File integrity monitor scheduling based on file security level classification

Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam
Format: Conference or Workshop Item
Language:English
Published: Springer 2011
Online Access:http://psasir.upm.edu.my/id/eprint/76646/1/File%20integrity%20monitor%20scheduling%20based%20on%20file%20security%20level%20classification.pdf
http://psasir.upm.edu.my/id/eprint/76646/
https://link.springer.com/chapter/10.1007/978-3-642-22191-0_16
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first