{"title":"Algorithms to isolation of logical and physical objects from malicious software","authors":"S. Kasimov, D. Rahmatov","doi":"10.1109/ICAICT.2010.5612018","DOIUrl":null,"url":null,"abstract":"Given article describes algorithms to isolation of malicious software logical and physical objects of the system. As example logical object are used files. As example physical object are used sectors of the hard disk","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 4th International Conference on Application of Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2010.5612018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Given article describes algorithms to isolation of malicious software logical and physical objects of the system. As example logical object are used files. As example physical object are used sectors of the hard disk