Can Malware Be Exterminated by Better Understanding Its Roots?
contributor author | Cho, Michael Cheng Yi | |
contributor author | Chia-Wei Hsu | |
contributor author | Shiuhpyng Shieh | |
contributor author | Chi-Wei Wang | |
date accessioned | 2020-03-13T00:29:57Z | |
date available | 2020-03-13T00:29:57Z | |
date issued | 2014 | |
identifier issn | 1520-9202 | |
identifier other | 6964976.pdf | |
identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1149032?show=full | |
format | general | |
language | English | |
publisher | IEEE | |
title | Can Malware Be Exterminated by Better Understanding Its Roots? | |
type | Journal Paper | |
contenttype | Metadata Only | |
identifier padid | 8332207 | |
subject keywords | invasive software | |
subject keywords | malware detection | |
subject keywords | malware extermination | |
subject keywords | malware recognition | |
subject keywords | Benchmark testing | |
subject keywords | Computer security | |
subject keywords | Database systems | |
subject keywords | Information security | |
subject keywords | Malware | |
subject keywords | Software development | |
subject keywords | cloud | |
subject keywords | cloud computing | |
subject keywords | computer security | |
subject keywords | malware | |
subject keywords | security | |
identifier doi | 10.1109/MITP.2014.86 | |
journal title | IT Professional | |
journal volume | 16 | |
journal issue | 6 | |
filesize | 1580272 | |
citations | 0 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |