Towards a dynamic file integrity monitor through a security classification
File is a component of a computer system that has importance value of its own, either in terms of availability, integrity, confidentiality and functionality to a system and application. If unintended changes happen on the related file, it may affect the security of related computer system. File inte...
| Main Authors: | Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The Society of Digital Information and Wireless Communications
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/22523/ http://psasir.upm.edu.my/id/eprint/22523/1/Towards%20a%20dynamic%20file%20integrity%20monitor%20through%20a%20security%20classification.pdf |
Similar Items
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
A systematic review of file sharing in mobile devices using peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2011)
by: Yasin, Waheed, et al.
Published: (2011)
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
A dynamic compressed accessibility map for secure XML querying and updating
by: Mirabi, Meghdad, et al.
Published: (2015)
by: Mirabi, Meghdad, et al.
Published: (2015)
Classification of JPEG files by using extreme learning machine
by: Ali, Rabei Raad, et al.
Published: (2018)
by: Ali, Rabei Raad, et al.
Published: (2018)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
The performance of the 3DES and Fernet encryption in securing data files
by: Mohd, Siti Munirah, et al.
Published: (2024)
by: Mohd, Siti Munirah, et al.
Published: (2024)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Dynamic bayesian networks in Classification-and-Ranking Architecture of Response Generation
by: Mustapha, Aida, et al.
Published: (2011)
by: Mustapha, Aida, et al.
Published: (2011)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
by: Ali, Rabei Raad, et al.
Published: (2018)
by: Ali, Rabei Raad, et al.
Published: (2018)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2014)
by: Mohamed, Duryana
Published: (2014)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2015)
by: Mohamed, Duryana
Published: (2015)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
Order 63A: Electronic Filing
by: Mohamed, Duryana
Published: (2018)
by: Mohamed, Duryana
Published: (2018)
Read data from a file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Analysis of integrity tests for checking integrity constraints in a distributed database
by: Alwan, Ali Amer, et al.
Published: (2007)
by: Alwan, Ali Amer, et al.
Published: (2007)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A study on feature selection and classification techniques for automatic genre classification of traditional Malay music
by: Doraisamy, Shyamala, et al.
Published: (2008)
by: Doraisamy, Shyamala, et al.
Published: (2008)
Adaptive skin color classification technique for color-based face detection systems using integral image
by: Tabatabaie, Zahra Sadri, et al.
Published: (2011)
by: Tabatabaie, Zahra Sadri, et al.
Published: (2011)
Similar Items
-
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011) -
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011) -
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013) -
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)