An Overview of Strategy Based Approaches in Combating Intrusion and Threats
Abstract
Keywords
Full Text:
PDFReferences
Manusankar.C, Ayyappadas.K, Rajendran.T and Karthik.S, “Strategy Based Approach for Combating Threats”, International Conference on Innovative Research in Engineering and Technology (iCIRET2010), at Park College of Engineering and Technology, August 12-14, 2010.
Bruschi. D, Martignoni. L, Monga. M, Using code normalization for fighting selfmutating malware. In: Proceedings of International Symosium
on Secure Software Engineering, IEE(March,2006) htpp://homes.dico.unimi.it/~monga/listpub.html.
Chien. E, "Techniques of adware and spyware" 2005, Proceedings of the Virus Bulletin International International Conference on Systems and Networks Communication. DOI.ieeecomputersociety.org/10.1109/ ICSNC.2006.62
Karthik. S., V.P. Arunachalam and R.M.Bhavdharini, 2008. Analyzing interaction between denial of service (dos) attacks and threats. Proceeding of the IEEE Int. Conf. on Computing, Communication and Networking(ICCCN 2008) 978-1-4244-3595-1/08/2008. DOI:10.1109/ICCCNET.2008.4787663
Manusankar. C, T.Rajendran and S.Karthik. " An Overview of the Challenges in Web Service to Indentifying and Removing Threats", Proceedings of International Conference On Innovative Computing Technologies(MKCE-ICICT 2010)
Naraine, R. "Microsoft says recovery from malware becoming impossible", eWeek.com, April 2006, http://www.eweek.com/article2 /0.1895,1945808,00.asp
Oreku, G.S.; Mtenzi, F.J.; Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on Digital Object Identifier: 10.1109/DASC.2009.51 Publication Year: 2009 , Page(s): 702 - 707.
Karthik.S, Dr.V.P.Arunachalam, Dr.T.Ravichandran, Dr.M.L.Valarmathi and Manusankar.C, “An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback Strategies”, International Conference on Advances in Information and Communication Technologies (ICT 2010), at Kochi September 07-08, 2010.
Manusankar.C, Rajendran.T and Karthik.S, ” An Overview of the Challenges in Detecting and Removing Installed Threats”, International Conference on Innovative Computing Technologies (ICICT 2010), at M. Kumarasami College of Engineering, February 12-13, 2010
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.