Protection of computer resources

作者: Jeffrey A. Kraemer

DOI:

关键词:

摘要: In one embodiment, local software code present in a computer system enables real-time detection of whether the is properly protected against malicious attacks from harmful software. For example, such as or more agents executing support protection validation based upon behavior (as opposed to mere presence resources applications system). response detecting that an application accesses provides particular type resource and should be via appropriate policies, if not already protected, agent can provide immediate remediation (e.g., security measure) temporarily protect until policy activated threats.

参考文章(29)
Robert S. Sielken, Anita K. Jones, Computer System Intrusion Detection: A Survey ,(2000)
Klaus Julisch, Using root cause analysis to handle intrusion detection alarms Universität Dortmund. pp. 1- 136 ,(2003) , 10.17877/DE290R-14858
Jeffrey A. Kraemer, Philip J. S. Gladstone, Methods and apparatus providing security to computer systems and networks ,(2006)
John Gavan, Saralyn Mahone, Terrill J Curtis, Kevin Paul, James J Wagner, Cheryl Herrington, Charles A Dallas, Hans Van Arkel, Jim Richards, System and method for detecting and managing fraud ,(1998)
Bryan Douglas Williams, Timothy P. Farley, Philip Charles Brass, Derek John Mezack, George C. Young, John M. Hammer, Method and System for Managing Computer Security Information ,(2001)