A Unified Model for Computer Threat Protection (UMCTP)

被引:0
|
作者
Murtaza, Muhammad [1 ]
Sharif, Muhammad [1 ]
Raza, Mudassar [1 ]
Khan, Aman Ullah [1 ]
机构
[1] COMSATS Inst Informat Technol Wah Cantt, Dept Comp Sci, Punjab, Pakistan
来源
WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE | 2008年
关键词
Antivirus; Virus; Open Source; Model; Threat; Protection;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a unified way to unite major computer threat researchers, students, volunteers and amigos in antivirus industry under the umbrella of a Unified Model for Computer Threat Protection. The suggested model slices protection mechanism into two compatible parts to promote indigenous custom antivirus development. First part, rather static in nature, is unique custom antivirus software developed by individual organizations (users) that meets their specific needs. The other one, dynamic in nature, is the threat definition and research part contributed by global researchers' community in a standardized way to form a global public virus definition library. At the end a tentative sketch of such custom software for a strategic organization is also presented to model basic construct and essentials of an effective antivirus.
引用
收藏
页码:267 / 271
页数:5
相关论文
共 50 条
  • [1] Threat Effects Analysis: Applying FMEA to Model Computer System Threats
    Bowles, John B.
    Hanczaryk, William
    ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2008 PROCEEDINGS, 2008, : 466 - +
  • [2] A Unified Safety Protection and Extension Governor
    Li, Nan
    Li, Yutong
    Kolmanovsky, Ilya
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2025, 70 (04) : 2599 - 2606
  • [3] A unified process for computer assisted surgery
    Schorr, O
    Pernozzoli, A
    Raczkowsky, J
    Wörn, H
    CARS 2002: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2002, : 1083 - 1083
  • [4] Protection Without Detection: A Threat Mitigation Technique
    White, Joshua
    McCoy, Joseph R.
    Ratazzi, Paul
    DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2012, 2012, 8405
  • [5] Study of Epidemiological based dynamic Model of Computer Viruses for Sustainable Safeguard against Threat Propagations
    Din, Shahab Ud
    Masood, Zaheer
    Samar, Raza
    Majeed, Khalid
    Raja, Muhammad Asif Zahoor
    PROCEEDINGS OF 2017 14TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2017, : 434 - 440
  • [6] Computer - a chance or a threat to a child's development?
    Zysnarska, Monika
    Bernad, Dorota
    Maksymiuk, Tomasz
    Dalz, Zbigniew
    Wisniewska-Spychala, Beata
    FAMILY MEDICINE AND PRIMARY CARE REVIEW, 2008, 10 (04) : 1346 - 1350
  • [7] Multilevel model of information protection the at use of means of cryptographic protection
    Kozub, AA
    Mescheriakov, RV
    Kiseleva, I
    2003 SIBERIAN RUSSIAN WORKSHOP ON ELECTRON DEVICES AND MATERIALS PROCEEDINGS, 2003, : 139 - 140
  • [8] Network Threat Detection Based on Group CNN for Privacy Protection
    Xu, Yanping
    Zhang, Xia
    Lu, Chengdan
    Qiu, Zhenliang
    Bi, Chunfang
    Lai, Yuping
    Qiu, Jian
    Zhang, Hua
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [9] Threat, Coping, and Cost: Protection Motivation in the Context of Consumer Complaining
    Bolkan, San
    COMMUNICATION RESEARCH, 2018, 45 (06) : 840 - 861
  • [10] A unified model of organizational effectiveness
    Sharma, Nidhi
    Singh, Reetesh K.
    JOURNAL OF ORGANIZATIONAL EFFECTIVENESS-PEOPLE AND PERFORMANCE, 2019, 6 (02) : 114 - 128