|
Volumn , Issue , 2009, Pages 69-77
|
The waledac protocol: The how and why
|
Author keywords
[No Author keywords available]
|
Indexed keywords
BOTNETS;
MALWARES;
P2P ARCHITECTURE;
PEER TO PEER;
COMPUTER SOFTWARE;
COMPUTER CRIME;
|
EID: 77950106995
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/MALWARE.2009.5403015 Document Type: Conference Paper |
Times cited : (42)
|
References (8)
|