Evasive Security Using ACLs on Threads Using firewall-like rules to prevent malware
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
This document describes a new architecture for security systems, which greatly improves system performance and at the same time enforces veritable security to it. Conventional anti-virus systems that exist in the market today consume massive amount of memory (both physical as well as permanent) and cannot be relied upon by power users who need to tap into the full potential of their devices. Also, these systems cannot be employed in thin clients, which have limitations in quality and capacity of hardware. The document describes a better architecture for the detection and prevention of malware with an escalated improvement in overall performance of the system. It also discusses new concepts that may be ported into existing security systems to improve the efficiency of those systems.
Authors and Affiliations
Saifur Rahman Mohsin
Design and Development of Main Helicopter Rotor Blade
To determine the load distribution in main helicopter rotor blade in study Computational Fluid Dynamics (CFD) and Finite Element Method (FEM) software is used. The aim of the present investigation is the development of...
slugGrid Based Coverage Algorithm Using GPSR In Wireless Sensor Network
Maintain long network lifetime of the wireless sensor network without affecting either coverage or connectivity is one of the issues in WSN. Redundant nodes in dense sensor network of the WSN wastes large amount of e...
Effect of 2D thermal gradient on free vibration of orthotropic tapered circular plate
Plate construction is found in a wide range of structures, some of which include ships, bridges, aircrafts, storage tanks and steel gates. In some cases the maximum deflection of the plate is equal or larger than the pl...
Semi Fragile Watermarking Scheme
In Watermarking techniques, the information that is conveying the watermark is embedded in an object, which can be an image, audio or video. Watermarking can be fragile or non-fragile depending upon user's necessities....
Dynamic analysis of laminated composite plates and shells by using a new higher-order shear deformation theory and ABAQUS software
A new higher order shear deformation theory for elastic composite/sandwich plates and shells is developed. The new displacement field depends on a parameter ‘‘m’’, whose value is determined so as to give results. Static...