databases, specifically focusing on (1) re3data.org , (2) FAIRsharing [ 23 ], (3) The Database Commons [ 24 ], (4) ELIXIR bio.tools [ 25 ], and (5) NAR database list [ 26 ]. Additionally, we provide an overview of various types of errors that can occur in databases, providing users with suggestions to better address and mitigate these issues during deposition of user data to the sequencing repositories.

2. Exploring the Distinctions amongst Diverse Databases

Here, we present a comprehensive overview of 24 virus databases that are currently active and contain virus-centric data (e.g., virus sequences); see Table 1 and Table S3 .

We compiled the list of databases for comparisons by including all up-to-date databases mentioned in the previous review papers [ 21 , 22 ], along with active databases obtained from the database catalogs ( re3data.org , FAIRsharing , The Database Commons , ELIXIR bio.tools , and NAR database list ).

We only examined up-to-date databases, meaning databases with a website or data update from 2022 onward. Due to the COVID-19 pandemic, numerous coronavirus-related databases have been developed and established. In total, we identified 49 such coronavirus databases, of which we selected and included 3 important ones in Table 1 based on our assessment. All other coronavirus databases identified here are listed in Table S4 . For further reference, please see a relatively recent review of COVID-19 resources [ 28 ]. Additionally, we excluded several databases based on various criteria. Some were considered too specific, focusing on a single virus in a particular region or providing exclusively epidemiological data. Others, we classified as tools, networks, or tables rather than databases.

The following non-COVID databases were found in our search of databases and were not included in our Table 1 based on the criteria for rejection listed above: (1) Disease Monitoring Dashboard , (2) RID , (3) Virus-CKB , (4) VirHostNet 3.0 , (5) HIV Drug Inter- actions , (6) HEP Drug Interactions , (7) HIV and COVID-19 Registry in Europe , (8) United States Swine Pathogen Database , (9) Global.health , and (10) WestNile.ca.gov .

The database comparison included the database name, a hyperlink to the database, and an assessment of whether a login was required. Additionally, the functionality was described, considering aspects such as user friendliness, the availability of a workbench, the ability to work with personal data, tool availability, subjective complexity, the type of downloads offered, and the possibility of accessing all the data. Last, a short description of each database was provided along with the corresponding references.

In the content section, we listed an estimate of the number of families, genera and species covered in the database. Note that only the species estimate (# spec) is included in Table 1 . If the database reported the number of virus species or an equivalent numbers—such as number of vOTUs in the case of IMG/VRs—we used that number. If there was no species number or equivalent reported (e.g., for the PaVe), we took the total count of unique ICTV or NCBI Taxonomy virus species names plus “Unclassified <genera>” as the number of virus species. Further details can be found in the individual database paragraphs starting in Section 2 .

Regarding the current manuscript, we used ChatGPT (May 24 Version) in compliance with the journal guidelines to help generate most of the text. The writing process can be simplified as follows: 1. We defined a working outline of the contents of the paper. 2. We used each point in the outline as a prompt to generate a paragraph. 3. The paragraphs were edited for flow and scrutinized to make sure the content was as intended. This process was applied to the entire manuscript text, excluding the first paragraph of the introduction, the FAIR criteria paragraphs, the conclusion and the figure and table captions.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i001.jpg

Name#seq-n#seq-p#specFunctionalityFAIRDownClickListed inCite
knowledge databases
0011,273 Wall [ , ]
007 [ ]
00 Wone [ , ]
0016,488 Fall [ ]
genomic sequences databases
295,306,161480,376,93224,824 WFAsel [ ]
11,345,66252,734,16152,414 WAall [ ]
261,488052,414 WFAone [ ]
8,454,47301,348,976 Wall [ ]
11,423610,15211,133 WFall
599,5380∼11,273 WAsel [ ]
64,28964,289∼1617 Wsel [ , , ]
other—omics databases
15,677,62309,169,185 WAall [ , ]
0077 Wone [ ]
00∼781 [ ]
virus—specific databases
15,320,80103 Wsel [ , , ]
17,317,438534052 WFAall [ ]
001 [ ]
1,119,27474,7264 Wsel [ , ]
269,20503 [ ]
002 Wone [ ]
132,609116,3181 Wone [ ]
72283985133 WAsel [ ]
932,9381,254,76713 WAsel [ ]
487601 Wall [ ]

Further, we specified the number of nucleotide (#seq-n ) and protein sequences (#seq-p) that were available for browse and bulk download. In more detail, the number of nucleotide sequences referred to the total number of partial and complete nucleotide sequences, which were available as one or more FASTA or FASTQ files. Depending on the database, this number included the genome, gene and/or transcript sequences of viruses. Note that for some databases, plasmids were included in this estimate. The number of protein sequences refers to the number of protein sequences available as one or more FASTA or FASTQ files; this included coding regions, predicted genes (aka open reading frames) and mRNA sequences. Further explanations can be found in the individual database paragraphs starting in Section 2 .

In Table S3 , an additional table can be found that further investigates the following aspects: the presence of keyword search functionality, the availability of phrase suggestion, the presence of cross-links to other databases, the ability to share the URL, whether the webpage is generated via an API, the quality of the result table as output, and the availability of the source code. To facilitate a comprehensive analysis of the database catalogs, we included a comparison to determine whether each respective database is included or not. For a detailed examination of the catalogs, see Section 2.4 .

2.1. Knowledge Databases

These databases play a crucial role in research, facilitating knowledge transfer and providing foundational information. It is important to note that these sources do not directly contain sequences but provide external links to the sequences, instead serving as repositories of centralized knowledge on viruses.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i014.jpg

One of the fundamental tasks in virology is establishing a robust taxonomy to facilitate the effective comparison and study of viruses. The International Committee on Taxonomy of Viruses ( ICTV) is the global organization tasked by the International Union of Microbiological Societies ( IUMS ) with developing, refining and maintaining the virus taxonomy down to the level of species [ 29 , 30 , 59 ]. As of May 2023, the virus taxonomy curated by the ICTV (version: MSL38) comprised 264 families, 2818 genera, and 11,273 species. The taxonomy is periodically updated, with revisions released at least once and up to twice a year. New entries are proposed by the scientific community and reviewed by expert subcommittees within the ICTV . The categorization of virus groups is based on various characteristics, such as genetic material, genome organization, replication strategy, and host range. Notably, the ICTV recently embraced the inclusion of virus groups based solely on sequence information, departing from the traditional reliance on virus morphology. Users can download the entire taxonomy as an Excel sheet or browse through it, available at the visual browser . Links to the genome sequences of exemplars (representatives) and additional representatives of each virus species are provided in the Virus Metadata Resource sheet. In our opinion, the website may profit from a clearer structure and direct download of exemplar and additional virus genome sequences. Helpful are the provided “How-to Videos” as a valuable resource to assist users in effectively navigating the taxonomy.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i015.jpg

The ViralZone is a powerful and up-to-date online encyclopedic database that provides summarized expert knowledge on various aspects of viruses, including genomic structure, virus replication cycle, host range, virus taxonomy, and molecular biology [ 31 ]. Widely embraced by the research community, it has become a trusted resource for obtaining information about specific viruses, serving as a key starting point for addressing novel research questions. In total, it houses detailed descriptions of over 128 families, 567 genera, and 7 virus species (e.g., Influenza A virus and SARS coronavirus 2). Every entry within the database comprises a fact sheet that presents visual representations of the virion and genome, alongside comprehensive details concerning gene expression and replication mechanisms. While the ViralZone itself does not contain nucleotide sequences in bulk download form, it does provide links to protein and nucleotide sequences of reference sequences within the fact sheet. It is a structured, user-friendly and well-connected website, where users and especially virologists can quickly find the information for which they are looking.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i016.jpg

The VIPERdb , a specialized database dedicated to icosahedral virus capsid structures, offers a wealth of information derived from both structural and computational analyses [ 32 , 33 ]. The database provides diverse visualizations on various levels, multiple sequence alignments, relevant publications, and useful tools, such as anomaly analysis and contact finder. Where available, each protein structure page contains a link to the respective protein sequences in the Protein Data Bank , and for those with a related publication, the PubMed id is linked. We did not include these protein sequences in Table 1 because they are not available in bulk download form. The search functionality of VIPERdb allows users to explore virus protein structures based on taxonomic classifications or specific criteria. One limitation of VIPERdb is its focus on icosahedral virus capsid structures. However, there are ongoing efforts to expand its scope, and some helical structures are already included. This comprehensive database encompasses information on 1323 protein structures from 165 viral genera and 75 virus families. With its latest release, VIPERdb introduced a new standalone database on its website, namely the Virus World . It contains a browsable taxonomy and interlinked data (genome type and coat protein sequences) on 211,450 viruses from 1038 viral genera and 158 viral families. Virus World also provides the capsid protein sequences for these viruses in some instances. In our opinion, the search function of VIPERdb could be improved, as users must have prior knowledge of their virus of interest before using it. Further, bulk download and browse options would increase user friendliness. Please note that there was an additional database known as VIPR , which was recently incorporated into the BV-BRC ( Bacterial and Viral Bioinformatics Resource Center ) as described below.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i017.jpg

The Virus-Host DB is a comprehensive and manually curated database that links viruses and hosts using pairs of NCBI taxonomy Ids [ 34 ]. It includes viruses with complete genomes stored in NCBI/RefSeq and GenBank , with the accession numbers listed in EBI Genomes. Host information is collected from various sources, including RefSeq , GenBank , UniProt , and ViralZone , and supplemented with additional data obtained from literature surveys. The database offers comprehensive information on 15,179 virus species, encompassing scientific names, lineages, Baltimore groups, RefSeq genome sequences, database links, and details of 3791 host species, enabling users to investigate interactions from both virus and host viewpoints. The database is well-interconnected, making it user friendly and valuable for obtaining an overview of interactions. The database contains a limited amount of information, as it focuses on providing specific linkages rather than comprehensive data.

2.2. Databases Containing Virus Sequences

Genomic, transcriptomic, and proteomic virus sequences serve as a foundational element for a wide range of virus bioinformatics analyses. For example, phylogenetic analysis typically starts with multiple sequence alignment of a collection of sequences. For host sequences, we refer to additional -omics databases; see below. Sequence databases serve as a critical starting point for examining genetic variations and functional components. When working with all or a significant portion of sequences from a database for further analyses, e.g., in virus ecology, it is important to be aware of the imbalance in virus representation. In other words, the composition of viruses sequences within a database does not reflect the natural occurrence of viruses.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i018.jpg

The Bacterial and Viral Bioinformatics Resource Center ( BV-BRC ) is a recently merged platform that integrates various NIAID -funded pathogen-related resources, including the Virus Pathogen Resource ( ViPR ), the Influenza Research Database ( IRD ) and PATRIC (the Bacterial Bioinformatics Database and Analysis Resource ). With diverse computational tools, the BV-BRC empowers researchers to analyze and interpret large genetic datasets originating from NCBI GenBank and Refseq (see below) as well as specific projects. Users have the ability to search, browse, download, and analyze a multitude of data types, including metadata, taxonomy, genomes, features (ORFs), proteins, protein structures, domains and motifs, epitopes, and experimental data. It also offers a private workbench for the secure analysis and storage of private datasets. The BV-BRC encompasses integrated datasets from mainly pathogenic bacteria, archaea, viruses, and eukaryotes, allowing users to search, browse, download, and analyze various data types, such as metadata, taxonomy, genomes, features, proteins, and experimental data. Tools and services are categorized into genomics, phylogenomics, protein analysis, metagenomics, transcriptomics, and utilities. The BV-BRC provides access to 295,306,161 virus gene and genome, partial and complete sequences including 9,763,946 genomes/segments, representing 106 virus families, 1946 genera, and 24,824 species. Additionally, there are 480,376,932 virus protein sequences. The BV-BRC categorizes plasmids under the virus category, resulting in the inclusion of plasmid sequences within the overall sequence count. Note that the number of species is higher than that of the official ICTV number because the BV-BRC includes unclassified taxa. Despite the complexity of the platform, efforts have been made to maintain user friendliness and visual accessibility. Workshops and training opportunities are provided regularly to enhance user proficiency in utilizing the database effectively.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i019.jpg

The recently established NCBI Virus interface is a consolidation of various NCBI resources: NCBI Viral Genomes (a former version of NCBI Virus ), NCBI Nucleotide (selected for taxonomic classification to viruses), including Refseq , Genbank , Virus Variation Resource , and the old resource NCBI Retroviruses [ 36 ]. Virus genome sequences are submitted by users into the public sequence repositories, which are part of the International Nucleotide Sequence Database Collaboration ( INSDC ). The INSDC collaboration is composed of three organizations: the National Center for Biotechnology Information ( NCBI ) GenBank , the EMBL-EBI European Nucleotide Archive ( ENA ) and the DNA DataBank of Japan ( DDBJ ). These three repositories contain the same data, ensuring data consistency across platforms. The sequences from these repositories are frequently utilized as a starting point by other databases, which then apply diverse analyses or visualizations to further explore the data.

