Mitigating cloud computing security risks using a self-monitoring defensive scheme

S Mazur, E Blasch, Y Chen… - Proceedings of the 2011 …, 2011 - ieeexplore.ieee.org
Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and
data through the network. These services are made discoverable to the user in the form of …

System and method for defining and detecting pestware with function parameters

M Burtscher - US Patent 8,171,550, 2012 - Google Patents
6,804,780 6,813,711 6,829,654 6,910, 134 6,965,968 6,966,059 7,058,822 7,107,617
7,210,168 2002/0162015 2002fO166063 2003, OO65943 2003/0074581 2003/0101381 …

Large-scale reconfigurable virtual testbed for information security experiments

A Volynkin, V Skormin - … for the Development of Networks and …, 2007 - ieeexplore.ieee.org
The vulnerability of a modem computer network to information attacks stems from its high
complexity, global interconnectivity and multiple entry points. While experimental security …

[PDF][PDF] An Improved Process Supervision and Control Method for Malware Detection.

B Shamshirsaz, SA Asghari, MB Marvasti - Int. Arab J. Inf. Technol., 2022 - iajit.org
Most modern-day malware detection methods and algorithms are based on prior knowledge
of malware specifications. Discovering new malwares by solely relying on computer based …

A signature matching optimization policy for anti-virus programs

B Li, EG Im - 2011 3rd International Conference on Computer …, 2011 - ieeexplore.ieee.org
Virus signature library is key factor for performance of anti-virus programs considering
accuracy and scanning speed. To ensure coverage of various emerging viruses, the scale of …

[PDF][PDF] Behaviour Based Malware Detection

T Aubrey-Jones - Computer, 2007 - tristan.aubrey-jones.com
This article looks at the future of antivirus technology in IT security, discussing some of the
latest malware threats and counter developments. We specifically examine key …

[图书][B] Advanced methods for detection of malicious software

AS Volynkin - 2007 - search.proquest.com
This dissertation introduces a biologically inspired model of malicious software self-
replication called the Gene of Self-Replication (GSR). This model is utilized to facilitate …

[PDF][PDF] FINAL PERFORMANCE REPORT

R Sueet - Citeseer
Active inuiiune response i AIR i offer principles that could be successfully implemented in
defense mechanisms of computer networks of the nearest fumre: deceuualized …

Towards fully automatic defense mechanism for a computer network emulating active immune response

V Skormin, O Shiryayeva, A Tokhtabayev… - … Network Security: Fourth …, 2007 - Springer
Modern information attacks are perpetrated by the deployment of computer worms that
propagate extremely fast leaving little or no time for human intervention. This paper presents …

[引用][C] 基于行为的恶意程序检测

胡永涛, 陈亮, 郑宁, 郭艳华 - 计算机工程与应用, 2009