2017
DOI: 10.5815/ijcnis.2017.10.03
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Security Scheme for Detecting System Vulnerabilities

Abstract: Abstract─With evolution of internet, security becomes a major concern. Number of malicious programs called malware, travels through network into systems. They have many advanced properties like self-hiding, selfhealing and stealth mode execution, which are hard to detect. Therefore, the major challenge for researchers today is to detect and mitigate such programs. Since there is a new virus implemented every minute no detection mechanism can be designed which gives 100% protection but by keeping the anti-virus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…The purpose of the paper, based on factor analysis [8], is to identify homogeneous groups of hybrid threats in the civil security sector, analyze the risk level of hybrid threats' spreading of related to crime; on the basis of correlation analysis [9] to determine the factors that shape the capabilities or vulnerabilities [10] to reduce the risk of illegal armed groups. Based on the linear regression [11] model, to assess the risk of the spread of the hybrid threat "activities of illegal armed groups", to identify priority factors of reduce this risk and to build an appropriate model and forecast.…”
Section: The Purpose Of the Papermentioning
confidence: 99%
“…The purpose of the paper, based on factor analysis [8], is to identify homogeneous groups of hybrid threats in the civil security sector, analyze the risk level of hybrid threats' spreading of related to crime; on the basis of correlation analysis [9] to determine the factors that shape the capabilities or vulnerabilities [10] to reduce the risk of illegal armed groups. Based on the linear regression [11] model, to assess the risk of the spread of the hybrid threat "activities of illegal armed groups", to identify priority factors of reduce this risk and to build an appropriate model and forecast.…”
Section: The Purpose Of the Papermentioning
confidence: 99%