Combating Malware Threat using Hybrid Security Model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rfid Security Threat Model

Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged goods, and promises cost reductions. The objective of this paper is to identify potential threats to commer...

متن کامل

A Novel Information Fusion Model for Assessment of Malware Threat

It is not only important for security analysts to judge some binary code is malicious or not, but also to understand the malware “what to do” and “what’s the impact it posed on our information system”. In this paper, we proposed a novel information fusion model to quantitate the threat of malware. The model consists of three levels: the decision making level information fusion, the attribute le...

متن کامل

Situation and Threat Refinement Approach for Combating the Asymmetric Threat

In order to combat the present and future asymmetric threats to national and international security, information fusion developments must progress beyond current Level 1 (Object Refinement) paradigms. By focusing on the challenges of Continuous Intelligence Preparation of the Battlespace (CIPB), Lockheed Martin Advanced Technology Laboratories (ATL) has begun to elicit an infrastructure and ena...

متن کامل

Integrated smart grid systems security threat model

The smart grid (SG) integrates the power grid and the Information and Communication Technology (ICT) with the aim of achieving more reliable and safe power transmission and distribution to the customers. Integrating the power grid with the ICT exposes the SG to systems security threats and vulnerabilities that could be compromised by malicious users and attackers. This paper presents a SG syste...

متن کامل

Using Contextual Security Policies for Threat Response

With the apparition of accurate security monitoring tools, the gathered alerts are requiring operators to take action to prevent damage from attackers. Intrusion prevention currently provides isolated response mechanisms that may take a local action upon an attack. While this approach has been taken to enhance the security of particular network access control points, it does not constitute a co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Intelligent Computing Research

سال: 2012

ISSN: 2042-4655

DOI: 10.20533/ijicr.2042.4655.2012.0032