Title :
Algorithms to isolation of logical and physical objects from malicious software
Author :
Kasimov, S.S. ; Rahmatov, D.N.
Abstract :
Given article describes algorithms to isolation of malicious software logical and physical objects of the system. As example logical object are used files. As example physical object are used sectors of the hard disk.
Keywords :
invasive software; hard disk; malicious software logical objects; malicious software physical objects; used files; used sectors; Hard disks; Software; Software algorithms; Malicious software; isolation; logical objects; physical objects;
Conference_Titel :
Application of Information and Communication Technologies (AICT), 2010 4th International Conference on
Conference_Location :
Tashkent
Print_ISBN :
978-1-4244-6903-1
Electronic_ISBN :
978-1-4244-6904-8
DOI :
10.1109/ICAICT.2010.5612018