References
To learn more about the topics covered in this chapter, take a look at the following resources:
- Sobeslav, V., Balik, L., Hornig, O., Horalek, J., & Krejcar, O. (2017). Endpoint firewall for local security hardening in academic research environment. Journal of Intelligent & Fuzzy Systems, 32(2), 1475-1484.
- Pagán, A., & Elleithy, K. (2021, January). A multi-layered defense approach to safeguard against ransomware. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0942-0947). IEEE.
- Solanki, P. S., Kadam, A. D., Khairnar, P. S., & Atkekar, N. D. (2022). Enhancement of cyber security and protection of sensitive R&D data using next generation firewall.
- Min, B., & Varadharajan, V. (2016). A novel malware for subversion of self-protection in anti-virus. Software: Practice and Experience, 46(3), 361-379.
- Morales, J., Xu, S., & Sandhu, R. (2012). Analyzing malware detection efficiency with...