•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Active versus Passive Malware Collection

Author:
Ying-Dar Lin
,
Chia-Yin Lee
,
Yu-Sung Wu
,
Pei-Hsiu Ho
,
Fu-yu Wang
,
Yi-Lang Tsai
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/MC.2013.226
URI: https://libsearch.um.ac.ir:443/fum/handle/fum/957417
Keyword(s): invasive software,peer-to-peer computing,active malware collection,active malware honeypots,passive malware collection,passive malware honeypots,peer-to-peer file sharing,Databases,Malware,Peer-to-peer computing,Telecommunication traffic,Trojan horses,Virtual machining,honeypots,malware collection and detection,network security,network vulnerability
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Active versus Passive Malware Collection

Show full item record

contributor authorYing-Dar Lin
contributor authorChia-Yin Lee
contributor authorYu-Sung Wu
contributor authorPei-Hsiu Ho
contributor authorFu-yu Wang
contributor authorYi-Lang Tsai
date accessioned2020-03-12T18:24:24Z
date available2020-03-12T18:24:24Z
date issued2014
identifier issn0018-9162
identifier other6544525.pdf
identifier urihttps://libsearch.um.ac.ir:443/fum/handle/fum/957417
formatgeneral
languageEnglish
publisherIEEE
titleActive versus Passive Malware Collection
typeJournal Paper
contenttypeMetadata Only
identifier padid7989673
subject keywordsinvasive software
subject keywordspeer-to-peer computing
subject keywordsactive malware collection
subject keywordsactive malware honeypots
subject keywordspassive malware collection
subject keywordspassive malware honeypots
subject keywordspeer-to-peer file sharing
subject keywordsDatabases
subject keywordsMalware
subject keywordsPeer-to-peer computing
subject keywordsTelecommunication traffic
subject keywordsTrojan horses
subject keywordsVirtual machining
subject keywordshoneypots
subject keywordsmalware collection and detection
subject keywordsnetwork security
subject keywordsnetwork vulnerability
identifier doi10.1109/MC.2013.226
journal titleComputer
journal volume47
journal issue4
filesize914923
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace