DocumentCode :
2703308
Title :
Algorithms to isolation of logical and physical objects from malicious software
Author :
Kasimov, S.S. ; Rahmatov, D.N.
fYear :
2010
fDate :
12-14 Oct. 2010
Firstpage :
1
Lastpage :
3
Abstract :
Given article describes algorithms to isolation of malicious software logical and physical objects of the system. As example logical object are used files. As example physical object are used sectors of the hard disk.
Keywords :
invasive software; hard disk; malicious software logical objects; malicious software physical objects; used files; used sectors; Hard disks; Software; Software algorithms; Malicious software; isolation; logical objects; physical objects;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Application of Information and Communication Technologies (AICT), 2010 4th International Conference on
Conference_Location :
Tashkent
Print_ISBN :
978-1-4244-6903-1
Electronic_ISBN :
978-1-4244-6904-8
Type :
conf
DOI :
10.1109/ICAICT.2010.5612018
Filename :
5612018
Link To Document :
بازگشت