Signature-based Intrusion Detection Hardware-Software Complex

Nowadays hackers are able to find many software vulnerabilities, which can be exploited for malicious purposes such as to destroy the operating system, to steal users' private data, to demand a ransom not to affect the data and retain their validity. The majority of attacks use an Internet conn...

Full description

Saved in:
Bibliographic Details
Published inInformation & security Vol. 47; no. 2; pp. 221 - 231
Main Authors V. Stetsenko, Inna, Demydenko, Maksym
Format Journal Article
LanguageEnglish
Published Sofia ProCon Ltd 2020
Subjects
Online AccessGet full text
ISSN0861-5160
1314-2119
DOI10.11610/isij.4715

Cover

Loading…