Now showing items 1-2 of 2
Cloud Forecasting: Legal Visibility Issues in Saturated Environments
(Computer Law & Security Review, 2018)
The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ...
Identifying stealth malware using CPU power consumption and learning algorithms
(Journal of Computer Security, 2018)
With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...