Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (0)
This presentation is an evaluation of priori versus aposteriori approaches to the identification of computer viruses. The presenters feel that only using a priori detection approach can be unrealistic as well as costly. Instead, the presenters propose an aposteriori computer security system with the ability to take its own protective action when an… (More)