Zobrazeno 1 - 10
of 11
pro vyhledávání: '"M. A. Ajay Kumara"'
Autor:
Sachin Somanna, N. Vikhyath Shetty, M. Mohammed Afthab, Sagar Neupane, M. V. Manoj Kumar, M. A. Ajay Kumara, Bjarne Berg, Prashanth P. Wagle
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811910173
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c47dd7e0ef70608290ee0e8927d68657
https://doi.org/10.1007/978-981-19-1018-0_28
https://doi.org/10.1007/978-981-19-1018-0_28
Autor:
G. Moulshree, M. V. Manoj Kumar, B. S. Prashanth, M. A. Ajay Kumara, S. L. Shivadarshan, H. R. Sneha, P. Wagle Prashanth
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811910173
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d37f8637543d0676ef3ab4dbce37491
https://doi.org/10.1007/978-981-19-1018-0_39
https://doi.org/10.1007/978-981-19-1018-0_39
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 15:209-218
Android-based smartphones are gaining popularity, due to its cost efficiency and various applications. These smartphones provide the full experience of a computing device to its user, and usually ends up being used as a personal computer. Since the A
Autor:
M. A. Ajay Kumara, C. D. Jaidhar
Publikováno v:
Future Generation Computer Systems. 79:431-446
In order to fulfill the requirements like stringent timing restraints and demand on resources, Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud computing. To protect Virtual Machines (VMs) in which CPSs are funct
Autor:
C. D. Jaidhar, M. A. Ajay Kumara
Publikováno v:
Digital Investigation. 23:99-123
The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions
Autor:
J. Mathew, M. A. Ajay Kumara
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030166564
ISDA (1)
ISDA (1)
Malware variants keep increasing every year as most malware developers tweak existing easily available malware codes to create their custom versions. Though their behaviours are coherent, because of change in signature, static signature-based malware
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c797dc0fbf53c46dc5f6b9e6589c1a2f
https://doi.org/10.1007/978-3-030-16657-1_9
https://doi.org/10.1007/978-3-030-16657-1_9
Publikováno v:
2017 ISEA Asia Security and Privacy (ISEASP).
Currently, the Internet faces serious threat from malwares, and its propagation may cause great havoc on computers and network security solutions. Several existing anti-malware defensive solutions detect known malware accurately. However, they fail t
Publikováno v:
ICIIS
Malicious software or malware has grown rapidly and many anti-malware defensive solutions have failed to detect the unknown malware since most of them rely on signature-based technique. This technique can detect a malware based on a pre-defined signa
Autor:
M. A. Ajay Kumara, C. D. Jaidhar
Publikováno v:
Security, Privacy, and Applied Cryptography Engineering ISBN: 9783319494449
SPACE
SPACE
The Virtual Machine Introspection (VMI) has evolved as a promising future security solution to performs an indirect investigation of the untrustworthy Guest Virtual Machine (GVM) in real-time by operating at the hypervisor in a virtualized cloud envi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6ea19d4b8a090e94d24a3b5d10bdc6fc
https://doi.org/10.1007/978-3-319-49445-6_16
https://doi.org/10.1007/978-3-319-49445-6_16
Autor:
C. D. Jaidhar, M. A. Ajay Kumara
Publikováno v:
ICPADS
Due to a rapid revaluation in a virtualization environment, Virtual Machines (VMs) are target point for an attacker to gain privileged access of the virtual infrastructure. The Advanced Persistent Threats (APTs) such as malware, rootkit, spyware, etc