Signature-based Intrusion Detection Hardware-Software Complex
Nowadays hackers are able to find many software vulnerabilities, which can be exploited for malicious purposes such as to destroy the operating system, to steal users' private data, to demand a ransom not to affect the data and retain their validity. The majority of attacks use an Internet conn...
Saved in:
Published in | Information & security Vol. 47; no. 2; pp. 221 - 231 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Sofia
ProCon Ltd
2020
|
Subjects | |
Online Access | Get full text |
ISSN | 0861-5160 1314-2119 |
DOI | 10.11610/isij.4715 |
Cover
Loading…