NCBI Virus is regularly updated, with the core component being the GenBank and Refseq sequences and well-curated metadata, and additional features being new analysis or visualization functionalities. As of June 2023, 11,345,662 virus nucleotide and 52,734,161 virus protein sequences were accessible through NCBI Virus . These sequences are linked to the NCBI Nucleotide database, providing extensive metadata, such as organism, host, taxonomy, publication, and organization (e.g., ORF or domains), as well as the corresponding nucleotide or protein sequences. The number of species in the NCBI Virus database, which is 52,414, surpasses the official ICTV count due to the inclusion of unclassified taxa. However, it is important to note that within the broader NCBI GenBank database, there are instances of sequence errors that can potentially contribute to false-positive results in analyses (see Section 3 for more details). NCBI offers the Reference Sequence ( RefSeq ) collection as a comprehensive, integrated, and well-annotated dataset containing extensive curation and additional data types, including 19,975 nucleotide sequences and 710,847 protein sequences of viruses. The RefSeq are considered high-quality sequences and are extensively utilized by the scientific community.

The search interface of NCBI Virus is user-friendly, and the results are filterable by a wide range of curated metadata, such as taxonomy, length, completeness, host, submitter, genome molecule type, and date. Users can perform a sequence blast or keyword search, with example searches, such as “all viruses” or “bacteriophages”. Based on our experience, datasets containing up to 100,000 sequences can be readily downloaded, offering users a range of options to select from. Additionally, users can conveniently create their own custom FASTA headers. Several tools are available to perform alignments or phylogenetic analyses with selected sequences. Over the years, NCBI Virus resources have evolved, offering enhanced functionality. Compared to the older NCBI Viral Genomes database [ 37 ], NCBI Virus is more organized, functional, and visually appealing.The Virus Variation Resource ( VVR ) covers seven virus species (influenza virus, dengue virus, Zika virus, rotavirus, West Nile virus, MERS coronavirus, and Ebolavirus). Only the sub-database for influenza virus provides extra functionality, such as an annotation tool. NCBI SARS-CoV-2 Resources is another specific virus database for COVID-19 only. In summary, NCBI Virus serves as the go-to resource when working with NCBI virus-related data, offering a visually appealing and user-friendly interface for virus sequence data and metadata.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i020.jpg

The Reference Viral Database ( RVDB ) comprises a comprehensive collection of nucleotide sequences, encompassing viral, virus-related, and virus-like sequences (excluding bacterial viruses) [ 38 ]. The RVDB provides a curated and a non-redundant subset of GenBank genome sequences, facilitating downstream bioinformatics analyses. The database provides two versions: an unclustered and a clustered version based on sequence similarity. We took the number of sequences available in the unclustered version as an estimate of the number of genomes (8,454,473), while we took the number of sequences available in the clustered version as an estimate of the number of species (1,348,976). Further, old versions of the database are available. Researchers can conveniently download all RVDB sequences in one file, although it should be noted that the large file size (approximately 20 GB) may result in longer download times.

The database is designed with simplicity in mind, offering user-friendly functionality. Additionally, the database provides a BLAST tool for performing sequence searches against different versions of the RVDB, further enhancing its usability.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i021.jpg

The Virus Orthologous Groups Database ( VOGDB ) is an automatically updated database that provides virus protein family sequences derived from RefSeq virus genomes. This provides a comprehensive representation of viral protein families as virus orthologous groups (VOG) for comparative virus (meta-)genomics. The VOGDB release vog218 contains 38,109 VOGs derived from 610,152 protein sequences (self-reported at https://vogdb.org/reports/release_stats (accessed on 7 August 2023)) from 11,133 species (estimate extrapolated from the number of species in the corresponding NCBI Refseq release 218), allowing for multiple assignments of the same sequence to different VOGs. While VOGDB currently supports searching for VOGs and provides taxonomic information, the direct downloading of a single VOG is not available. Instead, users can access fileshare platforms, or choose from 11 different (compressed) file formats for their downloads, which may be slightly disorganized. Surprisingly, there have been no publications published by the creators of VOGDB to date.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i022.jpg

The Virxicon is a centralized knowledge base, gathering information about viruses and their associated sequences [ 39 ]. Virxicon is a database that maintains the ICTV virus taxonomy, incorporating virus genome sequences from the NCBI Viral Genomes database and GenBank , and annotating them based on the Baltimore classification system. The database comprises a total of 599,538 genome sequences (the website statistics were not retrievable for the numbers of families, genera or species represented). In their research paper, the authors compare Virxicon with other databases, such as ViralZone , NCBI Virus , and ViPR (now BV-BRC ), aiming to combine the strengths of these databases. Virxicon facilitates the bulk download of virus genome sequences with searchable, well-curated metadata, namely Baltimore class, molecular types, and topological resources. However, it is our impression that the database does not provide unique functionality compared to other virus databases. NCBI Virus and BV-BRC provide a larger number of sequences and more extensive functionality related to sequences, including search and tools, while ViralZone serves as a more comprehensive lexicon, including virus sequence download and curated simple metadata. The Virxicon website offers an intuitive and user-friendly interface, providing search and easy access to information.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i023.jpg

The ZOVER , a comprehensive database of zoonotic and vector-borne viruses, aims to integrate virological, ecological, and epidemiological information to enhance understanding of animal-associated viruses and their significant impact on human and animal health [ 40 , 41 , 42 ]. ZOVER is a valuable resource, offering a curated subset of NCBI GenBank data, manually collected from the published literature, focused on four specific hosts: bats, rodents, mosquitoes, and ticks. ZOVER was merged from the Database of Bat-associated Viruses and Database of Rodent-associated Viruses. The ZOVER database includes 64,289 gene and genome sequences from 135 genera, combining both protein and nucleotide sequences, making it challenging to differentiate them individually. ZOVER presents data in a well-organized, visualized and user-friendly manner, providing a comprehensive and visually appealing platform for accessing information. ZOVER offers a valuable tool for researchers in the field, as it provides curated and easily accessible data, enhances data visualization, and offers a user-friendly interface for efficient exploration and analysis. Users can easily navigate the database using taxonomy-based searches or various search options, including sequence based, text based or region based.

2.3. Omics Databases

The emergence of databases dedicated to -omics data and analyses represents a remarkable advancement in the field of virology. These specialized resources go beyond traditional databases, providing a next-level platform for researchers to delve into the vast realm of -omics datasets and unlock hidden viral treasures. By focusing on -omics data, which encompass various -‘omics’ disciplines, such as genomics, metagenomics, transcriptomics, and proteomics, these databases offer a comprehensive view of the viral world at a molecular level. These databases serve as central hubs for storing, organizing, and analyzing -omics datasets, enabling researchers to explore uncharted territories and uncover previously unknown virus species.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i024.jpg

The online platform The Integrated Microbial Genomes/Virus ( IMG/VR ) provides its own geNomad analysis workflow, with which IMG/VR systematically identifies viral sequences from user-contributed and publicly available datasets, providing researchers with a comprehensive collection of uncultivated virus genomes [ 43 , 44 ] with different levels of confidence for download and analysis. The resource incorporates data from the metagenomic and metatranscriptomic JGI database IMG/M , RefSeq database, and three specific virus databases, while enhancing the annotation process with genome quality estimation, up-to-date taxonomic classification, and microbial host taxonomy prediction. IMG/VR offers users a comprehensive platform with abundant information, analysis tools, and links to sub-databases, including detailed meta-information and statistics for each virus. However, for us, its navigation and accessibility pose challenges, necessitating substantial time investment for users to become acquainted with its features. The database contains an impressive collection of 15,677,623 vGenomes (equivalent to number of nucleotides), organized into 9,169,185 viral operational taxonomic units (vOTUs, equivalent to number of species) across various viral families and genera. Despite its importance in the study of uncultivated viruses (UViGs), users should be mindful of the complexity of IMG/VR and its lack of user friendliness, requiring a login for full functionality and demanding considerable effort to effectively explore and utilize all available features.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i025.jpg

The Multi-omics Portal of Virus Infection ( MVIP ) collects and analyzes virus infection-related high-throughput sequencing data, integrating comprehensive meta-information [ 45 ]. It enables -omics data analysis and visualization, presenting a summary table of samples for specific tissues and viruses. Users can access detailed datasets, including differential expression, pathway enrichment, and alternative splicing, which are downloadable. MVIP provides external resource links and allows user submissions for broader analyses and database enhancement. MVIP offers valuable information and analysis for specific biosamples, driving advancements in the understanding of virus infection, and provides users with the opportunity to suggest biosamples for integration. Currently, MVIP boasts a dataset comprising approximately 6586 sequencing samples derived from 77 distinct viruses, such as SARS-CoV-2, SARS-CoV, dengue virus (DENV), Zika virus (ZIKV), and Influenza A Virus (IAV), across 33 host species, including Homo sapiens and Mus musculus . MVIP is a visually appealing database that provides comprehensive -omics data analysis capabilities, serving as both a resource for analyzing existing data and a knowledge base for researchers conducting their own sequencing projects, offering insights into the availability of suitable datasets for specific research questions, despite occasional short loading delays.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i026.jpg

The Viral Host Range Database ( VHRdb ) is a unique resource that consolidates experimental data on the range of hosts that a virus can infect [ 46 ]. Despite the wealth of host-range experiments conducted in laboratories, these valuable data are often inaccessible and underutilized. The VHRdb is an online platform that centralizes experimental data on viral host ranges, allowing users to browse, upload, analyze, and visualize the results. Currently, it contains 17,170 interactions between 776 viruses and 2041 hosts from 20 datasets. Among the 776 viruses in the VHRdb , 303 are linked to the NCBI , representing 279 species from 25 families. The comprehensive overview of virus–host interactions is presented in a visually appealing table, categorizing the relationships into “No infection”, “Intermediate”, and “Infection”. The VHRdb provides extensive and helpful documentation, including quick-start guides, to assist users in navigating and utilizing the database effectively. However, a limitation of the VHRdb is its relatively limited representation of viruses, which are not evenly distributed across various viral families, relying heavily on available studies that may not provide comprehensive coverage. To mitigate this, users can upload their own data for public access or private use. Despite these limitations, the existing studies are visually appealing, allowing for straightforward interpretation and analysis.

2.3.1. Specific Databases

In addition to comprehensive databases, there are numerous virus-specific databases available. If one is working on a specific virus, it is worthwhile to explore specialized databases dedicated to that particular species or group. Here is a brief list of potential databases that primarily focus on a single virus species. One exception is the NCBI VVR database, which specifically addresses seven different viruses as mentioned earlier. For coronaviruses, we rely on the following databases: (1) GISAID , (2) COVID-19 Data Portal , and (3) Stanford Coronavirus Antiviral & Resistance Database ( COVDB ) [ 47 , 48 , 49 , 50 , 51 ]. For HIV, we have the following databases listed in Table 1 : (1) LANL HIV Database , (2) EuResist , (3) HIV Drug Resistance DB , and (4) PSD [ 52 , 53 , 54 , 55 , 58 ]. Due to our inability to access EuResit by the time of submission, the investigation could not be conducted as extensively as with other databases.

For Hepatitis B virus, the dedicated database is HBVdb [ 56 ]. And for papillomaviruses, we have the PapillomaVirus Episteme ( PaVE ) database [ 57 ].

2.3.2. Non-Viral Specific Databases

In addition to virus-specific databases, there exist numerous databases that are also important for virus research in the broader fields of biology and genomics. We would suggest also for interested users to keep an eye on initiatives, such as the Global Core Biodata Resources , which seek to identify invaluable, long-term resources for the life sciences.

UniProt [ 60 ] provides a vast collection of protein sequences and functional insights, including those from viral sources, enabling researchers to unravel the molecular mechanisms and biological functions of viruses. The Rfam database [ 61 ], widely recognized and utilized, encompasses RNA families with detailed sequence alignments, secondary structures, and covariance models, while the Pfam, now InterPro database serves as an extensively employed resource, offering multiple sequence alignments and hidden Markov models for protein families [ 62 ]. The NCBI houses additional non-virus-specific databases, such as the Gene Expression Omnibus , which serves as an international public repository for high-throughput functional genomic datasets, or Sequence Read Archive ( SRA ), a valuable resource that provides access to biological sequence data, fostering reproducibility and enabling new discoveries through dataset comparisons within the research community [ 63 ]. Of note is the new NCBI datasets browser (currently in beta version), which provides easy searchable access to different NCBI databases and NCBI Taxonomy via fact sheets. Kyoto Encyclopedia of Genes and Genomes ( KEGG ) is a comprehensive biological database that represents molecular networks and pathways, facilitates analysis of genomic data, and integrates drug labels and disease databases, making it one of the most widely used resources in the field [ 64 , 65 , 66 ]. The miRBase is the central repository for microRNA (miRNA) [ 67 ]. It enables users to search and browse entries representing hairpin and mature miRNA sequences. Entries can be retrieved by various criteria, and both sequence and annotation data are available for download. The database currently includes 320 precursors and 510 mature miRNAs related to viruses.

