MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
碩士 === 大同大學 === 通訊工程研究所 === 94 === Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and...
Main Authors: | Kaimin Lu, 呂開明 |
---|---|
Other Authors: | Chienhua Chen |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/53778078854660584970 |
Similar Items
-
Securing softswitches from malicious attacks
by: Opie, Jake Weyman
Published: (2007) -
An Approach to Detecting Malicious Information Attacks for Platoon Safety
by: Byungjin Ko, et al.
Published: (2021-01-01) -
Two Quarantine Models on the Attack of Malicious Objects in Computer Network
by: Bimal Kumar Mishra, et al.
Published: (2012-01-01) -
An Attack and a Defence in the Context of Hardware Security
by: Imeson, Frank
Published: (2013) -
Security to wireless sensor networks against malicious attacks using Hamming residue method
by: Majid Alotaibi
Published: (2019-01-01)