•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Location Security -- Where to Enforce?

Author:
Arunkumar, Saritha
,
Srivatsa, Mudhakar
,
Rajarajan, Muttukrishnan
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/NTMS.2014.6814008
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/1059337
Keyword(s): cryptographic protocols,n invasive software,n DNS protocol,n DNS traffic,n DNS tunneling,n IP addresses,n communication networks,n covert channel characterization,n domain name system,n malicious payload distribution channels,n malware datasets,n malware families,n message patterns,n translation service,n Command and control systems,n Malware,n Payloads,n Protocols,n Servers,n Tunneling
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Location Security -- Where to Enforce?

Show full item record

contributor authorArunkumar, Saritha
contributor authorSrivatsa, Mudhakar
contributor authorRajarajan, Muttukrishnan
date accessioned2020-03-12T21:45:26Z
date available2020-03-12T21:45:26Z
date issued2014
identifier other6956992.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/1059337?locale-attribute=en
formatgeneral
languageEnglish
publisherIEEE
titleLocation Security -- Where to Enforce?
typeConference Paper
contenttypeMetadata Only
identifier padid8190877
subject keywordscryptographic protocols
subject keywordsn invasive software
subject keywordsn DNS protocol
subject keywordsn DNS traffic
subject keywordsn DNS tunneling
subject keywordsn IP addresses
subject keywordsn communication networks
subject keywordsn covert channel characterization
subject keywordsn domain name system
subject keywordsn malicious payload distribution channels
subject keywordsn malware datasets
subject keywordsn malware families
subject keywordsn message patterns
subject keywordsn translation service
subject keywordsn Command and control systems
subject keywordsn Malware
subject keywordsn Payloads
subject keywordsn Protocols
subject keywordsn Servers
subject keywordsn Tunneling
identifier doi10.1109/NTMS.2014.6814008
journal titleilitary Communications Conference (MILCOM), 2014 IEEE
filesize2147672
citations1
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace