Algorithms to isolation of logical and physical objects from malicious software

Abstract

Given article describes algorithms to isolation of malicious software logical and physical objects of the system. As example logical object are used files. As example physical object are used sectors of the hard disk 

Topics

Cite this paper

@article{Kasimov2010AlgorithmsTI, title={Algorithms to isolation of logical and physical objects from malicious software}, author={S. S. Kasimov and Dilshod Rahmatov}, journal={2010 4th International Conference on Application of Information and Communication Technologies}, year={2010}, pages={1-3} }