Search
Now showing items 1-2 of 2
Cloud Forecasting: Legal Visibility Issues in Saturated Environments
(Computer Law & Security Review, 2018)
The advent of cloud computing has brought the computing power of corporate data pro-
cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers
enjoy the convenience of personal devices ...
Identifying stealth malware using CPU power consumption and learning algorithms
(Journal of Computer Security, 2018)
With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to
individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...