Cargando…
Malicious attack propagation and source identification
Autores principales: | Jiang, Jiaojiao, Wen, Sheng, Liu, Bo, Yu, Shui, Xiang, Yang, Zhou, Wanlei |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2018
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2710734 |
Ejemplares similares
Ejemplares similares
-
Identifying Multiple Propagation Sources
por: Jiang, Jiaojiao, et al.
Publicado: (2018) -
Windows Vista security: securing Vista against malicious attacks
por: Grimes, Roger A, et al.
Publicado: (2007) -
Malicious cryptography: exposing cryptovirology
por: Young, Adam, et al.
Publicado: (2004) -
Malware: fighting malicious code
por: Skoudis, Ed, et al.
Publicado: (2004) -
Mastering malware analysis: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
por: Kleymenov, Alexey, et al.
Publicado: (2019)