Method and system for impostor detector
A technology of deception detection and deception attack, applied in the direction of transmission system, data exchange details, electrical components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Those skilled in the art will understand that aspects of the present invention can be implemented as a system, method or computer program product. Accordingly, aspects of the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, microcode, etc.), or an embodiment combining software and hardware aspects, all of which are herein Often referred to as "circuits", "modules" or "systems". Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer-readable media having computer-readable program code embodied therein.
[0017] One embodiment in accordance with claimed subject matter relates to a programmed method for detecting attacks on a system employing logical partitions. As used herein, the term "programmed method" is defined to mean one or more process steps that are currently performed; or alternatively, one or mor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 