The [216:1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies
Abstract
References
Index Terms
- The [216:1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies
Recommendations
The Next Malware Battleground: Recovery After Unknown Infection
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internet—the spam messages, ...
Detecting, validating and characterizing computer infections in the wild
IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conferenceAlthough network intrusion detection systems (IDSs) have been studied for several years, their operators are still overwhelmed by a large number of false-positive alerts. In this work we study the following problem: from a large archive of intrusion ...
An Empirical Assessment of the Perception of Computer Security between US and Korea: Focused on Rootkits
SERA '07: Proceedings of the 5th ACIS International Conference on Software Engineering Research, Management & ApplicationsThe surveys were conducted from 400 students of five korea and three U.S. universities to compare their knowledge and experience with various forms of malware.They provide an empirical assessment of the cross-cultural similarities and differences ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Alex Nagorski,
- Program Chairs:
- Gordana Brouilette,
- Carol Rhodes
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 216Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in