Prevention of Unauthorized Software Execution: Identification of Applications
In this paper authors describe approaches to solving the problem of application identification in designing systems preventing users from running prohibited programs on computer.
Main Authors: | E. Y. Rodionov, M. V. Senik |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2010-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/786 |
Similar Items
-
Hash-based signature revisited
by: Lingyun Li, et al.
Published: (2022-07-01) -
Enhancement of online signature verification software using support vector machines /
by: 281267 Chong, Yew Kim, et al.
Published: (2007) -
A Hash-Based Quantum-Resistant Chameleon Signature Scheme
by: P. Thanalakshmi, et al.
Published: (2021-12-01) -
Enhancement of online signature verification software using support vector machines [electronic resource]/
by: 281267 Chong, Yew Kim, et al.
Published: (2007) -
Real World Applications of MGR, Neeva and KN-Hash
by: Khushboo BUSSI, et al.
Published: (2018-04-01)