2.3.3. Other Databases

Additionally, there exist virus-related online platforms that link together pre-existing tools, databases, and datasets. These websites serve as valuable resources for researchers and practitioners seeking to leverage existing resources and foster collaboration within the scientific community. By linking together disparate resources, these platforms contribute to the dissemination and accessibility of scientific information, promoting the efficient utilization of available resources for further research and innovation. One example is the European Virus Bioinformatics Center ( EVBC ) website, on which a total of 275 entries are linked, sorted by software type (such as database, command-line tool, or similar), virus family, or functionality [ 68 , 69 ]. Another example is iVirus.us , which provides a platform to access 27 tools and 21 datasets [ 70 , 71 ].

2.3.4. FAIR Evaluation

Many virus databases aim to support the (re)use of virus data and enable processing using machine-learning methods. Both goals can be facilitated by adopting the FAIR principles. We therefore included an evaluation of FAIR properties in our database overview, using FAIR principles checklist . Where a virus database had a table featuring one virus per row, the entries were evaluated as research objects (please refer to the data sources of the FAIR evaluation of the databases in Table S5 ). Where available, a virus sequence was considered to be “data”. Note that some databases in the list were therefore excluded from the FAIR evaluation because of a lack of a comparable research object. The databases that did not have comparable research objects were NCBI Viral Genomes (due to being a central website linking to different resources) and the EuResist database (to which we did not have access by the time of submission). The FAIR scores are based on presence/absence for each of the checklist criteria as was done previously in the context of data deposition of nuclear magnetic resonance data [ 72 ]. The scores are out of four for the subcriteria in findability, accessibility and reusability, and are out of three for those of interoperability. A more complete description of the FAIR Principles checklist can be found in Figure S1 .

In general, the FAIR scores of the content of the active databases reviewed here (summarized in Table 1 and the full table available in Table S5 ) ranged from less FAIR for the smaller or older databases and more FAIR for the larger and newer databases. An important component of the findability score is the assignment of a database-given global and persistent identifier; while the large platforms such as BV-BRC and IMG/VR featured this, the smaller databases such as HBVdb often used an external id, e.g., the NCBI Accession ID or TaxIDs. This might be due to the differing aims of the virus databases, as some are focused on data reuse and machine-readability, while others may have simpler goals, such as cross linking available knowledge. Accessibility for the databases was generally positive owing to web-accessible links and straightforward download options (see also Table S3 ). Further, the overall low score for interoperability reflects the lack of standards for all virus metadata; while there exist clear ontologies, e.g., for clinical data (as for the HIV drug resistance DB ) or for pathogenic virus metadata (see the Genomic Standards Consortium ( GSC ) ), this is not yet the case for metadata for all viruses. This is currently a target for various groups, such as the GSC (which is responsible for the minimum information about sequencing standards that are used by the INSDC repositories), the Gene Ontology consortium, the Genomes Online Database ( GOLD ) which complements the IMG databases of the Joint Genome Institute JGI , and other efforts such as those of Bernasconi et al. with the viral conceptual model [ 73 , 74 ]. This shows that community-wide metadata standards are poised to improve interoperability in the near future. Last, the reusability of many of the virus databases would benefit from the inclusion of formal licenses describing the reuse of their data (see Choose A License ). Overall, this FAIR evaluation was a first for virus databases and highlighted several areas for improvement.

2.4. Catalogs of Databases

To assist users in selecting appropriate databases, scholarly journals and other entities have established catalogs that employ various criteria for indexing databases based on different criteria to improve their findability and accessibility. Here, we describe five catalogs of databases: (1) re3data.org , (2) FAIRsharing [ 23 ], (3) The Database Commons [ 24 ], (4) ELIXIR bio.tools [ 25 ], and (5) NAR database list [ 26 ] (see Figure 1 ). We analyzed a range of entries, narrowing down to virus-specific databases, categorizing them based on their up-to-date status and relevance to COVID-19, while excluding non-virus databases that did not meet the criteria.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-g001.jpg

Comparison of five catalogs content: (1) re3data.org , (2) FAIRsharing [ 23 ], (3) The Database Commons [ 24 ], (4) ELIXIR bio.tools [ 25 ], and (5) NAR database list [ 26 ]. Among all up-to-date virus-specific databases, they were categorized into three groups: inclusion in our curated Table 1 , exclusive focus on coronavirus (see Table S4 ), or non-corona-related databases mentioned in the text; see Section 2.4 .

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i027.jpg

The re3data.org website is a web-based registry that facilitates data discovery, access, and sharing for researchers. Its comprehensive metadata on data repositories allow researchers to identify repositories that align with their specific data management needs. The platform has a particular focus on the FAIR principles. There are 3125 entries on this platform, of which 2181 are databases or scientific and statistical data formats in terms of content types. Among them, there are 186 virus-related entries identified using the search term “virology”, of which only 24 are virus-specific, and 17 are considered up to date. Nine of these databases are extensively described in our curated Table 1 , seven are dedicated to coronavirus research (see Table S4 , and one database, namely WestNile.ca.gov , is excluded due to its narrow focus.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i028.jpg

The online platform FAIRsharing is designed to enhance the visibility of scientific data standards, databases, and policies for the scientific community. The platform includes a registry of data standards, databases, policies, collections, and organizations that detail each resource, such as its scope, history, and adoption status. In total, 3888 entries are listed in the registry, of which 2032 are repositories or knowledge bases. Among these, 112 are virus-related (identified using the keyword “virology”). However, only 62 of these resources are virus-specific, and only 41 are up-to-date. These 41 resources can be further classified into the 13 that are listed in our curated Table 1 , the 24 related to coronavirus data (see Table S4 ), and the 4 we excluded: (1) HIV Drug Interactions , (2) HEP Drug Interactions , (3) Global.health , and (4) HIV and COVID-19 Registry in Europe . These databases were excluded due to their restricted focus, such as focusing only on drug interactions of a particular virus or containing primarily epidemiological data, which did not align with our definition of a comprehensive virus database. Additionally, one of the databases resembled more of a network than a traditional database.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i029.jpg

The Database Commons is a curated catalog of biological databases that organize databases based on data type, species, and subject matter. It provides detailed metadata for each database, including name, URL, description, hosting institution, and contact information. Within the Database Commons , there are currently 5902 entries listed. Among them, 355 databases fall under the “Data Object” virus category. Of these, 146 are virus-specific, and 36 are considered up to date. These 36 databases can be further categorized as the 17 listed in our curated Table 1 , 16 coronavirus databases (see Table S4 ), and 3 other databases ( Disease Monitoring Dashboard , RID , and Virus-CKB ). The additional databases were excluded due to their specific nature, such as being more tool-oriented or containing limited data with only two tables rather than meeting the criteria of a comprehensive virus database.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i030.jpg

A comprehensive registry of bioinformatics resources is established through a community-driven curation effort supported by ELIXIR , a ( ELIXIR ) . ELIXIR bio.tools serves as the dedicated registry within this infrastructure, ensuring the sustainable upkeep of the curated information [ 25 ]. Collaborative curation, tailored to local needs and facilitated by a network of partners, enables the continuous development and accessibility of this valuable resource. In total, there are over 28,211 resources listed in the registry, including various tools. Among them are 3664 databases, and a search using the keyword “Virology” identifies 44 databases in this category. Out of these, 42 databases are virus-specific, with 11 being up-to-date. Eight of these virus-specific databases are included in our curated Table 1 . Additionally, we identified two up-to-date coronavirus-specific databases and one particular database, namely the United States Swine Pathogen Database , which we excluded.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-i031.jpg

To our knowledge, the Nucleic Acids Research Journal Database Summary Issue NAR is the oldest known list of databases. Published annually, it provides descriptions of new and updated databases that contain nucleic acid and protein sequences and structures [ 26 ]. The NAR provides the links for these databases at the Molecular Biology Database Collection . These databases are categorized into genomics, transcriptomics, proteomics, metabolomics, and structural biology. Presently, it includes a total of 1965 databases. Each database is described in detail, including its scope, content, features, relevant citations, and links to access the resource. The most recent issue from January 2023 lists 32 databases in the “virus genome database” category. Among them, 9 are considered up to date and are included in Table 1 .

In conclusion, despite the availability of database catalogs that assist researchers in finding relevant resources, there are still challenges and limitations to address. These catalogs lack virus-specific content and often do not reflect the current status or usability of the databases. Furthermore, there is a need for better metadata standardization and information on the reliability and quality of the databases. Although these catalogs serve as a starting point, they may not provide comprehensive and detailed information for researchers to make informed decisions about utilizing the databases effectively.

3. Evaluation of Errors in the NCBI and BV-BRC

Despite diligent curation, databases like the NCBI Nucleotide database often harbor errors, including those arising from user-generated data. These errors extend beyond user mistakes and stem from the need to adapt databases to rapidly evolving scientific fields like virus taxonomy. Viromics poses challenges, such as the absence of a universal viral gene, the facilitation of horizontal gene transfer, and the need for specific data models and standards. Addressing these challenges requires specialized protocols for RNA and DNA viruses and mitigating experimental biases related to enrichment methods [ 75 ]. As user-friendly pipelines for comparative genomics become more prevalent, the quality of viral sequences from databases used as input becomes crucial for reliable and accurate bioinformatic analyses. Incorrect input data can undermine the validity of downstream results, regardless of the pipeline employed. Therefore, it is essential to critically scrutinize and validate the outputs obtained from these pipelines, mainly when errors exist in the utilized databases. Taking NCBI and BV-BRC as an illustrative example, it is important to acknowledge the various types of errors that can occur in databases, namely (1) taxonomy errors, (2) naming and labeling errors, (3) missing information, (4) sequences errors, (5) wrong orientation, and (6) chimeric sequences.

3.1. Taxonomy Errors

The NCBI Taxonomy [ 76 ] incorporates most of the ICTV entries, supplemented by a number of additional taxa; see Figure 2 . ICTV defines only approximately one-fifth of the species mentioned in NCBI . In rare cases, inconsistencies may occur, but they are typically resolved in subsequent updates. The higher number of species in the NCBI Virus database compared to the official ICTV count is primarily attributed to the inclusion of unclassified and unverified taxa. As outlined above, the ICTV serves as the authoritative source for virus taxonomy. Within the ICTV , new taxa are evaluated by an expert committee, and the taxonomic classification extends only up to the rank of species. More detailed subdivisions, such as subspecies or lineages, are not determined by the ICTV but are entered by the submitter to NCBI. TaxIDs are commonly used for taxonomic groups in databases like NCBI and UniProt but not in ICTV . The NCBI Virus database houses around 53,000 virus species, with nearly 1.5% having more than one TaxID assigned (e.g., Lomovskaya virus with 6 TaxIDs); see Figure 2 . Multiple TaxIDs in NCBI for certain viruses result from the ongoing refinement of virus classification, including species mergers and new TaxID assignments. An additional challenge arises in cases where assigning two TaxIDs to a specific sequence is needed as seen in studies involving integration sites, where a sequence represents both the virus and the host [ 77 ]. Implementing a mechanism to accommodate such dual assignments would better reflect the intricacies of these scenarios.

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-g002.jpg

Comparison of the ICTV or NCBI Taxonomy rank names highlighting the existence of multiple names and TaxIDs. ( Left ): The Venn diagram depicts the number of unique names for virus taxonomic ranks in the ICTV or NCBI Taxonomy , or those which occur in both databases for the sum of all taxonomic ranks as well as for the family, genus and species rank names. ( Right ): The virus species names shared between both the ICTV and NCBI Taxonomy are listed on the right panel. For these shared 9665 species names, we examined the occurrence of multiple names and TaxIDs. The y -axis is presented in a logarithmic scale. Entries with a value of 0 indicate no presence of additional names or TaxIDs.

3.2. Naming and Labeling Errors

Within the realm of virus labeling, an ongoing systematic error can be observed, where users label sequences as “complete genomes” despite the partial or complete absence of untranslated region (UTR) sequences [ 78 ], for example, the Hepatitis C virus sequence ( {"type":"entrez-nucleotide","attrs":{"text":"EU255989.1","term_id":"190684490","term_text":"EU255989.1"}} EU255989.1 ), even though the UTR sequences are missing. The widespread occurrence of this error is exemplified by the Hepatitis C virus in the BV-BRC , where a search for complete genomes yielded 3676 results. Upon closer examination, 69 specific sequences did not meet the expected length of 8500 bp, indicating that these are incomplete genomes.

