Now showing items 1-2 of 2
Improving host-based computer security using secure active monitoring and memory analysis
(Georgia Institute of Technology, 2010-06-03)
Thirty years ago, research in designing operating systems to defeat malicious software was very popular. The primary technique was to design and implement a small security kernel that could provide security assurances to ...
Reinforcing the weakest link in cyber security: securing systems and software against attacks targeting unwary users
(Georgia Institute of Technology, 2013-06-27)
Unwary computer users are often blamed as the weakest link on the security chain, for unknowingly facilitating incoming cyber attacks and jeopardizing the efforts to secure systems and networks. However, in my opinion, ...