A Unified Model for Computer Threat Protection (UMCTP)

被引:0
|
作者
Murtaza, Muhammad [1 ]
Sharif, Muhammad [1 ]
Raza, Mudassar [1 ]
Khan, Aman Ullah [1 ]
机构
[1] COMSATS Inst Informat Technol Wah Cantt, Dept Comp Sci, Punjab, Pakistan
来源
WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE | 2008年
关键词
Antivirus; Virus; Open Source; Model; Threat; Protection;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a unified way to unite major computer threat researchers, students, volunteers and amigos in antivirus industry under the umbrella of a Unified Model for Computer Threat Protection. The suggested model slices protection mechanism into two compatible parts to promote indigenous custom antivirus development. First part, rather static in nature, is unique custom antivirus software developed by individual organizations (users) that meets their specific needs. The other one, dynamic in nature, is the threat definition and research part contributed by global researchers' community in a standardized way to form a global public virus definition library. At the end a tentative sketch of such custom software for a strategic organization is also presented to model basic construct and essentials of an effective antivirus.
引用
收藏
页码:267 / 271
页数:5
相关论文
共 50 条
  • [21] Towards a Threat Model for Vehicular Fog Computing
    Hoque, Mohammad Aminul
    Hasan, Ragib
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 1051 - 1057
  • [22] A Model for Computer Profiling
    Marrington, Andrew
    Mohay, George
    Morarji, Hasmukh
    Clark, Andrew
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 635 - 640
  • [23] Protection of Computer Enclosure against Coupled Electromagnetic Interference
    Xiong, Run
    Yang, Wen
    Chen, Hai-Lin
    Duan, Yan-Tao
    APPLIED COMPUTATIONAL ELECTROMAGNETICS SOCIETY JOURNAL, 2018, 33 (11): : 1300 - 1307
  • [24] Balancing wildlife protection and wildfire threat mitigation using a network optimization approach
    Yemshanov, Denys
    Dawe, Denyse A.
    Bakalarczyk, Amanda
    Liu, Ning
    Boulanger, Yan
    Boucher, Jonathan
    Beauchemin, Alexandre
    Arseneault, Dominique
    Leblond, Mathieu
    Parisien, Marc-Andre
    FRONTIERS IN FORESTS AND GLOBAL CHANGE, 2023, 6
  • [25] Reflections on our Computer Software Intellectual Property Protection
    Wu, Shan
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND MANAGEMENT INNOVATION, 2014, : 50 - 53
  • [26] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [27] Analysis of computer network information security and protection strategy
    Yu, Wenye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242
  • [28] A Unified Model for Inclusive Inheritance in Livestock Species
    David, Ingrid
    Ricard, Anne
    GENETICS, 2019, 212 (04) : 1075 - 1099
  • [29] A Voltage Drop-Based Unified Protection Technique for Islanded Hybrid Microgrid
    Saber, Ahmed
    Zeineldin, H. H.
    El-Saadany, Ehab F.
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (06) : 5373 - 5387
  • [30] Unified Model for Data Security - A Position Paper
    Akram, Raja Naeem
    Ko, Ryan K. L.
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 831 - 839