The length of the virus genomes alone is not sufficient to demonstrate the extent of the problem. To assess the prevalence, a blastn (version: 2.5.0, E-value 10 − 4 ) search was conducted on the 3676 listed complete Hepatitis C virus sequences using representative 5′UTR sequences, revealing that only approximately 80% of the sequences contain the conserved 5′UTR. Inconsistency in the usage of completeness terminology across databases is another issue. When examining all sequences labeled as complete in the NCBI Virus database, it was discovered that 1.95% of them are classified differently in terms of completeness in the BV-BRC database.

Incorrect metadata can extend beyond the completeness metadata field as exemplified by the case of sequence {"type":"entrez-nucleotide","attrs":{"text":"AJ000888.1","term_id":"2832719","term_text":"AJ000888.1"}} AJ000888.1 . Here, the “source” field is incorrectly identified as Hepacivirus hominis despite being of human origin.

Another important field containing errors is the “organism” field, which is used by many secondary databases. Differences in this field mainly result from historical changes or typos. Virus names are chosen with the most current knowledge available with each release of the ICTV taxonomy. Ongoing changes to the virus taxonomy mean that the corresponding names in the NCBI are updated yearly with the ICTV taxonomy. Approximately 15% of virus species described in NCBI Taxonomy have multiple names, with the virus species Gallid alphaherpesvirus 2 having the most additional names at 16. These include previous official names, common names and different spellings/punctuation. Table S6 lists different types of submission and naming errors. Possible contributions to the presence of multiple names of virus species could be the lack of best practices for naming virus species and typos upon submission, which are not curated. Due to the relatively low volumes of sequences deposited in the past, best practices were not needed; however, this is becoming a priority with increasing amounts of deposited data [ 79 ]. With every sequence upload, potential new errors may be added, e.g., by filling the organism field incorrectly.

The naming of fasta headers can also contribute to confusion. Sequences can contain cryptic names (e.g., {"type":"entrez-nucleotide","attrs":{"text":"JB021961.1","term_id":"475866828","term_text":"JB021961.1"}} JB021961.1 -Sequence 12 from Patent EP2495325, {"type":"entrez-nucleotide","attrs":{"text":"A12995.1","term_id":"492939","term_text":"A12995.1"}} A12995.1 -Fragment Ba131, or {"type":"entrez-nucleotide","attrs":{"text":"E04227.1","term_id":"2172430","term_text":"E04227.1"}} E04227.1 -cDNA to satellite RNA). This can cause difficulties in forward analysis. A more user-friendly alternative is implemented in NCBI Virus , where the user can build the name of the sequence from predefined properties independently (e.g., accession, species, and length of sequence).

3.3. Missing Information

To maximize the utility of genomic sequences for various purposes, it is essential to collect metadata on the properties of the pathogen and make them available in organized, clear, and consistent formats. Several studies have focused on identifying the necessary minimum of metadata [ 20 , 80 ]. In this specific case, the variation among publications and their focus on different types of data make it challenging to reach a clear consensus. Nonetheless, we propose four metadata groups to consider: collection attributes (year, source, country, and host), database crosslinks ( GenBank accession, taxon linage ID, and publication), species variations (lineage, strain, and subtype), and sequence information (segment information, genome quality, and genome completeness status).

Almost a quarter (28.57%) of the 9,763,946 genomes/segments described in the BV-BRC are missing more than half of the described metadata above. Astonishingly, for only 68.12% of the sequences, lineage information is provided (see Table S7 for detailed findings). The annotation of features, such as genes, UTRs, and CDSs, also plays a role and can be erroneous or missing. This is exemplified by the case of sequence {"type":"entrez-nucleotide","attrs":{"text":"CS179664.1","term_id":"110290706","term_text":"CS179664.1"}} CS179664.1 , a Hepacivirus hominis sequence, where the feature annotations are found to be entirely missing.

To counteract missing or incorrect metadata, several guides and tools are available to help explain how to submit data to the INSDC repositories (see Submitting Data to ENA and NCBI GenBank Submissions , the NCBI Submission Help Page and the NCBI Virus Submission Help Page ) [ 81 , 82 , 83 ]. Relevant information, such as sample collection, sequencing methodology, and bioinformatic procedures, should be noted [ 84 , 85 , 86 , 87 ]. Assembly strategies have been shown to significantly affect the resulting sequences, emphasizing the importance of including this information [ 84 , 85 , 86 , 87 ]. Guidelines are available to help ensure verification, addressing the issue of missing or incorrect metadata [ 81 ].

3.4. Sequence Errors

Likewise, nucleotide or protein sequences in NCBI and other databases can contain errors; see Figure 3 .

An external file that holds a picture, illustration, etc.
Object name is viruses-15-01834-g003.jpg

Various sequence-based errors. An artificial, correctly labeled viral sequence serves as an example of a golden standard sequence.

In addition to the challenge of differentiating sequencing errors from the impact of rapid viral evolution, in some cases, sequences lack even any meaningful sequence information. A striking illustration of this is observed in the sequence of 1PFI_C -Chain C, PF1 VIRUS STRUCTURE, which is composed of a solitary N nucleotide.

Furthermore, errors in (reference) sequences can have a cascading effect on subsequent sequences, e.g., during reference-based assemblies, potentially propagating inaccuracies throughout computational downstream analyses. These errors, combined with methodological challenges in genome assemblies, further emphasize the need for scrutiny and validation of genomic data to ensure the reliability of research findings [ 84 , 87 , 88 ]. Alternately, this serves as an extra measure of caution for users to perform a quality control check when conducting bioinformatics analyses using existing datasets.

3.5. Sequence Orientation Error

Viruses have diverse genomes and are classified into different Baltimore classes based on their genome. The NCBI default for user-uploaded virus sequences is the positive sense strand, which is counter intuitive, for example, for viruses in Baltimore class 5 (negative single-stranded viruses).

The uploading of sequences in the wrong orientation as seen in examples like the Orthomarburgvirus marburgense isolate sequence {"type":"entrez-nucleotide","attrs":{"text":"KU059750.1","term_id":"1020216250","term_text":"KU059750.1"}} KU059750.1 , leads to misinterpretation and further complications. This issue is exacerbated by the fact that many tools do not verify the correct orientation, resulting in nonsensical output that can misguide subsequent analyses. This issue extends to the annotation of functional units, including proteins, which are also provided in reverse order. To identify incorrectly uploaded sequences in terms of orientation, the ORF density was used, which refers to the number of open reading frames (ORFs) found on a particular strand. Out of the 3676 Hepatitis C virus genomes labeled as complete in the BV-BRC , a total of 205 sequences exhibited discrepancies in ORF density, indicating potential errors in their orientation. This highlights a systematic problem in the database.

3.6. Chimeric Sequences

Another type of error is the presence of chimeric sequences, where a portion of the sequence is derived from the virus, while another part originates from a non-viral source (e.g., the host). It is important to note that such chimeric sequences can arise due to biological factors or process errors, such as assembly mistakes. In extreme cases, this leads to thousands of hits being found in the host genome with a viral sequence, although the originating sequence part is not viral.

One example highlighting this issue is observed in the last 280 nucleotides of a specific Zika virus sequence {"type":"entrez-nucleotide","attrs":{"text":"KY766069","term_id":"1168020439","term_text":"KY766069"}} KY766069 . A comparative alignment between this sequence and the two other RefSeq Zika virus sequences clearly demonstrates that the 3′ end of {"type":"entrez-nucleotide","attrs":{"text":"KY766069","term_id":"1168020439","term_text":"KY766069"}} KY766069 does not originate from the Zika virus as illustrated in Figure S2 .

The Zika virus sequence ( {"type":"entrez-nucleotide","attrs":{"text":"KY766069","term_id":"1168020439","term_text":"KY766069"}} KY766069 ) exhibits a fragment of the AluSx repetitive element in its 3′ end, resulting in over 200,000 false positive hits in a blastn search (version: 2.5.0, E-value < 10 − 4 ) [ 89 ] on the human genome (hg38.p13). The inclusion of a human partial sequence within the Zika virus sequence is likely a result of a sequencing or assembly error. This highlights the impact that a single chimeric sequence within a dataset can have on subsequent results or outputs.

In summary, it is crucial to acknowledge the presence of errors in databases like the NCBI Nucleotide database to ensure reliable and accurate downstream analyses. Errors can arise from various factors, including taxonomy inconsistencies, naming and labeling errors, missing information, sequence errors, wrong orientation, and chimeric sequences. These errors can undermine the validity of downstream results, and they highlight the need for the critical scrutiny and validation of data. Addressing these errors is essential to maintain the integrity and reliability of virus databases for scientific research.

4. Outlook and Conclusions

Here, we provided a comprehensive assessment of active virus databases, defining these as any database last updated in 2022 or later which contains virus-related research data. Our list of 24 databases was compiled through an exhaustive search of active virus databases from two previous reviews of virus databases as well as five catalogs. For the first time, our review includes a thorough evaluation of database usability and contents—including the number of species and sequences contained therein—as well as a FAIRness comparison. We hope this overview will help guide prospective users of these databases. We refrain from suggesting a particular database for use because this highly depends on an individual researcher’s needs. For the knowledge databases that cover a broad spectrum of viruses, we provide a detailed overview and offer suggestions for their potential applications.

The content of the virus databases vary widely depending on the scope, number of data types and tools, and number of virus species. Here, we presented in detail 4 knowledge databases, 7 sequences databases, 3 -omics databases and 10 databases focusing on specific viruses. The databases feature a range of -omics datasets integrated and in combination with sampling, host, collection, environmental and other metadata. In terms of virus species represented, several are focused only on one or a few species (our so-called “specific virus databases”), while on the other end of the range, the large databases feature upwards of 1 million species. The virus databases also vary in terms of usability, with larger databases sometimes presenting a more complex user experience, in which it takes longer to orientate oneself, although some smaller databases could also improve their usability. In general, the databases we listed here are good in terms of findability and accessibility, but we found that community-wide metadata standard development and explicit listing of formal data usage licenses would improve interoperability and reusability. Future database reviews could include an evaluation of the accessibility of metadata standard definitions (in other words, descriptions of database fields) and connection to other databases (e.g., how well links to other databases are incorporated).

We found that researchers might encounter challenges when using existing catalogs of databases for virus-related databases due to limited virus-specific content and searchable metadata. To address this, efforts are ongoing to curate virus-specific database lists (as in the virus subsection of the NAR database list ) and to improve domain-specific metadata (which is a goal of re3data , FAIRsharing , the Database Commons and ELIXIR bio.tools ).

In part due to FAIRification, we expect that these database catalogs will only improve. We suggest that these catalogs can serve as a useful starting point for any researcher, which can complement curated collections, review articles and word of mouth within specific disciplines specifically for searching a particular database, for example, a particular virus or a certain data type. While finding the right database for one’s research needs may be challenging, using these existing resources is crucial for modern virus research, especially due to the high volume of multi-dimensional data available on viruses. We suggest that the landscape of virus databases be regularly evaluated, and for core virus databases to be included in at least university-level virus-related courses when relevant (e.g., NCBI Virus ).

Recent sequencing advancements and the growing interest in viruses within the field of virus bioinformatics have led to rapid changes in the virus database landscape. We illustrated this rapid development by referencing the reviews of Sharma et al. 2015 and Mcleod and Upton 2017 of virus databases and tools [ 21 , 22 ], of which only 22% and 23% of the virus databases listed in either review are still active.

Ensuring longevity for virus sequence databases includes FAIR principle-like criteria in addition to regular maintenance and updates, the creation of backups and archives, collaboration, funding, and trust, and usage by the community [ 17 , 18 ]. For databases, improving FAIRness could help to foster these content-related aspects and contribute to longevity. Moreover, funding plays a large role in the staying power of a database, which in turn is influenced by the database’s ease of use and content quality. Ensuring data and metadata quality is a key concern, and efforts are being made by teams at the INSDC repositories and other institutions to curate existing metadata. We underline the need for clear data submission guidelines and the inclusion of curated sequences together with the regular updating and removal of outdated or redundant sequences. Database content errors can arise from various factors, including taxonomy inconsistencies, naming and labeling errors, missing information, sequence errors, wrong orientation, and chimeric sequences, which can be attributed to either user input or inherent database discrepancies. These errors can undermine the validity of downstream results and highlight the need for the critical scrutiny and validation of data. Addressing these errors is essential to maintain the integrity and reliability of virus databases for scientific research.

In conclusion, the databases listed here represent the current knowledge of viruses, and the current review will help aid future users find databases of interest based on content, functionality, and scope. The use of virus databases is integral to gain new insights into the biology, evolution, and transmission of viruses, and develop new strategies to manage virus outbreaks and preserve global health.

