Abstract | ||
---|---|---|
In the past decade, commodity software applications have been deployed more than ever in almost every domain. Having the ability to differentiate the original trusted application at run-time from its compromised, mimic or trojanised versions would mitigate a broad range of intrusion threats to these applications. This has been addressed by application-level intrusion detection systems, however, su... |
Year | DOI | Venue |
---|---|---|
2019 | 10.1049/iet-ifs.2017.0629 | IET Information Security |
Keywords | Field | DocType |
operating systems (computers),security of data | System software,Intrusion,Abstraction,Computer science,Rootkit,Trusted application,Software,Computer hardware,Code injection attacks,Intrusion detection system | Journal |
Volume | Issue | ISSN |
13 | 1 | 1751-8709 |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Seyyedeh Atefeh Musavi | 1 | 0 | 0.68 |
Mahmoud Reza Hashemi | 2 | 131 | 27.70 |