Mitigating cloud computing security risks using a self-monitoring defensive scheme
Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and
data through the network. These services are made discoverable to the user in the form of …
data through the network. These services are made discoverable to the user in the form of …
System and method for defining and detecting pestware with function parameters
M Burtscher - US Patent 8,171,550, 2012 - Google Patents
6,804,780 6,813,711 6,829,654 6,910, 134 6,965,968 6,966,059 7,058,822 7,107,617
7,210,168 2002/0162015 2002fO166063 2003, OO65943 2003/0074581 2003/0101381 …
7,210,168 2002/0162015 2002fO166063 2003, OO65943 2003/0074581 2003/0101381 …
Large-scale reconfigurable virtual testbed for information security experiments
A Volynkin, V Skormin - … for the Development of Networks and …, 2007 - ieeexplore.ieee.org
The vulnerability of a modem computer network to information attacks stems from its high
complexity, global interconnectivity and multiple entry points. While experimental security …
complexity, global interconnectivity and multiple entry points. While experimental security …
[PDF][PDF] An Improved Process Supervision and Control Method for Malware Detection.
B Shamshirsaz, SA Asghari, MB Marvasti - Int. Arab J. Inf. Technol., 2022 - iajit.org
Most modern-day malware detection methods and algorithms are based on prior knowledge
of malware specifications. Discovering new malwares by solely relying on computer based …
of malware specifications. Discovering new malwares by solely relying on computer based …
A signature matching optimization policy for anti-virus programs
B Li, EG Im - 2011 3rd International Conference on Computer …, 2011 - ieeexplore.ieee.org
Virus signature library is key factor for performance of anti-virus programs considering
accuracy and scanning speed. To ensure coverage of various emerging viruses, the scale of …
accuracy and scanning speed. To ensure coverage of various emerging viruses, the scale of …
[PDF][PDF] Behaviour Based Malware Detection
T Aubrey-Jones - Computer, 2007 - tristan.aubrey-jones.com
This article looks at the future of antivirus technology in IT security, discussing some of the
latest malware threats and counter developments. We specifically examine key …
latest malware threats and counter developments. We specifically examine key …
[图书][B] Advanced methods for detection of malicious software
AS Volynkin - 2007 - search.proquest.com
This dissertation introduces a biologically inspired model of malicious software self-
replication called the Gene of Self-Replication (GSR). This model is utilized to facilitate …
replication called the Gene of Self-Replication (GSR). This model is utilized to facilitate …
[PDF][PDF] FINAL PERFORMANCE REPORT
R Sueet - Citeseer
Active inuiiune response i AIR i offer principles that could be successfully implemented in
defense mechanisms of computer networks of the nearest fumre: deceuualized …
defense mechanisms of computer networks of the nearest fumre: deceuualized …
Towards fully automatic defense mechanism for a computer network emulating active immune response
V Skormin, O Shiryayeva, A Tokhtabayev… - … Network Security: Fourth …, 2007 - Springer
Modern information attacks are perpetrated by the deployment of computer worms that
propagate extremely fast leaving little or no time for human intervention. This paper presents …
propagate extremely fast leaving little or no time for human intervention. This paper presents …