Acknowledgments

The authors gratefully acknowledge Franziska Hufsky for helping with proofreading and formatting the manuscript. We would like to thank Sandra Triebel and Kevin Lamkiewicz for providing examples that were incorporated into the error Section 3 . We used ChatGPT (May 24 Version) to help write the starting material for the introduction.

Supplementary Materials

The following supporting information can be downloaded at https://www.mdpi.com/article/10.3390/v15091834/s1 , Figure S1: FAIR criteria; Figure S2: Zika virus; Table S1: Sharma review table; Table S2: McLeod review table; Table S3: Downloading from the databases; Table S4: List of other databases; Table S5: FAIR sources; Table S6: Multiple names; Table S7: BV-BRC table. References [ 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 , 109 , 110 , 111 , 112 , 113 , 114 , 115 , 116 , 117 , 118 , 119 , 120 , 121 , 122 , 123 , 124 , 125 , 126 , 127 , 128 , 129 , 130 , 131 , 132 , 133 , 134 , 135 , 136 , 137 , 138 , 139 , 140 , 141 , 142 , 143 , 144 , 145 , 146 , 147 , 148 , 149 , 150 , 151 , 152 , 153 ] are cited in the Supplementary Materials.

Funding Statement

This research was funded by the DFG grant “NFDI4Microbiota” number NFDI 28/1 (M.M., S.S. and N.A.C.); the TMWWDG grant “DigLeben” number 5575/10-9 TMWBDG (M.M.); scholarship from the Studienstiftung des deutschen Volkes (M.R.); the EU Horizon 2020 grant “VIROINF” number 955974 (M.M.); and the DFG grants “Aquadiva” number CRC 1076 (M.M.) and “Balance of the Microverse” number EXC 2051 (M.M.).

Author Contributions

Conceptualization, M.R., N.A.C. and M.M.; methodology, M.R. and N.A.C.; investigation, M.R., N.A.C. and S.S.; writing—original draft preparation, M.R. and N.A.C.; writing—review and editing, all; visualization, M.R. and S.S. All authors have read and agreed to the published version of the manuscript.

Data Availability Statement

Conflicts of interest.

N.A.C., S.S. and M.M. are in the beginning stages of developing a virus sequence database as part of the NFDI4Microbiota consortium.

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

research paper for computer virus

Journal of Computer Virology and Hacking Techniques

  • Explores viral and antiviral computer technologies.
  • Focuses on proactive defense against attacks.
  • Encourages a harmonious synthesis of scientific and hacking approaches.
  • Previously known as the Journal in Computer Virology.
  • Strives to publish technical and scientific results promoting constructive research.
  • Eric Filiol

research paper for computer virus

Latest issue

Volume 20, Issue 2

S.I : FoRSE 2021+ 2022 & RusCrypto 2022

Latest articles

Floodknight: an intelligent ddos defense scheme to combat attacks near attack entry points.

  • Neelam Dayal
  • Shashank Srivastava

research paper for computer virus

An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags

  • Sanjeev Kumar
  • Haider Banka
  • Surbhi Sharma

research paper for computer virus

Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends

  • Ekaterina Pleshakova
  • Aleksey Osipov
  • Athanasios Vasilakos

research paper for computer virus

Differences with high probability and impossible differentials for the KB-256 cipher

  • R. Astrakhantsev
  • I. Astrakhantseva

research paper for computer virus

Oblivion: an open-source system for large-scale analysis of macro-based office malware

  • Alessandro Sanna
  • Fabrizio Cara
  • Giorgio Giacinto

research paper for computer virus

Journal updates

Special issue guidelines.

Guidelines for proposals and paper submissions to JICV

Call for Papers: Special Issue on Russian Research in Artificial Intelligence for Cybersecurity

Guest editors:  Alisa M. Koreneva, Ekaterina S. Pleshakova Request for publication deadline:  September 30, 2022

Journal information

  • ACM Digital Library
  • EI Compendex
  • Emerging Sources Citation Index
  • Google Scholar
  • Japanese Science and Technology Agency (JST)
  • OCLC WorldCat Discovery Service
  • TD Net Discovery Service
  • UGC-CARE List (India)

Rights and permissions

Editorial policies

© Springer-Verlag France SAS, part of Springer Nature

  • Find a journal
  • Publish with us
  • Track your research

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

socsci-logo

Article Menu

research paper for computer virus

  • Subscribe SciFeed
  • Recommended Articles
  • Author Biographies
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Impacts of generative artificial intelligence in higher education: research trends and students’ perceptions.

research paper for computer virus

1. Introduction

2. materials and methods.

  • “Generative Artificial Intelligence” or “Generative AI” or “Gen AI”, AND;
  • “Higher Education” or “University” or “College” or “Post-secondary”, AND;
  • “Impact” or “Effect” or “Influence”.
  • Q1— Does GenAI have more positive or negative effects on higher education? Options (to choose one): 1. It has more negative effects than positives; 2. It has more positive effects than negative; 3. There is a balance between positive and negative effects; 4. Don’t know.
  • Q2— Identify the main positive effect of Gen AI in an academic context . Open-ended question.
  • Q3— Identify the main negative effect of Gen AI in an academic context . Open-ended question.

3.1. Impacts of Gen AI in HE: Research Trends

3.1.1. he with gen ai, the key role that pedagogy must play, new ways to enhance the design and implementation of teaching and learning activities.

  • Firstly, prompting in teaching should be prioritized as it plays a crucial role in developing students’ abilities. By providing appropriate prompts, educators can effectively guide students toward achieving their learning objectives.
  • Secondly, configuring reverse prompting within the capabilities of Gen AI chatbots can greatly assist students in monitoring their learning progress. This feature empowers students to take ownership of their education and fosters a sense of responsibility.
  • Furthermore, it is essential to embed digital literacy in all teaching and learning activities that aim to leverage the potential of the new Gen AI assistants. By equipping students with the necessary skills to navigate and critically evaluate digital resources, educators can ensure that they are prepared for the digital age.

The Student’s Role in the Learning Experience

The key teacher’s role in the teaching and learning experience, 3.1.2. assessment in gen ai/chatgpt times, the need for new assessment procedures, 3.1.3. new challenges to academic integrity policies, new meanings and frontiers of misconduct, personal data usurpation and cheating, 3.2. students’ perceptions about the impacts of gen ai in he.

  • “It harms the learning process”: ▪ “What is generated by Gen AI has errors”; ▪ “Generates dependence and encourages laziness”; ▪ “Decreases active effort and involvement in the learning/critical thinking process”.

4. Discussion

  • Training: providing training for both students and teachers on effectively using and integrating Gen AI technologies into teaching and learning practices.
  • Ethical use and risk management: developing policies and guidelines for ethical use and risk management associated with Gen AI technologies.
  • Incorporating AI without replacing humans: incorporating AI technologies as supplementary tools to assist teachers and students rather than replacements for human interaction.
  • Continuously enhancing holistic competencies: encouraging the use of AI technologies to enhance specific skills, such as digital competence and time management, while ensuring that students continue to develop vital transferable skills.
  • Fostering a transparent AI environment: promoting an environment in which students and teachers can openly discuss the benefits and concerns associated with using AI technologies.
  • Data privacy and security: ensuring data privacy and security using AI technologies.
  • The dynamics of technological support to align with the most suitable Gen AI resources;
  • The training policy to ensure that teachers, students, and academic staff are properly trained to utilize the potential of Gen AI and its tools;
  • Security and data protection policies;
  • Quality and ethical action policies.

5. Conclusions

  • Database constraints: the analysis is based on existing publications in SCOPUS and the Web of Science, potentially omitting relevant research from other sources.
  • Inclusion criteria: due to the early stage of scientific production on this topic, all publications were included in the analysis, rather than focusing solely on articles from highly indexed journals and/or with a high number of citations as recommended by bibliometric and systematic review best practices.
  • Dynamic landscape: the rate of publications on Gen AI has been rapidly increasing and diversifying in 2024, highlighting the need for ongoing analysis to track trends and changes in scientific thinking.

