메뉴 건너뛰기




Volumn 5, Issue , 2008, Pages 160-164

A novel approach to malicious executables detection and containment based on distributed system architecture

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFIERS; COMPUTER CRIME; DATA MINING; INFORMATION MANAGEMENT; LEARNING SYSTEMS;

EID: 57649195950     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNC.2008.648     Document Type: Conference Paper
Times cited : (1)

References (9)
  • 1
    • 0034269416 scopus 로고    scopus 로고
    • G McGraw, G Morrisett, Attacking malicious code: a report to the Infosec Research Council, IEEE Software, Volume17, Issue5, Sep., 2000, p 33-41.
    • G McGraw, G Morrisett, "Attacking malicious code: a report to the Infosec Research Council", IEEE Software, Volume17, Issue5, Sep., 2000, p 33-41.
  • 4
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May-June
    • Biswanath Mukherjee, Todd L. Heberlein, and Karl N.Levitt. Network intrusion detection. IEEE Network, Volume 8, Issue3, May-June, 1994, p 26-41.
    • (1994) IEEE Network , vol.8 , Issue.ISSUE3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, T.L.2    Levitt, K.N.3
  • 5
    • 57649145183 scopus 로고    scopus 로고
    • VX-HEAVENS
    • VX-HEAVENS: http://vx.netlux.org.
  • 8
    • 57649159466 scopus 로고    scopus 로고
    • http://www.vmware.com.
  • 9
    • 57649185512 scopus 로고    scopus 로고
    • http://www.microsoft.com/whdc/driver/filterdrv/default.mspx


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.