Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/7605
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNair, Dilip C-
dc.date.accessioned2017-07-26T05:46:41Z-
dc.date.available2017-07-26T05:46:41Z-
dc.date.issued2017-05-
dc.identifier.urihttp://hdl.handle.net/123456789/7605-
dc.description.abstractSecurity does not like complexity. With increasing Lines of Code (LoC) for any system, the complexity of incorporating security increases. Hence, Windows Operating Systems is more vulnerable than any other operating system. The main objective of this system is to restrict the Windows operating system to work in an unexploitable condition. We achieve this by imposing restrictions to the OS and monitor continuously for the violation of these restrictions. To decide how much restrictions is required we can divide the OS into three types, they are Productive Systems, Non-Productive Systems and Hybrid Systems.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries15MCEI05;-
dc.subjectComputer 2017en_US
dc.subjectProject Report 2017en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject15MCEIen_US
dc.subject15MCEI05en_US
dc.subjectINSen_US
dc.subjectINS 2017en_US
dc.subjectCE (INS)en_US
dc.titleRestriction Based System to Detect Malicious Activities in Windows OSen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
15MCEI05.pdf15MCEI052.36 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.