Author Contributions

Institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Akakpo, Martin Gameli. 2023. Skilled for the Future: Information Literacy for AI Use by University Students in Africa and the Role of Librarians. Internet Reference Services Quarterly 28: 19–26. [ Google Scholar ] [ CrossRef ]
  • AlAfnan, Mohammad Awad, Samira Dishari, Marina Jovic, and Koba Lomidze. 2023. ChatGPT as an Educational Tool: Opportunities, Challenges, and Recommendations for Communication, Business Writing, and Composition Courses. Journal of Artificial Intelligence and Technology 3: 60–68. [ Google Scholar ] [ CrossRef ]
  • Almaraz-López, Cristina, Fernando Almaraz-Menéndez, and Carmen López-Esteban. 2023. Comparative Study of the Attitudes and Perceptions of University Students in Business Administration and Management and in Education toward Artificial Intelligence. Education Sciences 13: 609. [ Google Scholar ] [ CrossRef ]
  • Al-Zahrani, Abdulrahman. 2023. The impact of generative AI tools on researchers and research: Implications for academia in higher education. Innovations in Education and Teaching International , 1–15. [ Google Scholar ] [ CrossRef ]
  • Athilingam, Ponrathi, and Hong-Gu He. 2023. ChatGPT in nursing education: Opportunities and challenges. Teaching and Learning in Nursing 19: 97–101. [ Google Scholar ] [ CrossRef ]
  • Álvarez-Álvarez, Carmen, and Samuel Falcon. 2023. Students’ preferences with university teaching practices: Analysis of testimonials with artificial intelligence. Educational Technology Research and Development 71: 1709–24. [ Google Scholar ] [ CrossRef ]
  • Bannister, Peter, Elena Alcalde Peñalver, and Alexandra Santamaría Urbieta. 2023. Transnational higher education cultures and generative AI: A nominal group study for policy development in English medium instruction. Journal for Multicultural Education . ahead-of-print . [ Google Scholar ] [ CrossRef ]
  • Bearman, Margaret, and Rola Ajjawi. 2023. Learning to work with the black box: Pedagogy for a world with artificial intelligence. British Journal of Educational Technology 54: 1160–73. [ Google Scholar ] [ CrossRef ]
  • Boháček, Matyas. 2023. The Unseen A+ Student: Evaluating the Performance and Detectability of Large Language Models in the Classroom. CEUR Workshop Proceedings 3487: 89–100. Available online: https://openreview.net/pdf?id=9ZKJLYg5EQ (accessed on 7 January 2024).
  • Chan, Cecilia Ka Yuk. 2023. A comprehensive AI policy education framework for university teaching and learning. International Journal of Educational Technology in Higher Education 20: 38. [ Google Scholar ] [ CrossRef ]
  • Chan, Cecilia Ka Yuk, and Wenjie Hu. 2023. Students’ voices on generative AI: Perceptions, benefits, and challenges in higher education. International Journal of Educational Technology in Higher Education 20: 43. [ Google Scholar ] [ CrossRef ]
  • Chan, Cecilia Ka Yuk, and Wenxin Zhou. 2023. An expectancy value theory (EVT) based instrument for measuring student perceptions of generative AI. Smart Learning Environments 10: 64. [ Google Scholar ] [ CrossRef ]
  • Chang, Daniel H., Michael Pin-Chuan Lin, Shiva Hajian, and Quincy Q. Wang. 2023. Educational Design Principles of Using AI Chatbot That Supports Self-Regulated Learning in Education: Goal Setting, Feedback, and Personalization. Sustainability 15: 12921. [ Google Scholar ] [ CrossRef ]
  • Chiu, Thomas. 2023. The impact of Generative AI (GenAI) on practices, policies and research direction in education: A case of ChatGPT and Midjourney. Interactive Learning Environments , 1–17. [ Google Scholar ] [ CrossRef ]
  • Chun, John, and Katherine Elkins. 2023. The Crisis of Artificial Intelligence: A New Digital Humanities Curriculum for Human-Centred AI. International Journal of Humanities and Arts Computing 17: 147–67. [ Google Scholar ] [ CrossRef ]
  • Cowling, Michael, Joseph Crawford, Kelly-Ann Allen, and Michael Wehmeyer. 2023. Using leadership to leverage ChatGPT and artificial intelligence for undergraduate and postgraduate research supervision. Australasian Journal of Educational Technology 39: 89–103. [ Google Scholar ] [ CrossRef ]
  • Crawford, Joseph, Carmen Vallis, Jianhua Yang, Rachel Fitzgerald, Christine O’Dea, and Michael Cowling. 2023a. Editorial: Artificial Intelligence is Awesome, but Good Teaching Should Always Come First. Journal of University Teaching & Learning Practice 20: 01. [ Google Scholar ] [ CrossRef ]
  • Crawford, Joseph, Michael Cowling, and Kelly-Ann Allen. 2023b. Leadership is needed for ethical ChatGPT: Character, assessment, and learning using artificial intelligence (AI). Journal of University Teaching & Learning Practice 20: 02. [ Google Scholar ] [ CrossRef ]
  • Currie, Geoffrey. 2023a. A Conversation with ChatGPT. Journal of Nuclear Medicine Technology 51: 255–60. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Currie, Geoffrey. 2023b. GPT-4 in Nuclear Medicine Education: Does It Outperform GPT-3.5? Journal of Nuclear Medicine Technology 51: 314–17. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Currie, Geoffrey, and Kym Barry. 2023. ChatGPT in Nuclear Medicine Education. Journal of Nuclear Medicine Technology 51: 247–54. [ Google Scholar ] [ CrossRef ]
  • Currie, Geoffrey, Clare Singh, Tarni Nelson, Caroline Nabasenja, Yazan Al-Hayek, and Kelly Spuur. 2023. ChatGPT in medical imaging higher education. Radiography 29: 792–99. [ Google Scholar ] [ CrossRef ]
  • Dai, Yun, Ang Liu, and Cher P. Lim. 2023. Reconceptualizing Chatgpt and Generative AI as a Student-driven Innovation in Higher Education. Procedia CIRP Volume 119: 84–90. [ Google Scholar ] [ CrossRef ]
  • Dogru, Tarik, Nathana Line, Lydia Hanks, Fulya Acikgoz, Je’Anna Abbott, Selim Bakir, Adiyukh Berbekova, Anil Bilgihan, Ali Iskender, Murat Kizildag, and et al. 2023. The implications of generative artificial intelligence in academic research and higher education in tourism and hospitality. Tourism Economics 30: 1083–94. [ Google Scholar ] [ CrossRef ]
  • Duong, Cong Doanh, Trong Nghia Vu, and Thi Viet Nga Ngo. 2023. Applying a modified technology acceptance model to explain higher education students’ usage of ChatGPT: A serial multiple mediation model with knowledge sharing as a moderator. The International Journal of Management Education 21: 100883. [ Google Scholar ] [ CrossRef ]
  • Eager, Bronwyn, and Ryan Brunton. 2023. Prompting Higher Education Towards AI-Augmented Teaching and Learning Practice. Journal of University Teaching & Learning Practice 20: 5. [ Google Scholar ] [ CrossRef ]
  • Elkhodr, Mahmoud, Ergun Gide, Robert Wu, and Omar Darwish. 2023. ICT students’ perceptions towards ChatGPT: An experimental reflective lab analysis. STEM Education 3: 70–88. [ Google Scholar ] [ CrossRef ]
  • Farrelly, Tom, and Nick Baker. 2023. Generative Artificial Intelligence: Implications and Considerations for Higher Education Practice. Education Sciences 13: 1109. [ Google Scholar ] [ CrossRef ]
  • Farrokhnia, Mohammadreza, Seyyed Banihashem, Seyyed Kazem Banihashem, Omid Noroozi, and Arjen Wals. 2023. A SWOT analysis of ChatGPT: Implications for educational practice and research. Innovations in Education and Teaching International 61: 460–74. [ Google Scholar ] [ CrossRef ]
  • Gong, Furong. 2023. The Impact of Generative AI like ChatGPT on Digital Literacy Education in University Libraries. Documentation, Information & Knowledge 40: 97–106, 156. [ Google Scholar ] [ CrossRef ]
  • Han, Bingyi, Sadia Nawaz, George Buchanan, and Dana McKay. 2023. Ethical and Pedagogical Impacts of AI in Education. In Artificial Intelligence in Education . Edited by Ning Wang, Genaro Rebolledo-Mendez, Noboru Matsuda, Olga Santos and Vania Dimitrova. Lecture Notes in Computer Science. Cham: Springer, pp. 667–73. [ Google Scholar ] [ CrossRef ]
  • Hassoulas, Athanasios, Ned Powell, Lindsay Roberts, Katja Umla-Runge, Laurence Gray, and Marcus J. Coffey. 2023. Investigating marker accuracy in differentiating between university scripts written by students and those produced using ChatGPT. Journal of Applied Learning and Teaching 6: 71–77. [ Google Scholar ] [ CrossRef ]
  • Hernández-Leo, Davinia. 2023. ChatGPT and Generative AI in Higher Education: User-Centered Perspectives and Implications for Learning Analytics. CEUR Workshop Proceedings , 1–6. Available online: https://ceur-ws.org/Vol-3542/paper2.pdf (accessed on 7 January 2024).
  • Hidayat-ur-Rehman, Imdadullah, and Yasser Ibrahim. 2023. Exploring factors influencing educators’ adoption of ChatGPT: A mixed method approach. Interactive Technology and Smart Education . ahead-of-print . [ Google Scholar ] [ CrossRef ]
  • Ilieva, Galina, Tania Yankova, Stanislava Klisarova-Belcheva, Angel Dimitrov, Marin Bratkov, and Delian Angelov. 2023. Effects of Generative Chatbots in Higher Education. Information 14: 492. [ Google Scholar ] [ CrossRef ]
  • Javaid, Mohd, Abid Haleem, Ravi Pratap Singh, Shahbaz Khan, and Haleem Ibrahim. 2023. Unlocking the opportunities through ChatGPT Tool towards ameliorating the education system. Bench Council Transactions on Benchmarks, Standards and Evaluations 3: 100115. [ Google Scholar ] [ CrossRef ]
  • Kaplan-Rakowski, Regina, Kimberly Grotewold, Peggy Hartwick, and Kevin Papin. 2023. Generative AI and Teachers’ Perspectives on Its Implementation in Education. Journal of Interactive Learning Research 34: 313–38. Available online: https://www.learntechlib.org/primary/p/222363/ (accessed on 7 January 2024).
  • Karunaratne, Thashmee, and Adenike Adesina. 2023. Is it the new Google: Impact of ChatGPT on Students’ Information Search Habits. Paper presented at the European Conference on e-Learning (ECEL 2023), Pretoria, South Africa, October 26–27; pp. 147–55. [ Google Scholar ] [ CrossRef ]
  • Kelly, Andrew, Miriam Sullivan, and Katrina Strampel. 2023. Generative artificial intelligence: University student awareness, experience, and confidence in use across disciplines. Journal of University Teaching & Learning Practice 20: 12. [ Google Scholar ] [ CrossRef ]
  • Kohnke, Lucas, Benjamin Luke Moorhouse, and Di Zou. 2023. Exploring generative artificial intelligence preparedness among university language instructors: A case study. Computers and Education: Artificial Intelligence 5: 100156. [ Google Scholar ] [ CrossRef ]
  • Laker, Lauren, and Mark Sena. 2023. Accuracy and detection of student use of ChatGPT in business analytics courses. Issues in Information Systems 24: 153–63. [ Google Scholar ] [ CrossRef ]
  • Lemke, Claudia, Kathrin Kirchner, Liadan Anandarajah, and Florian Herfurth. 2023. Exploring the Student Perspective: Assessing Technology Readiness and Acceptance for Adopting Large Language Models in Higher Education. Paper presented at the European Conference on e-Learning, (ECEL 2023), Pretoria, South Africa, October 26–27; pp. 156–64. [ Google Scholar ] [ CrossRef ]
  • Limna, Pongsakorn, Tanpat Kraiwanit, Kris Jangjarat, and Prapasiri Klayklung. 2023a. The use of ChatGPT in the digital era: Perspectives on chatbot implementation. Journal of Applied Learning and Teaching 6: 64–74. [ Google Scholar ] [ CrossRef ]
  • Limna, Pongsakorn, Tanpat Kraiwanit, Kris Jangjarat, and Yarnaphat Shaengchart. 2023b. Applying ChatGPT as a new business strategy: A great power comes with great responsibility [Special issue]. Corporate & Business Strategy Review 4: 218–26. [ Google Scholar ] [ CrossRef ]
  • Lopezosa, Carlos, Carles Lluís Codina, Carles Pont-Sorribes, and Mari Vállez. 2023. Use of Generative Artificial Intelligence in the Training of Journalists: Challenges, Uses and Training Proposal. Profesional De La información Information Professional 32: 1–12. [ Google Scholar ] [ CrossRef ]
  • Martineau, Kim. 2023. What Is Generative AI? IBM Research Blog . April 20. Available online: https://research.ibm.com/blog/what-is-generative-AI (accessed on 7 January 2024).
  • Mondal, Himel, Shaikat Mondal, and Indrashis Podder. 2023. Using ChatGPT for Writing Articles for Patients’ Education for Dermatological Diseases: A Pilot Study. Indian Dermatology Online Journal 14: 482–86. [ Google Scholar ] [ CrossRef ]
  • Moorhouse, Benjamin, Marie Alina Wan, and Yuwei Wan. 2023. Generative AI tools and assessment: Guidelines of the world’s top-ranking universities. Computers and Education Open 5: 100151. [ Google Scholar ] [ CrossRef ]
  • Overono, Acacia L., and Annie Ditta. 2023. The Rise of Artificial Intelligence: A Clarion Call for Higher Education to Redefine Learning and Reimagine Assessment. College Teaching , 1–4. [ Google Scholar ] [ CrossRef ]
  • Page, Matthew J., Joanne E. McKenzie, Patrick M. Bossuyt, Isabelle Boutron, Tammy C. Hoffmann, Cynthia D. Mulrow, Larissa Shamseer, Jennifer M. Tetzlaff, Elie A. Akl, Sue E. Brennan, and et al. 2021. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 372: n71. [ Google Scholar ] [ CrossRef ]
  • Pechenkina, Ekaterina. 2023. Artificial intelligence for good? Challenges and possibilities of AI in higher education from a data justice perspective. In Higher Education for Good: Teaching and Learning Futures . Edited by Laura Czerniewicz and Catherine Cronin. Cambridge, UK: Open Book Publishers, pp. 239–66. [ Google Scholar ] [ CrossRef ]
  • Perkins, Mike, Jasper Roe, Darius Postma, James McGaughran, and Don Hickerson. 2023. Detection of GPT-4 Generated Text in Higher Education: Combining Academic Judgement and Software to Identify Generative AI Tool Misuse. Journal of Academic Ethics 22: 89–113. [ Google Scholar ] [ CrossRef ]
  • Pitso, Teboho. 2023. Post-COVID-19 Higher Learning: Towards Telagogy, A Web-Based Learning Experience. IAFOR Journal of Education 11: 39–59. [ Google Scholar ] [ CrossRef ]
  • Plata, Sterling, Maria Ana De Guzman, and Arthea Quesada. 2023. Emerging Research and Policy Themes on Academic Integrity in the Age of Chat GPT and Generative AI. Asian Journal of University Education 19: 743–58. [ Google Scholar ] [ CrossRef ]
  • Rudolph, Jürgen, Samson Tan, and Shannon Tan. 2023a. War of the chatbots: Bard, Bing Chat, ChatGPT, Ernie and beyond. The new AI gold rush and its impact on higher education. Journal of Applied Learning and Teaching 6: 364–89. [ Google Scholar ] [ CrossRef ]
  • Rudolph, Jürgen, Samson Tan, and Shannon Tan. 2023b. ChatGPT: Bullshit spewer or the end of traditional assessments in higher education? Journal of Applied Learning and Teaching 6: 342–63. [ Google Scholar ] [ CrossRef ]
  • Ryall, Adelle, and Stephen Abblitt. 2023. “A Co-Pilot for Learning Design?”: Perspectives from Learning Designers on the Uses, Challenges, and Risks of Generative Artificial Intelligence in Higher Education. In People, Partnerships and Pedagogies. Proceedings ASCILITE 2023 . Edited by Thomas Cochrane, Vickel Narayan, Cheryl Brown, MacCallum Kathryn, Elisa Bone, Christopher Deneen, Robert Vanderburg and Brad Hurren. Christchurch: Te Pae Conference Center, pp. 525–30. [ Google Scholar ] [ CrossRef ]
  • Santiago, Cereneo S., Steve I. Embang, Ricky B. Acanto, Kem Warren P. Ambojia, Maico Demi B. Aperocho, Benedicto B. Balilo, Erwin L. Cahapin, Marjohn Thomas N. Conlu, Samson M. Lausa, Ester Y. Laput, and et al. 2023. Utilization of Writing Assistance Tools in Research in Selected Higher Learning Institutions in the Philippines: A Text Mining Analysis. International Journal of Learning, Teaching and Educational Research 22: 259–84. [ Google Scholar ] [ CrossRef ]
  • Solopova, Veronika, Eiad Rostom, Fritz Cremer, Adrian Gruszczynski, Sascha Witte, Chengming Zhang, Fernando Ramos López, Lea Plößl, Florian Hofmann, Ralf Romeike, and et al. 2023. PapagAI: Automated Feedback for Reflective Essays. In KI 2023: Advances in Artificial Intelligence. KI 2023 . Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cham: Springer, vol. 14236, pp. 198–206. [ Google Scholar ] [ CrossRef ]
  • Sridhar, Pragnya, Aidan Doyle, Arav Agarwal, Christopher Bogart, Jaromir Savelka, and Majd Sakr. 2023. Harnessing LLMs in Curricular Design: Using GPT-4 to Support Authoring of Learning Objectives. CEUR Workshop Proceedings 3487: 139–50. [ Google Scholar ]
  • Sullivan, Miriam, Andrew Kelly, and Paul McLaughlan. 2023. ChatGPT in higher education: Considerations for academic integrity and student learning. Journal of Applied Learning and Teaching 6: 31–40. [ Google Scholar ] [ CrossRef ]
  • Tominc, Polona, and Maja Rožman. 2023. Artificial Intelligence and Business Studies: Study Cycle Differences Regarding the Perceptions of the Key Future Competences. Education Sciences 13: 580. [ Google Scholar ] [ CrossRef ]
  • van den Berg, Geesje, and Elize du Plessis. 2023. ChatGPT and Generative AI: Possibilities for Its Contribution to Lesson Planning, Critical Thinking and Openness in Teacher Education. Education Sciences 13: 998. [ Google Scholar ] [ CrossRef ]
  • Walczak, Krzysztof, and Wojciech Cellary. 2023. Challenges for higher education in the era of widespread access to Generative AI. Economics and Business Review 9: 71–100. [ Google Scholar ] [ CrossRef ]
  • Wang, Ting, Brady D. Lund, Agostino Marengo, Alessandro Pagano, Nishith Reddy Mannuru, Zoë A. Teel, and Jenny Pange. 2023. Exploring the Potential Impact of Artificial Intelligence (AI) on International Students in Higher Education: Generative AI, Chatbots, Analytics, and International Student Success. Applied Sciences 13: 6716. [ Google Scholar ] [ CrossRef ]
  • Watermeyer, Richard, Lawrie Phipps, Donna Lanclos, and Cathryn Knight. 2023. Generative AI and the Automating of Academia. Postdigital Science and Education 6: 446–66. [ Google Scholar ] [ CrossRef ]
  • Wolf, Leigh, Tom Farrelly, Orna Farrell, and Fiona Concannon. 2023. Reflections on a Collective Creative Experiment with GenAI: Exploring the Boundaries of What is Possible. Irish Journal of Technology Enhanced Learning 7: 1–7. [ Google Scholar ] [ CrossRef ]
  • Yilmaz, Ramazan, and Fatma Gizem Karaoglan Yilmaz. 2023. The effect of generative artificial intelligence (AI)-based tool use on students’ computational thinking skills, programming self-efficacy and motivation. Computers and Education: Artificial Intelligence 4: 100147. [ Google Scholar ] [ CrossRef ]
  • Zawiah, Mohammed, Fahmi Y. Al-Ashwal, Lobna Gharaibeh, Rana Abu Farha, Karem H. Alzoubi, Khawla Abu Hammour, Qutaiba A. Qasim, and Fahd Abrah. 2023. ChatGPT and Clinical Training: Perception, Concerns, and Practice of Pharm-D Students. Journal of Multidisciplinary Healthcare 16: 4099–110. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

