Sciweavers

2 search results - page 1 / 1
» Lurking in the Shadows: Identifying Systemic Threats to Kern...
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
13 years 11 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 4 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan