期刊文献+

Studying and Classification of the Most Significant Malicious Software

Studying and Classification of the Most Significant Malicious Software
下载PDF
导出
作者 Wajeb Gharibi
出处 《通讯和计算机(中英文版)》 2011年第1期17-22,共6页 Journal of Communication and Computer
Informatics, information security, virology, cyber threats
  • 相关文献

参考文献8

  • 1A. Adamov, Computer Threats: Methods of Detection and Analysis, Kaspersky Lab, Moscow, 2009.
  • 2Available online at: http://www.securelist.com.
  • 3Infosecurity Magazine: Phishing and the Economics of E-crime, available online at: http://www.infosecurity-magazine.com, 2007.
  • 4Z. Chen, C. Ji, A self-learning worm using importance scanning, in: ACM CCS Workshop on Rapid Malcode, 2005.
  • 5C.C. Zou, W. Gong, D. Towsley, Code red worm propagation modeling and analysis, in: 9th ACM Conference on Computer and Communication Security, 2002.
  • 6C. Shannon, D. Moore, The spread of the witty worm, IEEE Security and Privacy Magazine (2004).
  • 7C. Zou, L. Gao, W. Gong, D. Towsley, Monitoring and early warning of internet worms, in: ACM Conference on Computer and Communications Security, 2003.
  • 8M. Rajab, F. Monrose, A. Yerzis, Fast and evasive attacks: Highlighting the challenges ahead, in: 9th International Symposium on Recent Advances in Intrusion Detection, 2006.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部