Selected Group of StudentsStudents Who Answered the Questionnaire
MFMF
1st year595342
2nd year365294
1st year393242
2nd year212152
CountryN.CountryN.CountryN.CountryN.
Australia16Italy2Egypt1South Korea1
United States7Saudi Arabia2Ghana1Sweden1
Singapore5South Africa2Greece1Turkey1
Hong Kong4Thailand2India1United Arab Emirates1
Spain4Viet Nam2Iraq1Yemen1
United Kingdom4Bulgaria1Jordan1
Canada3Chile1Malaysia1
Philippines3China1Mexico1
Germany2Czech Republic1New Zealand1
Ireland2Denmark1Poland1
CountryN.CountryN.CountryN.CountryN.
Singapore271United States15India2Iraq0
Australia187Italy11Turkey2Jordan0
Hong Kong37United Kingdom6Denmark1Poland0
Thailand33Canada6Greece1United Arab Emirates0
Philippines31Ireland6Sweden1Yemen0
Viet Nam29Spain6Saudi Arabia1
Malaysia29South Africa6Bulgaria1
South Korea29Mexico3Czech Republic0
China17Chile3Egypt0
New Zealand17Germany2Ghana0
CategoriesSubcategoriesNr. of DocumentsReferences
HE with Gen AI 15 ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ).
15 ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ).
14 ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ).
8 ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ).
Assessment in Gen AI/ChatGPT times 8 ( ); ( ); ( ); ( ); ( ); ( ); ( ); ( ).
New challenges to academic integrity policies 4 ( ); ( ); ( ); ( ).
Have You Tried Using a Gen AI Tool?Nr.%
Yes5246.4%
No6053.6%
Categories and Subcategories%Unit of Analysis (Some Examples)
1. Learning support:
1.1. Helpful to solve doubts, to correct errors34.6%
1.2. Helpful for more autonomous and self-regulated learning19.2%
2. Helpful to carry out the academic assignments/individual or group activities17.3%
3. Facilitates research/search processes
3.1. Reduces the time spent with research13.5%
3.2. Makes access to information easier9.6%
4. Reduction in teachers’ workload3.9%
5. Enables new teaching methods1.9%
Categories and Subcategories%Unit of Analysis (Some Examples)
1. Harms the learning process:
1.1. What is generated by Gen AI has errors13.5%
1.2. Generates dependence and encourages laziness15.4%
1.3. Decreases active effort and involvement in the learning/critical thinking process28.8%
2. Encourages plagiarism and incorrect assessment procedures17.3%
3. Reduces relationships with teachers and interpersonal relationships9.6%
4. No negative effect—as it will be necessary to have knowledge for its correct use7.7%
5. Don’t know7.7%
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Saúde, S.; Barros, J.P.; Almeida, I. Impacts of Generative Artificial Intelligence in Higher Education: Research Trends and Students’ Perceptions. Soc. Sci. 2024 , 13 , 410. https://doi.org/10.3390/socsci13080410

Saúde S, Barros JP, Almeida I. Impacts of Generative Artificial Intelligence in Higher Education: Research Trends and Students’ Perceptions. Social Sciences . 2024; 13(8):410. https://doi.org/10.3390/socsci13080410

Saúde, Sandra, João Paulo Barros, and Inês Almeida. 2024. "Impacts of Generative Artificial Intelligence in Higher Education: Research Trends and Students’ Perceptions" Social Sciences 13, no. 8: 410. https://doi.org/10.3390/socsci13080410

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

What Starts Here

   , ph.d. program, master's programs, portfolio program in robotics, admissions & incoming students, current students, online programs & degrees, master's degrees, student experience, brent waters and hovav shacham honored with test-of-time awards for pioneering cryptographic research.

Close up of UT Tower clock face with "Test of Time Award" text in bottom left corner.

UT Computer Science is proud to announce that Professors Brent Waters and Hovav Shacham have both been honored with the prestigious Test-of-Time Award by the International Association for Cryptologic Research (IACR).

Brent Waters

Brent Waters: Dual-System Encryption

Brent Waters was honored with the Test-of-Time Award for his groundbreaking paper, "Dual-System Encryption." The IACR's citation commends Waters "For introducing the dual-system technique, breaking through the partitioning-reductions barrier of pairing-based cryptography and enabling new and improved pairing-based cryptosystems." Published in 2009, this innovative work has had a profound and enduring impact on the field of cryptography by enabling more sophisticated and secure cryptographic systems.

Hovav Shacham

Hovav Shacham: Reconstructing RSA Private Keys from Random Key Bits

Hovav Shacham earned the Test-of-Time award for his influential 2009 paper, co-authored with Nadia Heninger from UC San Diego, titled "Reconstructing RSA Private Keys from Random Key Bits." The IACR's citation states, "For introducing the go-to tool for side-channel attacks on CRT-RSA that played a pivotal role in helping secure the Internet." This paper has been instrumental in developing techniques to protect against side-channel attacks, which are critical for the security of RSA encryption and, by extension, the overall security of the Internet.

Long-Term Impact and Recognition

The IACR Test of Time Award is a prestigious honor given annually at each of the three IACR general conferences: Asiacrypt, Crypto, and Eurocrypt. The award recognizes papers published 15 years prior that have had a lasting impact on the field of cryptography. This year, Brent Waters and Hovav Shacham's 2009 papers were acknowledged for their profound contributions and enduring influence. Their work has not only shaped current cryptographic techniques but continues to inspire ongoing research and development in the field.

Stanford Doerr School of Sustainability

  • Biodiversity
  • Cities & society
  • Land & water
  • All research news
  • All research topics
  • Learning experiences
  • Programs & partnerships
  • All school news
  • All school news topics
  • In the media
  • For journalists

Bronze Age technology could aid switch to clean energy

Stanford research finds the cost-effective thermal properties that make “firebricks” suitable for energy storage could speed up the world’s transition to renewable energy at low cost.

Bright orange furnace for iron manufacturing

Technology with roots going back to the Bronze Age may offer a fast and inexpensive solution to help achieve the United Nations climate goal of net zero emissions by 2050, according to recent Stanford-led research in PNAS Nexus .

The technology involves assembling heat-absorbing bricks in an insulated container, where they can store heat generated by solar or wind power for later use at the temperatures required for industrial processes. The heat can then be released when needed by passing air through channels in the stacks of “firebricks,” thus allowing cement, steel, glass, and paper factories to run on renewable energy even when wind and sunshine are unavailable.

These systems, which several companies have recently begun to commercialize for industrial heat storage, are a form of thermal energy storage. The bricks are made from the same materials as the insulating bricks that lined primitive kilns and iron-making furnaces thousands of years ago. To optimize for heat storage instead of insulation, the materials are combined in different amounts.

Batteries can store electricity from renewable sources and provide electricity to generate heat on demand. “The difference between firebrick storage and battery storage is that the firebricks store heat rather than electricity and are one-tenth the cost of batteries,” said lead study author Mark Z. Jacobson , a professor of civil and environmental engineering in the Stanford Doerr School of Sustainability and School of Engineering . “The materials are much simpler too. They are basically just the components of dirt.”

High heat storage

Many industries require high-temperature heat for manufacturing. Temperatures in factories need to reach at least 1,300 degrees Celsius (nearly 2,400 degrees Fahrenheit) to produce cement, and 1,000 C (about 1,800 F) or hotter for glass, iron, and steelmaking. Today, about 17% of all carbon dioxide emissions worldwide stem from burning fossil fuels to produce heat for industrial processes, according to Jacobson and co-author Daniel Sambor ’s calculations. Generating industrial heat from renewable sources could all but eliminate these emissions.

“By storing energy in the form closest to its end use, you reduce inefficiencies in energy conversion,” said Sambor, a postdoctoral scholar in civil and environmental engineering. “It’s often said in our field that ‘if you want hot showers, store hot water, and if you want cold drinks, store ice’; so this study can be summarized as ‘if you need heat for industry, store it in firebricks.’”

Substantial savings

The researchers set out to examine the impact of using firebricks to store most industrial process heat in 149 countries in a hypothetical future where each country has transitioned to wind, geothermal, hydropower, and solar for all energy purposes. The 149 countries are responsible for 99.75% of global carbon dioxide emissions from fossil fuels. “Ours is the first study to examine a large-scale transition of renewable energy with firebricks as part of the solution,” Jacobson said. “We found that firebricks enable a faster and lower-cost transition to renewables, and that helps everyone in terms of health, climate, jobs, and energy security.”

The team used computer models to compare costs, land needs, health impacts, and emissions involved in two scenarios for a hypothetical future where 149 countries in 2050 are using renewables for all energy purposes. In one scenario, firebricks provide 90% of industrial process heat. In the other, there’s zero adoption of firebricks or other forms of thermal energy storage for industrial processes. In the no-firebrick scenario, the researchers assumed heat for industrial processes would come instead from electric furnaces, heaters, boilers, and heat pumps, with batteries used to store electricity for those technologies.

The researchers found the scenario with firebricks could cut capital costs by $1.27 trillion across the 149 countries compared with the scenario with no firebrick storage, while reducing demand for energy from the grid and the need for energy storage capacity from batteries.

Clean energy for cleaner air

Solutions for accelerating the transition to clean energy are also connected to human health. Previous research has shown that air pollution from burning fossil fuels causes millions of early deaths each year. “Every bit of combustion fuels we replace with electricity reduces that air pollution,” Jacobson said. “And because there is a limited amount of money to transition at a high speed, the lower the cost to the overall system, the faster we can implement it.”

