File integrity monitor scheduling based on file security level classification
Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Springer
2011
|
Online Access: | http://psasir.upm.edu.my/id/eprint/76646/1/File%20integrity%20monitor%20scheduling%20based%20on%20file%20security%20level%20classification.pdf http://psasir.upm.edu.my/id/eprint/76646/ https://link.springer.com/chapter/10.1007/978-3-642-22191-0_16 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!