•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Can Malware Be Exterminated by Better Understanding Its Roots?

Author:
Cho, Michael Cheng Yi
,
Chia-Wei Hsu
,
Shiuhpyng Shieh
,
Chi-Wei Wang
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/MITP.2014.86
URI: https://libsearch.um.ac.ir:443/fum/handle/fum/1149032
Keyword(s): invasive software,malware detection,malware extermination,malware recognition,Benchmark testing,Computer security,Database systems,Information security,Malware,Software development,cloud,cloud computing,computer security,malware,security
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Can Malware Be Exterminated by Better Understanding Its Roots?

Show full item record

contributor authorCho, Michael Cheng Yi
contributor authorChia-Wei Hsu
contributor authorShiuhpyng Shieh
contributor authorChi-Wei Wang
date accessioned2020-03-13T00:29:57Z
date available2020-03-13T00:29:57Z
date issued2014
identifier issn1520-9202
identifier other6964976.pdf
identifier urihttps://libsearch.um.ac.ir:443/fum/handle/fum/1149032
formatgeneral
languageEnglish
publisherIEEE
titleCan Malware Be Exterminated by Better Understanding Its Roots?
typeJournal Paper
contenttypeMetadata Only
identifier padid8332207
subject keywordsinvasive software
subject keywordsmalware detection
subject keywordsmalware extermination
subject keywordsmalware recognition
subject keywordsBenchmark testing
subject keywordsComputer security
subject keywordsDatabase systems
subject keywordsInformation security
subject keywordsMalware
subject keywordsSoftware development
subject keywordscloud
subject keywordscloud computing
subject keywordscomputer security
subject keywordsmalware
subject keywordssecurity
identifier doi10.1109/MITP.2014.86
journal titleIT Professional
journal volume16
journal issue6
filesize1580272
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace