Amanote Research

Amanote Research

    RegisterSign In

Runtime Monitoring of Malicious Code in a Net-Work

doi 10.28945/1257
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2010

Authors
Ibironke AjayiOlutayo Bamidele AjayiOlusola Adeniran
Publisher

Informing Science Institute


Related search

A Survey of Runtime Monitoring Instrumentation Techniques

Electronic Proceedings in Theoretical Computer Science, EPTCS
Software
2017English

Compensation-Aware Runtime Monitoring

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

RML: Runtime Monitoring Language

2019English

A Software Complex for Revealing Malicious Behavior in Untrusted Binary Code

Proceedings of the Institute for System Programming of the RAS
2019English

The Algorithm of Malicious Code Detection Based on Data Mining

2017English

Malicious Code on Java Card Smartcards: Attacks and Countermeasures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Runtime Monitoring of Message-Based Workflows With Data

2008English

Hardware Acceleration of Hamming Code: Design of Runtime Reconfigurable FPGA Prototype

International Journal of Computer Applications
2014English

COST Action IC1402 Runtime Verification Beyond Monitoring

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy