Now showing items 1-2 of 2
Identifying stealth malware using CPU power consumption and learning algorithms
(Journal of Computer Security, 2018)
With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...
Cloud Forecasting: Legal Visibility Issues in Saturated Environments
(Computer Law & Security Review, 2018)
The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ...