作者: Shireen Rivera , Peter Ashley
DOI:
关键词: Internet privacy 、 Reputation 、 Business 、 Computer security
摘要: Techniques for detecting security vulnerabilities are disclosed. In one particular embodiment, the techniques may be realized as a method including assigning reputation to an application, distributing client, receiving monitored system behavior from client related executing determining whether change of application based on behavior, changed further and generate rule received client.