NIC displays to thwart malware attacks mounted from within the OS.
Julian L. RrushiPublished in: Comput. Secur. (2016)
Keyphrases
- detect malicious
- malicious code
- operating system
- detecting malicious
- attack scenarios
- anti virus
- open source
- countermeasures
- static analysis
- reverse engineering
- vision system
- malware detection
- high resolution
- security threats
- malicious attacks
- malicious users
- traffic analysis
- watermarking algorithm
- hand held
- db universal database
- denial of service attacks
- gaze contingent
- chosen plaintext
- security risks
- watermarking method
- computer security
- security mechanisms
- security protocols
- attack detection
- virtual machine
- video camera
- database manager
- laser pointer
- network traffic
- java card