File integrity monitor scheduling based on file security level classification
Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used...
| Main Authors: | Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Springer
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/76646/ http://psasir.upm.edu.my/id/eprint/76646/1/File%20integrity%20monitor%20scheduling%20based%20on%20file%20security%20level%20classification.pdf |
Similar Items
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Corrupt File
by: Cinanni, Gina
Published: (2013)
by: Cinanni, Gina
Published: (2013)
Comparison of file sanitization techniques in usb based on average file entropy valves
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
Comparison of file sanitization techniques in USB based on average file entropy values
by: Onn, Nur Amanina
Published: (2018)
by: Onn, Nur Amanina
Published: (2018)
Classification of JPEG files by using extreme learning machine
by: Ali, Rabei Raad, et al.
Published: (2018)
by: Ali, Rabei Raad, et al.
Published: (2018)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
The performance of the 3DES and Fernet encryption in securing data files
by: Mohd, Siti Munirah, et al.
Published: (2024)
by: Mohd, Siti Munirah, et al.
Published: (2024)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009)
by: Ghobadi, Alireza, et al.
Published: (2009)
A systematic review of file sharing in mobile devices using peer-to-peer systems
by: Yasin, Waheed, et al.
Published: (2011)
by: Yasin, Waheed, et al.
Published: (2011)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2014)
by: Mohamed, Duryana
Published: (2014)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2015)
by: Mohamed, Duryana
Published: (2015)
Order 63A: electronic filing
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
Order 63A: Electronic Filing
by: Mohamed, Duryana
Published: (2018)
by: Mohamed, Duryana
Published: (2018)
Read data from a file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
File encryption by iris recognition system
by: Musab A. M. Ali,, et al.
Published: (2024)
by: Musab A. M. Ali,, et al.
Published: (2024)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Production of biocomposites file for packaging application
by: Mat Zain, Norashikin, et al.
Published: (2011)
by: Mat Zain, Norashikin, et al.
Published: (2011)
Audio files comparison with wavelet transform
by: Jiang, Chengjun
Published: (2023)
by: Jiang, Chengjun
Published: (2023)
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
by: Ali, Rabei Raad, et al.
Published: (2018)
by: Ali, Rabei Raad, et al.
Published: (2018)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
The Helmet Files: Year 5 Teachers Manual
by: Cross, D., et al.
Published: (2000)
by: Cross, D., et al.
Published: (2000)
Design and fabricate two shelves file cart
by: Muhammad Suhail, Md Ibrahim
Published: (2009)
by: Muhammad Suhail, Md Ibrahim
Published: (2009)
Determinants Of Perceived Ease Of Use Of E-Filing
by: Ramoo, Viveka
Published: (2006)
by: Ramoo, Viveka
Published: (2006)
Determinants Of Perceived Ease Of Use Of E-Filing
by: Ramoo, Viveka
Published: (2006)
by: Ramoo, Viveka
Published: (2006)
Determinants Of Perceived Ease Of Use Of E-Filing
by: Ramoo, Viveka
Published: (2006)
by: Ramoo, Viveka
Published: (2006)
Design and development of installer tool for file handle
by: Mohd Amran, Norshila, et al.
Published: (2021)
by: Mohd Amran, Norshila, et al.
Published: (2021)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
by: Ismail @ Hassan, Noor Azlina
Published: (2015)
by: Ismail @ Hassan, Noor Azlina
Published: (2015)
Creating Structured PDF Files Using XML Templates
by: Hardy, Matthew, et al.
Published: (2004)
by: Hardy, Matthew, et al.
Published: (2004)
Similar Items
-
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011) -
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015) -
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013) -
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005) -
Testing file
by: Ilina, Musa
Published: (2014)