contributor author | Arunkumar, Saritha | |
contributor author | Srivatsa, Mudhakar | |
contributor author | Rajarajan, Muttukrishnan | |
date accessioned | 2020-03-12T21:45:26Z | |
date available | 2020-03-12T21:45:26Z | |
date issued | 2014 | |
identifier other | 6956992.pdf | |
identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1059337?locale-attribute=fa&show=full | |
format | general | |
language | English | |
publisher | IEEE | |
title | Location Security -- Where to Enforce? | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8190877 | |
subject keywords | cryptographic protocols | |
subject keywords | n invasive software | |
subject keywords | n DNS protocol | |
subject keywords | n DNS traffic | |
subject keywords | n DNS tunneling | |
subject keywords | n IP addresses | |
subject keywords | n communication networks | |
subject keywords | n covert channel characterization | |
subject keywords | n domain name system | |
subject keywords | n malicious payload distribution channels | |
subject keywords | n malware datasets | |
subject keywords | n malware families | |
subject keywords | n message patterns | |
subject keywords | n translation service | |
subject keywords | n Command and control systems | |
subject keywords | n Malware | |
subject keywords | n Payloads | |
subject keywords | n Protocols | |
subject keywords | n Servers | |
subject keywords | n Tunneling | |
identifier doi | 10.1109/NTMS.2014.6814008 | |
journal title | ilitary Communications Conference (MILCOM), 2014 IEEE | |
filesize | 2147672 | |
citations | 1 | |