Exploring randomness
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
IEEE Security and Privacy
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
An Adaptive Intrusion Detection Algorithm Based on Improved Dynamic Clonal Selection Algorithms
ISDA '06 Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications - Volume 02
SSH, the Secure Shell: The Definitive Guide
SSH, the Secure Shell: The Definitive Guide
Modeling Software with Finite State Machines
Modeling Software with Finite State Machines
A simple fast hybrid pattern-matching algorithm
Journal of Discrete Algorithms
XOR Hashing Algorithms to Measured Flows at the High-Speed Link
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01
On Fundamental Limitations of Proving Data Theft
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
The engineering world appears today more mature than ever in providing stable technology premises in order to build large scale, real interoperable and secure enterprise information systems, and strengthening the fundamental structure of private and public organisations. However, as technology has evolved, more opportunities have become available for virus writers to express their imagination in malicious code. Computer viruses are a major problem in modern day computing, threatening the structure of organisations, their enterprise systems and eliminating user-acceptance of electronic and mobile services provided. Detection tools such as virus scanners have performed poorly, particularly when facing previously unknown virus or novel variants of existing ones. This paper proposes and performs assessment on advanced proactive and reactive cryptographic measures that ensure the robustness and security of enterprises and computer systems.