Jacobson has spent his career understanding air pollution and climate problems and developing energy plans for countries, states, and cities to solve these problems. But his focus on firebricks is relatively new, inspired by a desire to identify effective solutions that could be adopted quickly.

“Imagine if we propose an expensive and difficult method of transitioning to renewable electricity – we’d have very few takers. But, if this will save money compared with a previous method, it will be implemented more rapidly,” he said. “What excites me is that the impact is very large, whereas a lot of technologies that I’ve looked at, they have marginal impacts. Here I can see a substantial benefit at low cost from multiple angles, from helping to reduce air pollution mortality to making it easier to transition the world to clean renewables.”

Jacobson is also a senior fellow at the Stanford Woods Institute for the Environment and the Precourt Institute for Energy .

Sambor was funded by the Engineer Research and Development Center.

Media Contacts

Mark z. jacobson, josie garthwaite, explore more.

research paper for computer virus

Stanford’s Sustainability Accelerator adds new targets

The Sustainability Accelerator in the Stanford Doerr School of Sustainability will support work in new areas including energy, climate adaptation, industry, and more.

  • School planning

Landscape with wind turbines, rolling green fields, and water

New climate and sustainability research efforts will focus on eight ‘Solution Areas’

The Stanford Doerr School of Sustainability will establish new research initiatives under topics including climate, water, energy, food, nature, and cities.

research paper for computer virus

Solution Areas and research funding

A message from school leadership announcing solutions-oriented and scale-focused research funding opportunities to address pressing sustainability challenges.

Computer Virus Attack and Their Preventive Mechanisms: A Review

  • December 2021
  • International Journal of Technology
  • This person is not on ResearchGate, or hasn't claimed this research yet.

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

No full-text available

Request Full-text Paper PDF

To read the full-text of this research, you can request a copy directly from the authors.

  • Dalmo Stutz

Joaquim Teixeira de Assis

  • Ajay I. Patel

A.J. Vyas

  • Nilesh K. Patel

Solomon Sunday Oyelere

  • David M. Chess
  • Steve R. White
  • R. A. Grimes
  • Inform Manag Comput Secur

Joseph Wen

  • Shivaji Bahukhandi
  • Sandeep Singh Rana
  • Erick K Rotich
  • Metto Kimutai
  • Samoei K Daniel
  • Roshan Kumar
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

Grab your spot at the free arXiv Accessibility Forum

Help | Advanced Search

Computer Science > Robotics

Title: achieving human level competitive robot table tennis.

Abstract: Achieving human-level speed and performance on real world tasks is a north star for the robotics research community. This work takes a step towards that goal and presents the first learned robot agent that reaches amateur human-level performance in competitive table tennis. Table tennis is a physically demanding sport which requires human players to undergo years of training to achieve an advanced level of proficiency. In this paper, we contribute (1) a hierarchical and modular policy architecture consisting of (i) low level controllers with their detailed skill descriptors which model the agent's capabilities and help to bridge the sim-to-real gap and (ii) a high level controller that chooses the low level skills, (2) techniques for enabling zero-shot sim-to-real including an iterative approach to defining the task distribution that is grounded in the real-world and defines an automatic curriculum, and (3) real time adaptation to unseen opponents. Policy performance was assessed through 29 robot vs. human matches of which the robot won 45% (13/29). All humans were unseen players and their skill level varied from beginner to tournament level. Whilst the robot lost all matches vs. the most advanced players it won 100% matches vs. beginners and 55% matches vs. intermediate players, demonstrating solidly amateur human-level performance. Videos of the matches can be viewed at this https URL
Comments: v1, 29 pages, 19 main paper, 10 references + appendix
Subjects: Robotics (cs.RO)
Cite as: [cs.RO]
  (or [cs.RO] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

IMAGES

  1. ⇉Effect of Computer Virus Essay Example

    research paper for computer virus

  2. 💣 Essay on computer virus. Essay on Viruses and Their Effects on PC

    research paper for computer virus

  3. Intro To Computer Virus Essay

    research paper for computer virus

  4. The Computer Worm Virus Computer Science Essay Free Essay Example

    research paper for computer virus

  5. (PDF) Computer Virus Project II : Theoretical & Artistic Background

    research paper for computer virus

  6. (PDF) Computer Virus and Protection Methods Using Lab Analysis

    research paper for computer virus

VIDEO

  1. Eberhard Klempt: 50 Years of QCD

  2. Should You Read Research Paper As A COMPUTER SCIENCE Practitioner? #computerscience

  3. Matthew Hagan: Composite quantum simulations

  4. Computer Virus And Antivirus Essay In English

  5. There's a Computer Virus That Can Survive on Paper!

  6. Vladimir Dzhunushaliev: Quantization of Measure in Gravitation

COMMENTS

  1. (PDF) The Impact of Computer Virus

    This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products.

  2. 1653 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on COMPUTER VIRUS. Find methods information, sources, references or conduct a literature review on ...

  3. computer viruses Latest Research Papers

    This study aims to model the pattern of the spread of computer viruses. The method used in this research is the analytical method with the probability of mathematical immunity. Based on the analysis of the model, two equilibrium points free from disease E1 and endemic equilibrium points E2 were obtained.

  4. Computer viruses: What they are, how they work, how they ...

    A computer virus is a program that replicates itself and spreads to computers with the goal of disrupting or destroying normal computer use. In academic computing, viruses represent a serious problem that costs millions of dollars in losses annually and hinders the free exchange of information so critical to education. Viruses operate in incubation, infection, and destroy phases. The nature ...

  5. An introduction to computer viruses: Problems and solutions

    The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them. Discover the world's research 25+ million members

  6. An introduction to computer viruses: problems and solutions

    - The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention., - The author undertook an extensive study and review of the literature ...

  7. [1912.06510] Computer Viruses: The Abstract Theory Revisited

    Download PDF Abstract: Identifying new viral threats, and developing long term defences against current and future computer viruses, requires an understanding of their behaviour, structure and capabilities. This paper aims to advance this understanding by further developing the abstract theory of computer viruses. A method of providing abstract definitions for classes of viruses is presented ...

  8. Computer Virus Model with Stealth Viruses and Antivirus ...

    Computer viruses have the potential to wreak havoc on domestic and industrial computer networks by targeting and deleting important operational programs. Antivirus software is normally installed to detect and remove viruses from infected network computers. In recent times, the compartmental model approach commonly utilized to describe the dynamics of spread for biological viruses in a ...

  9. Computer Viruses, Computer Worms, and the Self-Replication ...

    Computer viruses are almost as old as computers themselves. The first technical paper about computer viruses appeared in 1984 and described a self-replicating computer program that reproduces and spreads automatically. The direct comparison and analogy-building between technical (computer) viruses and biologically effective viruses tempt us ...

  10. Viruses, Computer

    As high-tech devices such as the Internet of Things and wearable and smart speakers make their way into our lives, computer viruses continue to get closer and closer to us via IT systems. Fortunately, the necessary technology to detect and treat these viruses has improved significantly, and it has become more organized than ever before.

  11. Computer viruses: Theory and experiments

    22 Computer Viruses Theory and Experiments Fred Cohen Dept. of Computer Science and Electric Engineering, Lehigh University, Bethlehem, PA 18215, USA, and The Foundation for Computer Integrity Research, Pittsburgh, PA 15217, USA. This paper introduces "computer viruses" and examines their potential for causing widespread damage to computer systems.

  12. Technological Networks and the Spread of Computer Viruses

    Computer viruses and worms are an increasing problem throughout the world. By some estimates 2003 was the worst year yet: Viruses halted or hindered operations at numerous businesses and other organizations, disrupted cash-dispensing machines, delayed airline flights, and even affected emergency call centers. The Sobig virus alone is said to have caused more than $30 billion in damage (1). And ...

  13. Computer Virus Research Papers

    The term Virus was first published academically by Fred Cohen in 1984 in a scientific paper. Computer viruses have a way of working identical to biological viruses in general, so it's no wonder the naming of computer viruses takes the term biology. ... Computer virus programs are generally perceived to be a threat to the information stored by ...

  14. Computer Viruses

    This research paper starts with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of computer architecture and self organizing systems.

  15. (PDF) Computer viruses

    This paper presents a description of the major characteristics of disk and network borne viruses for the convenience of library and archival systems administrators.

  16. Computer Viruses: Principles of Exertion, Occurrence and Awareness

    Computer users, including students, home and corporate users, system administrators, corporate managers, and even the antivirus manufacturers. People with malefic intentions write the viruses to bother innocent users. Many sorts of viruses are boot sector viruses, file viruses, worms, Trojan horses, macro viruses, etc.

  17. Viruses: Impact on Science and Society

    Abstract. We examine the inter-relationships between viruses and human society. Following a short discussion of the etymology of the word "virus", we consider the mutual impact of viruses and science, including the relationship between technological developments and virus discovery, advances in other biomedical sciences gained through ...

  18. Navigating the Landscape: A Comprehensive Review of Current Virus

    The presence of multiple virus databases can be attributed to variations in specialization, data types, and aims. Some databases are created for a specific research purpose or to support a specific virus research area, e.g., virus ecology or epidemiology; alternately, some databases focus on specific viruses or cover a wide range of viruses.

  19. Home

    The Journal of Computer Virology and Hacking Techniques is dedicated to both the theoretical and experimental aspects of computer virology and hacking techniques. While the academic world focuses on scientific methodologies (conciseness, precision and rigor of the scientific method), the hacking world approach focuses primarily on achieving ...

  20. Viruses

    A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...

  21. [2407.21596] Evaluating SAM2's Role in Camouflaged Object Detection

    The Segment Anything Model (SAM), introduced by Meta AI Research as a generic object segmentation model, quickly garnered widespread attention and significantly influenced the academic community. To extend its application to video, Meta further develops Segment Anything Model 2 (SAM2), a unified model capable of both video and image segmentation. SAM2 shows notable improvements over its ...

  22. Computer Virus: Their Problems & Major at-tacks in Real Life

    This research paper highlights the phases of computer virus, History of computer virus, working of antivirus software, computer virus detection methods, and parameter for finding best antivirus ...

  23. Title: Wiping out the limitations of Large Language Models

    Computer Science > Information Retrieval ... Özge Sevgili, Martin Semman. View a PDF of the paper titled Wiping out the limitations of Large Language Models -- A Taxonomy for Retrieval Augmented Generation, by Mahei Manhai Li and 3 other authors. View PDF Abstract: Current research on RAGs is distributed across various disciplines, and since ...

  24. Social Sciences

    In this paper, the effects of the rapid advancement of generative artificial intelligence (Gen AI) in higher education (HE) are discussed. A mixed exploratory research approach was employed to understand these impacts, combining analysis of current research trends and students' perceptions of the effects of Gen AI tools in academia. Through bibliometric analysis and systematic literature ...

  25. UT computer science lab announces way to make short-form content more

    The UT computer science lab, with faculty member Amy Pavel and recent graduate Tess Van Daele at the forefront, has developed an AI system called ShortScribe to enhance accessibility for visually impaired users of short-form videos on platforms like TikTok and Instagram Reels. Pavel, an assistant computer science professor and co-author of the research paper, explained that the system utilizes ...

  26. Brent Waters and Hovav Shacham Honored with Test-of-Time Awards for

    Hovav Shacham: Reconstructing RSA Private Keys from Random Key Bits. Hovav Shacham earned the Test-of-Time award for his influential 2009 paper, co-authored with Nadia Heninger from UC San Diego, titled "Reconstructing RSA Private Keys from Random Key Bits." The IACR's citation states, "For introducing the go-to tool for side-channel attacks on CRT-RSA that played a pivotal role in helping ...

  27. Bronze Age technology could aid switch to clean energy

    Technology with roots going back to the Bronze Age may offer a fast and inexpensive solution to help achieve the United Nations climate goal of net zero emissions by 2050, according to recent Stanford-led research in PNAS Nexus.. The technology involves assembling heat-absorbing bricks in an insulated container, where they can store heat generated by solar or wind power for later use at the ...

  28. (PDF) Computer Viruses and Detection : A review

    Abstract. This paper reviews computer virus and few detection techniques. Computer viruses can wreak havoc to the operations of the computer. A computer virus is a type of malware that is ...

  29. Computer Virus Attack and Their Preventive Mechanisms: A Review

    This research paper highlights the phases of computer virus, computer virus, history of worst computer attack, type of computer virus with effect on computer & few examples of virus on their types ...

  30. Achieving Human Level Competitive Robot Table Tennis

    Achieving human-level speed and performance on real world tasks is a north star for the robotics research community. This work takes a step towards that goal and presents the first learned robot agent that reaches amateur human-level performance in competitive table tennis. Table tennis is a physically demanding sport which requires human players to undergo years of training to achieve an ...